Changes the behavior of the default sec actions

Fix #1629
This commit is contained in:
Felipe Zimmerle
2018-05-31 14:33:13 -03:00
parent 61c956e3f2
commit 202a15bea8
5 changed files with 27 additions and 26 deletions

View File

@@ -4,13 +4,13 @@
"version_min":300000,
"title":"Testing Disruptive actions (1/n)",
"expected":{
"debug_log": " Running action: deny",
"debug_log": "Running action deny",
"http_code":403
},
"rules":[
"SecRuleEngine On",
"SecDefaultAction \"phase:2,deny,status:404\"",
"SecAction \"id:'900001',phase:request,nolog,status:403,t:none\""
"SecAction \"id:'900001',phase:request,nolog,status:403,t:none,block\""
]
},
{
@@ -18,13 +18,13 @@
"version_min":300000,
"title":"Testing Disruptive actions (2/n)",
"expected":{
"debug_log": " Running action: deny",
"debug_log": "Running action deny",
"http_code":404
},
"rules":[
"SecRuleEngine On",
"SecDefaultAction \"phase:2,deny,status:404\"",
"SecAction \"id:'1',phase:request,nolog,t:none\""
"SecAction \"id:'1',phase:request,nolog,t:none,block\""
]
},
{

View File

@@ -278,8 +278,8 @@
"rules":[
"SecRuleEngine On",
"SecDefaultAction \"phase:2,log,auditlog,status:302,redirect:'http://www.google.com'\"",
"SecRule REQUEST_HEADERS \"@contains PHPSESSID\" \"phase:2,id:1\"",
"SecRule TX \"@contains to_test\" \"id:2,t:lowercase,t:none\""
"SecRule REQUEST_HEADERS \"@contains PHPSESSID\" \"phase:2,id:1,block\"",
"SecRule TX \"@contains to_test\" \"id:2,t:lowercase,t:none,block\""
]
}
]

View File

@@ -4,14 +4,14 @@
"version_min":300000,
"title":"Testing Disruptive actions (1/n)",
"expected":{
"debug_log": " Running action: deny",
"debug_log": " Running action deny",
"http_code":403
},
"rules":[
"SecRuleEngine On",
"SecRuleEngine On",
"SecDefaultAction \"phase:2,deny,status:404\"",
"SecAction \"id:'900001',phase:request,nolog,status:403,t:none\""
"SecAction \"id:'900001',phase:request,nolog,status:403,t:none,block\""
]
},
{
@@ -26,7 +26,7 @@
"SecRuleEngine On",
"SecRuleEngine Off",
"SecDefaultAction \"phase:2,deny,status:404\"",
"SecAction \"id:'1',phase:request,nolog,t:none\""
"SecAction \"id:'1',phase:request,nolog,t:none,block\""
]
},
{
@@ -41,7 +41,7 @@
"SecRuleEngine On",
"SecRuleEngine DetectionOnly",
"SecDefaultAction \"phase:2,deny,status:404\"",
"SecAction \"id:'1',phase:request,nolog,nolog,block,t:none\""
"SecAction \"id:'1',phase:request,nolog,nolog,block,t:none,block\""
]
},
{
@@ -56,7 +56,7 @@
"SecRuleEngine On",
"SecRuleEngine Off",
"SecDefaultAction \"phase:2,deny,status:404\"",
"SecAction \"id:'1',phase:request,nolog,t:none\""
"SecAction \"id:'1',phase:request,nolog,t:none,block\""
]
},
{
@@ -71,7 +71,7 @@
"SecRuleEngine On",
"SecRuleEngine Off",
"SecDefaultAction \"phase:2,deny,status:404\"",
"SecAction \"id:'1',phase:request,nolog,block,t:none\""
"SecAction \"id:'1',phase:request,nolog,block,t:none,block\""
]
}
]