From 331df90babe989c0b9f4194c9472ae538e678c34 Mon Sep 17 00:00:00 2001 From: Felipe Zimmerle Date: Tue, 12 Jan 2016 10:50:38 -0300 Subject: [PATCH] Enables OWASP CRS optional_rules on becnhmark test case --- test/benchmark/download-owasp-v2-rules.sh | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/test/benchmark/download-owasp-v2-rules.sh b/test/benchmark/download-owasp-v2-rules.sh index fd8b2016..55a65d5e 100755 --- a/test/benchmark/download-owasp-v2-rules.sh +++ b/test/benchmark/download-owasp-v2-rules.sh @@ -6,11 +6,21 @@ git clone https://github.com/SpiderLabs/owasp-modsecurity-crs.git owasp-v2 echo 'Include "owasp-v2/base_rules/*.conf"' >> basic_rules.conf +echo 'Include "owasp-v2/optional_rules/*.conf"' >> basic_rules.conf +# Content injection not support in modsec v3 +rm owasp-v2/optional_rules/modsecurity_crs_43_csrf_protection.conf +# WEBSERVER_ERROR_LOG is not supported in v3. cat owasp-v2/base_rules/modsecurity_crs_20_protocol_violations.conf | sed 's/SecRule WEBSERVER_ERROR_LOG/#SecRule WEBSERVER_ERROR_LOG/g' > owasp-v2/base_rules/modsecurity_crs_20_protocol_violations.conf.tmp mv owasp-v2/base_rules/modsecurity_crs_20_protocol_violations.conf.tmp owasp-v2/base_rules/modsecurity_crs_20_protocol_violations.conf +# Apache specific configuration. +cat owasp-v2/optional_rules/modsecurity_crs_49_header_tagging.conf | sed 's/RequestHeader/#RequestHeader/g' > owasp-v2/optional_rules/modsecurity_crs_49_header_tagging.conf.tmp +mv owasp-v2/optional_rules/modsecurity_crs_49_header_tagging.conf.tmp owasp-v2/optional_rules/modsecurity_crs_49_header_tagging.conf + +cat owasp-v2/optional_rules/modsecurity_crs_55_application_defects.conf | sed 's/Header edit/#Header edit/g' > owasp-v2/optional_rules/modsecurity_crs_55_application_defects.conf.tmp +mv owasp-v2/optional_rules/modsecurity_crs_55_application_defects.conf.tmp owasp-v2/optional_rules/modsecurity_crs_55_application_defects.conf echo "Done."