SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 

dba-apache2-mod_security-crs-300 rpm build for : OpenSuSE 13.X. For other distributions click dba-apache2-mod_security-crs-300.

Name : dba-apache2-mod_security-crs-300
Version : 3.0.0 Vendor : obs://build_opensuse_org/home:csbuild
Release : 1.1 Date : 2016-12-01 16:15:02
Group : Productivity/Networking/Web/Servers Source RPM : dba-apache2-mod_security-crs-300-3.0.0-1.1.src.rpm
Size : 0.65 MB
Packager : (none)
Summary : OWASP ModSecurity Core Rule Set Project V3.0.0
Description :
ModSecurity. is a web application firewall engine that provides very little protection on its own. In order to become useful, ModSecurity. must be configured with rules. In order to enable users to take full advantage of ModSecurity. out of the box, Trustwave\'s SpiderLabs is providing a free certified rule set for ModSecurity. 2.x. Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, the Core Rules provide generic protection from unknown vulnerabilities often found in web applications, which are in most cases custom coded. The Core Rules are heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity..

Core Rules Content

In order to provide generic web applications protection, the Core Rules use the following techniques:

HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.
Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation
Web-based Malware Detection - identifies malicious web content by check against the Google Safe Browsing API.
HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.
Common Web Attacks Protection - detecting common web application security attack.
Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.
Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.
Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.
Trojan Protection - Detecting access to Trojans horses.
Identification of Application Defects - alerts on application misconfigurations.
Error Detection and Hiding - Disguising error messages sent by the server.

RPM found in directory: /packages/linux-pbone/ftp5.gwdg.de/pub/opensuse/repositories/home:/csbuild:/DBA/openSUSE_13.2/noarch

Content of RPM  Changelog  Provides Requires

Hmm ... It's impossible ;-) This RPM doesn't exist on any FTP server

Provides :
dba-apache2-mod_security-crs-300

Requires :
/usr/bin/env
rpmlib(CompressedFileNames) <= 3.0.4-1
/bin/sh
rpmlib(PayloadFilesHavePrefix) <= 4.0-1
/usr/bin/perl
rpmlib(PayloadIsLzma) <= 4.4.6-1


Content of RPM :
/DBA/apache/modsecurity-crs/3.0.0
/DBA/apache/modsecurity-crs/3.0.0/crs-setup.conf.example
/DBA/apache/modsecurity-crs/3.0.0/documentation
/DBA/apache/modsecurity-crs/3.0.0/documentation/OWASP-CRS-Documentation
/DBA/apache/modsecurity-crs/3.0.0/documentation/README
/DBA/apache/modsecurity-crs/3.0.0/id_renumbering
/DBA/apache/modsecurity-crs/3.0.0/id_renumbering/IDNUMBERING
/DBA/apache/modsecurity-crs/3.0.0/id_renumbering/IdNumbering.csv
/DBA/apache/modsecurity-crs/3.0.0/id_renumbering/update.py
/DBA/apache/modsecurity-crs/3.0.0/rules
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-901-INITIALIZATION.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-910-IP-REPUTATION.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-912-DOS-PROTECTION.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-913-SCANNER-DETECTION.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-921-PROTOCOL-ATTACK.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/REQUEST-949-BLOCKING-EVALUATION.conf
/DBA/apache/modsecurity-crs/3.0.0/rules/RESPONSE-950-DATA-LEAKAGES.conf
There is 80 files more in these RPM.

 
ICM