mirror of
https://github.com/ADD-SP/ngx_waf.git
synced 2026-04-26 22:15:55 +03:00
[GH-ISSUE #61] Many attacks are bypassed and whitelist/blacklist IP #42
Labels
No labels
MacOS
Nginx
OpenResty
Tengine
bug
documentation
enhancement
needs-investigation
pull-request
question
stale
stale
stale
timeout
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/ngx_waf#42
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @NgHuuAn on GitHub (Sep 14, 2021).
Original GitHub issue: https://github.com/ADD-SP/ngx_waf/issues/61
Hi,
We have tested with some tools to check WAF like Nikto scan tools, owasp to check the ability to block and bypass, but still get ByPass quite a lot even though waf_mode=FULL.
Can you update this rules or we can customize the rules in the path /usr/local/src/ngx_waf/assets/rules. It would be nice if this modules can be able to integrate with 3rd apps like modsecurity like we are currently using.
In addition, the IP whitelist and IP blacklist features we don't really understand. When adding an IP to the blacklist, this IP can still request the url and uri of the website.
Looking forward to hearing from you soon
Thanks !
@ADD-SP commented on GitHub (Sep 14, 2021):
Hi,
Thanks for the test!
By default, if an IP is added to the blacklist, then clients using that IP will receive HTTP status code 403. If a client's IP is added to the whitelist, then subsequent checks for
ngx_wafwill be skipped. Which checks are skipped depends on the priority setting, see Rule Priority for details.We realized early on that
ngx_wafis very easy to bypass, so we have integrated libinjection in v5.1.2, see CHANGES.We plan to integrate ModSecurity, but this will take some time. Internal testing is expected to take place this month, so if you are interested you can contact us via the contact information in the documentation so you can also participate in the internal testing effort.
Regards
@NgHuuAn commented on GitHub (Sep 14, 2021):
Hi,
Just is tell you this is a great module for nginx as we can integrate many features into a single module instead of just combining many different modules from the community. but there are still some limitations with bypass some attack, configure or check logs through the dashboard, support to more webserver,... and if you can handle them you can turn this module into commercial (Just like Imunify360 did it).
Regarding Blacklist and Whitelist issues, we will check and update information to you. Maybe we tested with old versions.
Yes, we will cooperate with you for testing if you need our helps
Regards !
@ADD-SP commented on GitHub (Sep 16, 2021):
@NgHuuAn
Hello.
I have integrated ModSecurity in the branch
feature-modsecurity, I was hoping you could help me testngx_wafagain, please reopen this issue if you want.I'm not familiar with the syntax of ModSecurity rules, I only learned some of them while testing the code, so I don't know which ModSecurity rules to provide, and I don't know if you have any available.
You need to install
libmodsecuritybefore installing ngx_waf. If you have installed it before, you need to re-run the scriptconfigure. If you are using docker for testing, you can refer todocker/Dokcerfile.glibcordocker/Dokcerfile.musl.You can enable ModSecurity with the following directive.
Regards !
@NgHuuAn commented on GitHub (Oct 14, 2021):
Hi @ADD-SP ,
The current test results are better, you can check out the attached image below.
These patterns attack we have sent to you via emails.
Thanks and Regards !
@ADD-SP commented on GitHub (Oct 14, 2021):
Thanks a lot!
@NgHuuAn commented on GitHub (Oct 14, 2021):
Hi ADD-SP/ngx_waf,
Sorry for the delay in replying to you, I'm busy with other projects so I
can't reply to you right away. If you need a pattern attack that we tested.
You can check the attached pdf file below for reference.
Thanks and Regards !
On Thu, Sep 16, 2021 at 11:24 PM ADD-SP @.***> wrote: