Updated Reference Manual (v3.x) (mediawiki)

martinhsv
2022-01-13 17:18:52 -05:00
parent 5671a21a6f
commit 3b9496863f

@@ -1,6 +1,6 @@
= ModSecurity® Reference Manual = = ModSecurity® Reference Manual =
== Current as of v3.0.6 == == Current as of v3.0.6 ==
=== Copyright © 2022 [https://www.trustwave.com/ Trustwave Holdings, Inc.] === === Copyright © 2022 [https://www.trustwave.com/ Trustwave Holdings, Inc.] ===ha
= Table of Contents = = Table of Contents =
= Introduction = = Introduction =
@@ -481,56 +481,13 @@ Every rule following a previous <code>SecDefaultAction</code> directive in the s
; Warning : <code>SecDefaultAction</code> is not inherited across configuration contexts. (For an example of why this may be a problem, read the following ModSecurity Blog entry http://blog.spiderlabs.com/2008/07/three-modsecurity-rule-language-annoyances.html .) ; Warning : <code>SecDefaultAction</code> is not inherited across configuration contexts. (For an example of why this may be a problem, read the following ModSecurity Blog entry http://blog.spiderlabs.com/2008/07/three-modsecurity-rule-language-annoyances.html .)
== SecDisableBackendCompression == == SecDisableBackendCompression ==
'''Description:''' Disables backend compression while leaving the frontend compression enabled. '''Not supported in v3'''
'''Syntax:''' <code>SecDisableBackendCompression On|Off </code>
'''Scope:''' Any
'''Version:''' 2.6.0-2.9.x
'''Supported on libModSecurity:''' TBI
'''Default:''' Off
This directive is necessary in reverse proxy mode when the backend servers support response compression, but you wish to inspect response bodies. Unless you disable backend compression, ModSecurity will only see compressed content, which is not very useful. This directive is not necessary in embedded mode, because ModSecurity performs inspection before response compression takes place.
== SecHashEngine == == SecHashEngine ==
'''Description:''' Configures the hash engine. '''Not supported in v3''
'''Syntax:''' <code>SecHashEngine On|Off</code>
'''Example Usage:''' <code>SecHashEngine On </code>
'''Scope''': Any
'''Version:''' 2.7.1-2.9.x
'''Supported on libModSecurity:''' TBI
'''Default:''' Off
The possible values are:
*'''On''': Hash engine can process the request/response data.
*'''Off''': Hash engine will not process any data.
; Note : Users must enable stream output variables and content injection.
== SecHashKey == == SecHashKey ==
'''Description:''' Define the key that will be used by HMAC. '''Not supported in v3'''
'''Syntax:''' <code>SecHashKey rand|TEXT KeyOnly|SessionID|RemoteIP</code>
'''Example Usage:''' <code>SecHashKey "this_is_my_key" KeyOnly</code>
'''Scope''': Any
'''Version:''' 2.7.1-2.9.x
'''Supported on libModSecurity:''' TBI
ModSecurity hash engine will append, if specified, the user's session id or remote ip to the key before the MAC operation. If the first parameter is "rand" then a random key will be generated and used by the engine.
== SecHashParam == == SecHashParam ==
'''Not supported in v3''' '''Not supported in v3'''