From 4f3c9d991a90e0bc9a69c0379d1279185ca7efa1 Mon Sep 17 00:00:00 2001 From: ivanr Date: Wed, 3 Dec 2008 15:07:49 +0000 Subject: [PATCH] Small clarifications. --- doc/modsecurity2-data-formats.xml | 23 +++++++++++++++-------- 1 file changed, 15 insertions(+), 8 deletions(-) diff --git a/doc/modsecurity2-data-formats.xml b/doc/modsecurity2-data-formats.xml index f3cedd90..12ffe318 100644 --- a/doc/modsecurity2-data-formats.xml +++ b/doc/modsecurity2-data-formats.xml @@ -4,7 +4,7 @@
ModSecurity 2 Data Formats - Version 2.6.0-trunk (November 27, 2008) + Version 2.6.0-trunk (December 3, 2008) 2004-2008 Breach Security, Inc. (Unique transaction ID - Source IP address (IPv4) + Source IP address (IPv4 or IPv6) Source port - Destination IP address (IPv4) + Destination IP address (IPv4 or IPv6) Destination port @@ -556,10 +556,13 @@ Server: Apache/2.x.x Response Headers (<literal>F</literal>) This part contains the actual response headers sent to the client. Since ModSecurity 2.x for Apache does not access the raw connection data, it - constructs part F out of the internal Apache data structures that hold the - response headers. Some headers are generated just before they are sent and - ModSecurity is not able to record those. They are the Date - and Server response headers. + constructs part F out of the internal Apache data structures + that hold the response headers. + Some headers (the Date and Server + response headers) are generated just before they are sent and ModSecurity is not + able to record those. You should note than ModSecurity is working as part of a + reverse proxy, the backend web server will have generated these two servers, and + in that case they will be recorded.
Response Body (G) @@ -776,7 +779,11 @@ Server: Apache/2.x.x
Matched Rules (<literal>K</literal>) The matched rules part contains a record of all ModSecurity rules that matched - during transaction processing. + during transaction processing. You should note that if a rule that belongs to a + chain matches then the entire chain will be recorded. This is because, even + though the disruptive action may not have executed, other per-rule actions have, + and you will need to see the entire chain in order to understand the + rules. This part is available starting with ModSecurity 2.5.x.