From d419a21682a1db1fe4274dbd798b646240c3d637 Mon Sep 17 00:00:00 2001 From: brectanus Date: Fri, 15 Aug 2008 20:25:27 +0000 Subject: [PATCH] Update CHANGES. Sync up docs. --- CHANGES | 12 ++++++++++-- doc/modsecurity2-apache-reference.xml | 28 ++++++++++++++++++++++++--- 2 files changed, 35 insertions(+), 5 deletions(-) diff --git a/CHANGES b/CHANGES index 25868aa8..e83c35f3 100644 --- a/CHANGES +++ b/CHANGES @@ -1,7 +1,15 @@ 31 Jul 2008 - trunk -======= +------------------- - * Implement cssDecode. + * Allow for disabling request body limit checks in phase:1. + + * Added transformations for processing parity for legacy protocols ported + to HTTP(S): t:parityEven7bit, t:parityOdd7bit, t:parityZero7bit + + * Added t:cssDecode transformation to decode CSS escapes. + + * Now log XML parsing/validation warnings and errors to be in the debug log + at levels 3 and 4, respectivly. * Persistent counter updates are now atomic. diff --git a/doc/modsecurity2-apache-reference.xml b/doc/modsecurity2-apache-reference.xml index 55d6c0dd..289c3c72 100644 --- a/doc/modsecurity2-apache-reference.xml +++ b/doc/modsecurity2-apache-reference.xml @@ -4,7 +4,7 @@ Manual - Version 2.6.0-trunk (July 31, 2008) + Version 2.6.0-trunk (August 15, 2008) 2004-2008 @@ -3853,6 +3853,28 @@ SecRule XML:/xq:employees/employee/name/text() Fred \ to forward slashes. +
+ <literal>parityEven7bit</literal> + + This function calculates even parity of 7-bit data replacing + the 8th bit of each target byte with the calculated parity bit. +
+ +
+ <literal>parityOdd7bit</literal> + + This function calculates odd parity of 7-bit data replacing + the 8th bit of each target byte with the calculated parity bit. +
+ +
+ <literal>parityZero7bit</literal> + + This function calculates zero parity of 7-bit data replacing + the 8th bit of each target byte with a zero parity bit which allows + inspection of even/odd parity 7bit data as ASCII7 data. +
+
<literal>removeNulls</literal> @@ -5469,7 +5491,7 @@ SecRule REQUEST_HEADERS:Ip-Address "!@streq %{TX.1}"@validateDTD /path/to/apache2/conf/xml.dtd,id:12345" +SecRule XML "@validateDTD /path/to/apache2/conf/xml.dtd" "deny,id:12345"
@@ -5484,7 +5506,7 @@ SecRule XML "@validateDTD /path/to/apache2/conf/xml.dtd,id: SecRule REQUEST_HEADERS:Content-Type ^text/xml$ \ phase:1,t:lowercase,nolog,pass,ctl:requestBodyProcessor=XML SecRule REQBODY_PROCESSOR "!^XML$" nolog,pass,skipAfter:12345 -SecRule XML "@validateSchema /path/to/apache2/conf/xml.xsd,id:12345" +SecRule XML "@validateSchema /path/to/apache2/conf/xml.xsd" "deny,id:12345" This operator requires request body to be processed as XML.