SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 

mod_security_crs rpm build for : Scientific Linux 7. For other distributions click mod_security_crs.

Name : mod_security_crs
Version : 2.2.9 Vendor : Scientific Linux
Release : 1.el7 Date : 2016-11-04 23:06:06
Group : System Environment/Daemons Source RPM : mod_security_crs-2.2.9-1.el7.src.rpm
Size : 0.37 MB
Packager : Scientific Linux
Summary : ModSecurity Rules
Description :
This package provides the base rules for mod_security.

RPM found in directory: /mirror/vol4/ftp.scientificlinux.org/linux/scientific/7.5/x86_64/os/Packages

Content of RPM  Changelog  Provides Requires

Hmm ... It's impossible ;-) This RPM doesn't exist on any FTP server

Provides :
config(mod_security_crs)
mod_security_crs

Requires :
rpmlib(PayloadIsXz) <= 5.2-1
rpmlib(FileDigests) <= 4.6.0-1
rpmlib(CompressedFileNames) <= 3.0.4-1
rpmlib(PayloadFilesHavePrefix) <= 4.0-1
mod_security => 2.7.0
config(mod_security_crs) = 2.2.9-1.el7


Content of RPM :
/etc/httpd/modsecurity.d/activated_rules/modsecurity_35_bad_robots.data
/etc/httpd/modsecurity.d/activated_rules/modsecurity_35_scanners.data
/etc/httpd/modsecurity.d/activated_rules/modsecurity_40_generic_attacks.data
/etc/httpd/modsecurity.d/activated_rules/modsecurity_50_outbound.data
/etc/httpd/modsecurity.d/activated_rules/modsecurity_50_outbound_malware.data
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_20_protocol_violations.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_21_protocol_anomalies.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_23_request_limits.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_30_http_policy.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_35_bad_robots.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_40_generic_attacks.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_41_sql_injection_attacks.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_41_xss_attacks.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_42_tight_security.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_45_trojans.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_47_common_exceptions.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_48_local_exceptions.conf.example
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_49_inbound_blocking.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_50_outbound.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_59_outbound_blocking.conf
/etc/httpd/modsecurity.d/activated_rules/modsecurity_crs_60_correlation.conf
/etc/httpd/modsecurity.d/modsecurity_crs_10_config.conf
/usr/lib/modsecurity.d/base_rules
/usr/lib/modsecurity.d/base_rules/modsecurity_35_bad_robots.data
/usr/lib/modsecurity.d/base_rules/modsecurity_35_scanners.data
/usr/lib/modsecurity.d/base_rules/modsecurity_40_generic_attacks.data
/usr/lib/modsecurity.d/base_rules/modsecurity_50_outbound.data
/usr/lib/modsecurity.d/base_rules/modsecurity_50_outbound_malware.data
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_20_protocol_violations.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_21_protocol_anomalies.conf
There is 19 files more in these RPM.

 
ICM