patch for PluginMeta() wrapper required in last pluginconf.gui.window() | ||
---|---|---|
mario authored 431 days ago last checkin 4f8b060ed ⎘ | ||
๐ dev | Add FileโInstall menu for *.deb packages or scripts.โนโบ | 1489 days ago |
๐ html2mallard | Converted project wiki to yelp pages. (subproject: html2mallard)โนโบ | 1458 days ago |
๐ logfmt1 | Comment updates, fixed script wrappers, unify update-logfmt to pythonโนโบ | 1475 days ago |
๐ manpage | Remove remaining emoji Unicode occurences (info, modify, vhosts)โนโบ | 1404 days ago |
๐ modseccfg | comment fixesโนโบ | 800 days ago |
๐ test | publish data test (mostly vhost/secrule extraction)โนโบ | 1489 days ago |
๐ FAQ.md | Note about emoji bug (albeit already removed all instances)โนโบ | 1396 days ago |
๐ LICENSE | Add FAQ and licenseโนโบ | 1506 days ago |
๐ Makefile | comment fixesโนโบ | 800 days ago |
๐ NEWS | Release as 0.7.0โนโบ | 1467 days ago |
๐ README.md | comment fixesโนโบ | 800 days ago |
๐ pytest.ini | disable regex warningsโนโบ | 1486 days ago |
๐ requirements.txt | Add basic plugin_load(), generilize `add_menu()` into `init()`โนโบ | 1464 days ago |
๐ setup.py | add msc_pyparser option dependency `pip install modseccfg[all]`โนโบ | 800 days ago |
๐ tox.ini | publish data test (mostly vhost/secrule extraction)โนโบ | 1489 days ago |
modseccfg
mod_security config GUI
- GUI to define SecRuleRemoveById settings on a vhost-basis
- Tries to suggest false positives from error and audit logs
- And configure mod_security and CoreRuleSet variables.
- Runs locally, via
ssh -X
forwarding, or permodseccfg ssh:/
remoting.
WARNING: THIS IS ALPHA STAGE QUALITY AND WILL MOST CERTAINLY DELETE YOUR APACHE CONFIGURATION - It doesn't, but: no warranty and such. - Also, hasn't many features yet.
Installation
You can install this package locally or on a server:
pip3 install -U modseccfg
And your distro must provide a full Python installaton and mod_security:
sudo apt install python3-tk ttf-unifont libapache2-mod-security2
Start options
To run the GUI locally / on test setups:
modseccfg
Or to connect to a remote server:
modseccfg root@vps5:/
Takes a bit longer on startup, but is heaps better than X11 forwarding.
Usage
You obviously should have Apache + mod_security + CRS set up and running already (in DetectionOnly mode initially), to allow for log inspection and adapting rules.
- Start modseccfg (
python3 -m modseccfg
) - Select a configuration/vhost file to inspect + work on.
- Pick the according error.log
- Inspect the rules with a high error count.
- [Disable] offending rules
- Don't just go by the error count however!
- Make sure you don't disable essential or heuristic rules.
- Compare error with access log details.
- Else craft an exception rule ([Modify] or โRecipes).
- Thenceforth restart Apache (after testing changes:
apache2ctl -t
).
See also:
- usage
- remoting
- preconf setup and recipes
- log scripts/
- or the "FAQ"
Notes
- Preferrably do not edit default
/etc/apache*
files - Work on separated
/srv/web/conf.d/*
configuration, if available - And keep vhost settings in e.g.
vhost.*.dir
files, rather than multiple<VirtualHost>
in one*.conf
(else only the first section will be augmented). - Use the editor (F4) to verify more complex settings.
Missing features
- Rule [modify] is still unimplemented.
- Recipes are not worth using yet.
- No sudo usage.
Attachments:
- overview.gif [download] added by mario on 2020-12-09 22:39:53. [details]