-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Comparing changes
Open a pull request
base repository: owasp-modsecurity/ModSecurity
base: v3/master
head repository: rosmo/ModSecurity
compare: master
- 18 commits
- 1 file changed
- 3 contributors
Commits on Oct 28, 2014
-
Adds collection FILES_TMP_CONTENT
The collection is filled with a key-value set where value is the content of the file which was uploaded. This collection can be used with all supported operators, however, SecTmpSaveUploadedFiles should be set to 'On' in order to have this collection filled. Note that @inspectFile is now depending on SecTmpSaveUploadedFiles. This is necessary to keep performance while such functionalities where not used.
Felipe Zimmerle committedOct 28, 2014 Configuration menu - View commit details
-
Copy full SHA for 1c0e953 - Browse repository at this point
Copy the full SHA 1c0e953View commit details -
Adds ssdeep support in our build system
ssdeep will be used with the @fuzzyHash operator which is under development
Felipe Zimmerle committedOct 28, 2014 Configuration menu - View commit details
-
Copy full SHA for 42adb2e - Browse repository at this point
Copy the full SHA 42adb2eView commit details -
The fuzzyHash operator can be used to match files. In conjuntcion with FILES_TMP_CONTENT collection it can scan uploaded files and try to match it with a pre caculated list of know malicious content, more details on how it works can be found on ssdeep website: http://ssdeep.sourceforge.net/
Felipe Zimmerle committedOct 28, 2014 Configuration menu - View commit details
-
Copy full SHA for d287029 - Browse repository at this point
Copy the full SHA d287029View commit details -
Felipe \"Zimmerle\" Costa committed
Oct 28, 2014 Configuration menu - View commit details
-
Copy full SHA for 2c423ba - Browse repository at this point
Copy the full SHA 2c423baView commit details -
Adds regression test to cover the @fuzzeHash operator
Added 30-fuzzyHash.t and the ssdeep hash files. Hash files was generated using files from ModSecurity repository.
Felipe Zimmerle committedOct 28, 2014 Configuration menu - View commit details
-
Copy full SHA for e5aea89 - Browse repository at this point
Copy the full SHA e5aea89View commit details -
FuzzyHash: if disable giving an run time error instead of config
FuzzyHash operator is optional and only installed if the headers for libfuzzy was found in the system. Otherwise, the FuzzyHash operator is disable during the compilation. After this commit, if some rules tries to use it, ModSecurity will produce an runtime error not a config time error, allowing the web server to procede normal with its operations.
Felipe Zimmerle committedOct 28, 2014 Configuration menu - View commit details
-
Copy full SHA for b6e061e - Browse repository at this point
Copy the full SHA b6e061eView commit details -
Declares msre_var *rvar at the beggining of the function
Necessary to fix the build on Win8 VS 2011
Felipe Zimmerle committedOct 28, 2014 Configuration menu - View commit details
-
Copy full SHA for b2b2951 - Browse repository at this point
Copy the full SHA b2b2951View commit details -
Temporarily disable a test that is leading nginx buildbot to fail.
Felipe Zimmerle committedOct 28, 2014 Configuration menu - View commit details
-
Copy full SHA for a0f91de - Browse repository at this point
Copy the full SHA a0f91deView commit details
Commits on Oct 31, 2014
-
Adds automake subdir-objects option
As of Automake 1.4, it starts to warning about the lack of utilization of `subdir-objects' option, which will be default in the further releases. Avoiding break stuff we are patching ModSecurity to support such option when it still an option (Issue #760).
Felipe Zimmerle committedOct 31, 2014 Configuration menu - View commit details
-
Copy full SHA for 220161c - Browse repository at this point
Copy the full SHA 220161cView commit details -
Automake: Using ../ instead of $(top_srcdir)
After enable `subdir-objects', the variable $(top_srcdir) was not being resolved, a directory labeled "$(top_srcdir)" was created instead.
Felipe Zimmerle committedOct 31, 2014 Configuration menu - View commit details
-
Copy full SHA for 5a1a3fd - Browse repository at this point
Copy the full SHA 5a1a3fdView commit details
Commits on Nov 3, 2014
-
Adds doxygen configuration files
Felipe Zimmerle committedNov 3, 2014 Configuration menu - View commit details
-
Copy full SHA for 48baf3d - Browse repository at this point
Copy the full SHA 48baf3dView commit details -
Using apr-util installed by Macports results in build failure because apr-util uses BerkeleyDB that MacPorts installs into a subdir of $prefix/lib and $prefix/include (so that multiple versions of BerkeleyDB can be installed simultaneously). apu-1-config's --ldflags output includes the -L/path/to/bdb that's needed.
Configuration menu - View commit details
-
Copy full SHA for 8388974 - Browse repository at this point
Copy the full SHA 8388974View commit details -
mlogc: Changes the default SSL algo to TLS 1.2
As reported by Josh Amishav-Zlatin, mlogc was making usage of SSLv3 instead of TLS 1.2. Servers should not answer SSLv3 after poodle.
Felipe Zimmerle committedNov 3, 2014 Configuration menu - View commit details
-
Copy full SHA for 84f2299 - Browse repository at this point
Copy the full SHA 84f2299View commit details -
mlogc: Checks if curl supports CURL_SSLVERSION_TLSv1_2 before use it
Seems like curl versions older than 7.34.0 does not have support for `CURL_SSLVERSION_TLSv1_2'. In this cases, using CURL_SSLVERSION_TLSv1 which was added at version 7.9.2. ModSecurity demands a curl version newer than 7.15.1.
Felipe Zimmerle committedNov 3, 2014 Configuration menu - View commit details
-
Copy full SHA for 2c991c5 - Browse repository at this point
Copy the full SHA 2c991c5View commit details
Commits on Nov 4, 2014
-
Adds Status test case with the SecServerSignature being used
If SecServerSignature is used ModSecurity should send the real data, not the one informed to SecServerSignature. Originally reported by: Linas
Felipe Zimmerle committedNov 4, 2014 Configuration menu - View commit details
-
Copy full SHA for b294061 - Browse repository at this point
Copy the full SHA b294061View commit details -
Trims long `apache version' in the status call
As reported at #714 status calls with long `apache version' name was broken. DNS queries cannot be so long. This field is now limited to 25 characters which is a valid size when encoded into base32
Felipe Zimmerle committedNov 4, 2014 Configuration menu - View commit details
-
Copy full SHA for 09eec10 - Browse repository at this point
Copy the full SHA 09eec10View commit details -
Using real server signature on status call
On Apache platform the server signature can be replaced using the SecServerSignature directive. Status call was using the signature informed by this directive instead of using the original one. As reported at #702.
Felipe Zimmerle committedNov 4, 2014 Configuration menu - View commit details
-
Copy full SHA for 5f470cc - Browse repository at this point
Copy the full SHA 5f470ccView commit details
Commits on Dec 2, 2014
-
Merge branch 'master' of https://github.com/SpiderLabs/ModSecurity
Conflicts: apache2/msc_util.h build/find_ssdeep.m4 iis/Makefile.win iis/build_dependencies.bat iis/build_modsecurity.bat mlogc/mlogc.c tests/Makefile.am tests/regression/misc/30-fuzzyHash.t
Taneli Lepp committedDec 2, 2014 Configuration menu - View commit details
-
Copy full SHA for 268f583 - Browse repository at this point
Copy the full SHA 268f583View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v3/master...master