| patch for PluginMeta() wrapper required in last pluginconf.gui.window() | ||
|---|---|---|
| mario authored 833 days ago last checkin 4f8b060ed ⎘ | ||
| ๐ dev | Add FileโInstall menu for *.deb packages or scripts.โนโบ | 1891 days ago |
| ๐ html2mallard | Converted project wiki to yelp pages. (subproject: html2mallard)โนโบ | 1860 days ago |
| ๐ logfmt1 | Comment updates, fixed script wrappers, unify update-logfmt to pythonโนโบ | 1877 days ago |
| ๐ manpage | Remove remaining emoji Unicode occurences (info, modify, vhosts)โนโบ | 1807 days ago |
| ๐ modseccfg | comment fixesโนโบ | 1202 days ago |
| ๐ test | publish data test (mostly vhost/secrule extraction)โนโบ | 1891 days ago |
| ๐ FAQ.md | Note about emoji bug (albeit already removed all instances)โนโบ | 1798 days ago |
| ๐ LICENSE | Add FAQ and licenseโนโบ | 1908 days ago |
| ๐ Makefile | comment fixesโนโบ | 1202 days ago |
| ๐ NEWS | Release as 0.7.0โนโบ | 1869 days ago |
| ๐ README.md | comment fixesโนโบ | 1202 days ago |
| ๐ pytest.ini | disable regex warningsโนโบ | 1888 days ago |
| ๐ requirements.txt | Add basic plugin_load(), generilize `add_menu()` into `init()`โนโบ | 1866 days ago |
| ๐ setup.py | add msc_pyparser option dependency `pip install modseccfg[all]`โนโบ | 1202 days ago |
| ๐ tox.ini | publish data test (mostly vhost/secrule extraction)โนโบ | 1891 days ago |
modseccfg
mod_security config GUI
- GUI to define SecRuleRemoveById settings on a vhost-basis
- Tries to suggest false positives from error and audit logs
- And configure mod_security and CoreRuleSet variables.
- Runs locally, via
ssh -Xforwarding, or permodseccfg ssh:/remoting.
WARNING: THIS IS ALPHA STAGE QUALITY AND WILL MOST CERTAINLY DELETE YOUR APACHE CONFIGURATION - It doesn't, but: no warranty and such. - Also, hasn't many features yet.
Installation
You can install this package locally or on a server:
pip3 install -U modseccfgAnd your distro must provide a full Python installaton and mod_security:
sudo apt install python3-tk ttf-unifont libapache2-mod-security2
Start options
To run the GUI locally / on test setups:
modseccfgOr to connect to a remote server:
modseccfg root@vps5:/
Takes a bit longer on startup, but is heaps better than X11 forwarding.
Usage
You obviously should have Apache + mod_security + CRS set up and running already (in DetectionOnly mode initially), to allow for log inspection and adapting rules.
- Start modseccfg (
python3 -m modseccfg) - Select a configuration/vhost file to inspect + work on.
- Pick the according error.log
- Inspect the rules with a high error count.
- [Disable] offending rules
- Don't just go by the error count however!
- Make sure you don't disable essential or heuristic rules.
- Compare error with access log details.
- Else craft an exception rule ([Modify] or โRecipes).
- Thenceforth restart Apache (after testing changes:
apache2ctl -t).
See also:
- usage
- remoting
- preconf setup and recipes
- log scripts/
- or the "FAQ"
Notes
- Preferrably do not edit default
/etc/apache*files - Work on separated
/srv/web/conf.d/*configuration, if available - And keep vhost settings in e.g.
vhost.*.dirfiles, rather than multiple<VirtualHost>in one*.conf(else only the first section will be augmented). - Use the editor (F4) to verify more complex settings.
Missing features
- Rule [modify] is still unimplemented.
- Recipes are not worth using yet.
- No sudo usage.
Attachments:
- overview.gif [download] added by mario on 2020-12-09 22:39:53. [details]