ModSecurity for Java - Help Page |
ModSecurity is an open source intrusion detection and prevention engine for web applications. It can also be called an web application firewall. It operates embedded into the web server, acting as a powerful umbrella, shielding applications from attacks. ModSecurity for Java is designed as a Java Filter which makes use of ModSecurity's native code using the JNI technology. Installation stepsStep 1: Compile ModSecurity native libraryInstall required packages for compilation. For example, on Debian/Ubuntu like systems: sudo apt-get install g++ make automake autoconf libtool Install required dependent packages: sudo apt-get install libxml2 libxml2-dev libxml2-utils libaprutil1 libaprutil1-dev apache2-prefork-dev The native libraries needed for ModSecurity for Java are:
These native libraries are used by the ModSecurityFilter. Download mod_security source code from GitHub, compile and install: git clone https://github.com/mihaipitu/ModSecurity.git cd mod_security/ ./autogen.sh ./configure --enable-standalone-module --enable-java-module make Copy compiled library in a convenient folder: sudo cp ./java/.libs/libModSecurityJNI.so /usr/lib/ The libModSecurityJNI.so file is the connector that plugs the "standalone" ModSecurity code into the Java application as a Filter. Step 2: Java Web Applications with ModSecurity FilterModSecurity for Java uses Java Filters in order to intercept Http requests and responses. ModsecurityTestApp is an example of Java EE Web application using the ModSecurity Filter. To use the ModSecurity filter in your Java web application, you will need to copy either the source .java files or the compiled .class files into your application.
Step 3: Activate the ModSecurityFilter in web.xmlAdd the following entry for the filter tag in your web.xml file:
The ModSecurity Filter makes use of the native libraries written in C/C++ using the JNI technology. There are two ways of loading native libraries by Java Web Applications:
Step 4: Configure ModSecurity SettingsIn the web.xml file, you added a path to the main modsecurity.conf file holding directives such as SecRuleEngine, SecAuditEngine, etc... You should update this file as needed for your environment. # head /root/modsecurity-apache_2.7.2/modsecurity.conf # -- Rule engine initialization ---------------------------------------------- # Enable ModSecurity, attaching it to every transaction. Use detection # only to start with, because that minimises the chances of post-installation # disruption. # SecRuleEngine DetectionOnly Step 5: Add in Rule FilesThe ModSecurity filter knows how to handle "Apache Include" directives in the "conf" param value. This means that if you want to create your own rule files or utilize the OWASP ModSecurity CRS, you should add appropriate Include directives to the main modsecurity.conf file: # tail /root/modsecurity-apache_2.7.2/modsecurity.conf # Specify your Unicode Code Point. # This mapping is used by the t:urlDecodeUni transformation function # to properly map encoded data to your language. Properly setting # these directives helps to reduce false positives and negatives. # #SecUnicodeCodePage 20127 #SecUnicodeMapFile unicode.mapping Include /root/owasp-modsecurity-crs/modsecurity_crs_10_setup.conf Include /root/owasp-modsecurity-crs/base_rules/*.conf Step 6: Start Java Server and Confirm ModSecurity Initialization# /opt/apache-tomcat-7.0.42/bin/startup.sh Using CATALINA_BASE: /opt/apache-tomcat-7.0.42 Using CATALINA_HOME: /opt/apache-tomcat-7.0.42 Using CATALINA_TMPDIR: /opt/apache-tomcat-7.0.42/temp Using JRE_HOME: /usr/lib/jvm/java-1.6.0-openjdk Using CLASSPATH: /opt/apache-tomcat-7.0.42/bin/bootstrap.jar:/opt/apache-tomcat-7.0.42/bin/tomcat-juli.jar # cat /opt/apache-tomcat-7.0.42/logs/localhost*.log Sep 27, 2013 6:35:18 PM org.apache.catalina.core.ApplicationContext log INFO: ModSecurity for Java (STABLE)/2.7.5 (http://www.modsecurity.org/) configured. Sep 27, 2013 6:35:18 PM org.apache.catalina.core.ApplicationContext log INFO: ModSecurity: APR compiled version="1.3.9"; loaded version="1.3.9" Sep 27, 2013 6:35:18 PM org.apache.catalina.core.ApplicationContext log INFO: ModSecurity: PCRE compiled version="7.8 "; loaded version="7.8 2008-09-05" Sep 27, 2013 6:35:18 PM org.apache.catalina.core.ApplicationContext log INFO: ModSecurity: LUA compiled version="Lua 5.1" Sep 27, 2013 6:35:18 PM org.apache.catalina.core.ApplicationContext log INFO: ModSecurity: LIBXML compiled version="2.7.6" Sep 27, 2013 6:35:18 PM org.apache.catalina.core.ApplicationContext log INFO: ModSecurity started. Step 7: Test RulesThe next step is to send some example attacks to your application to ensure that the it is working properly. If you send some XSS attacks for instance, you should see logs similar to the following in the Tomcat logs directory: Step 8: Verify Audit LoggingIn addition to the short, 1-line alert messages sent to the Tomcat logs, ModSecurity will also generate appropriate Audit log entries depending on your configuration. You can review the corresponding Audit log entry for your test request(s) to see fully request/response payloads: Bonus Testing: BeanShell scripting with ModSecurityYou can use BeanShell scripts in SecRule ModSecurity directives using the exec action. First you need to put the bsh.jar file (which can be downloaded from beanshell.org) into the current directory of your server (for example $CATALINA_HOME/bin in Tomcat). An example of an exec can be the following: # Alert and Block based on Anomaly Scores # SecRule TX:ANOMALY_SCORE "@gt 0" \ "chain,phase:2,id:'981176',t:none,deny,log,msg:'Inbound Anomaly Score Exceeded (Total Score: %{TX.ANOMALY_SCORE}, SQLi=%{TX.SQL_INJECTION_SCORE}, XSS=%{TX.XSS_SCORE}): Last Matched Message: %{tx.msg}',logdata:'Last Matched Data: %{matched_var}',setvar:tx.inbound_tx_msg=%{tx.msg},setvar:tx.inbound_anomaly_score=%{tx.anomaly_score}" SecRule TX:ANOMALY_SCORE "@ge %{tx.inbound_anomaly_score_level}" chain SecRule TX:ANOMALY_SCORE_BLOCKING "@streq on" chain SecRule TX:/^\d+\-/ "(.*)" "setenv:block_session=1,exec:/usr/local/apache/conf/beanshell_script.bsh" The environment variable set in the SecAction can be accessed in BeanShell scripts using some pseudo-code like this to instruct the app to block the current session:
|