From 009c3b0fa1593f5e5c36797510c3597364e26e6a Mon Sep 17 00:00:00 2001 From: ivanr Date: Fri, 21 Sep 2007 23:37:56 +0000 Subject: [PATCH] Document SecResponseBodyLimitAction. --- doc/modsecurity2-apache-reference.xml | 60 +++++++++++++++++++++------ 1 file changed, 47 insertions(+), 13 deletions(-) diff --git a/doc/modsecurity2-apache-reference.xml b/doc/modsecurity2-apache-reference.xml index 3e078508..854391a7 100644 --- a/doc/modsecurity2-apache-reference.xml +++ b/doc/modsecurity2-apache-reference.xml @@ -3,7 +3,7 @@ ModSecurity Reference Manual - Version 2.5.0-dev3 / (September 14, 2007) + Version 2.5.0-dev3 / (September 21, 2007) 2004-2007 @@ -1302,6 +1302,40 @@ SecRequestBodyInMemoryLimit 131072 SecResponseBodyLimit 524288 +
+ <literal>SecResponseBodyLimitAction</literal> + + Description: Controls what + happens once a response body limit, configured with + SecResponseBodyLimit, is encountered. By default + ModSecurity wil reject a response body that is longer than specified. + Some web sites, however, will produce very long responses making it + difficult to come up with a reasonable limit. Such sites would have to + raise the limit significantly to function properly defying the purpose + of having the limit in the first place (to control memory consumption). + With the ability to choose what happens once a limit is reached site + administrators can choose to inspect only the first part of the + response, the part that can fit into the desired limit, and let the rest + through. Some could argue that allowing parts of responses to go + uninspected is a weakness. This is true in theory but only applies to + cases where the attacker controls the output (e.g. can make it arbitrary + long). In such cases, however, it is not possible to prevent leakage + anyway. The attacker could compress, obfuscate, or even encrypt data + before it is sent back, and therefore bypass any monitoring + device. + + Syntax: + SecResponseBodyLimitAction + Reject|ProcessPartial + + Example Usage: + SecResponseBodyLimitAction ProcessPartial + + Processing Phase: N/A + + Scope: Any +
+
<literal>SecResponseBodyMimeType</literal> @@ -1910,17 +1944,17 @@ SecRule REQUEST_HEADERS:Host "!^$" "deny,phase:1 - application/x-www-form-urlencoded - used to - transfer form data - - - - multipart/form-data - used for file - transfers - - - - text/xml - used for passing XML data + application/x-www-form-urlencoded - used to + transfer form data + + + + multipart/form-data - used for file + transfers + + + + text/xml - used for passing XML data @@ -4973,4 +5007,4 @@ SecRule REQUEST_METHOD "!@within %{tx.allowed_methods}
- + \ No newline at end of file