|
|
modsecurity原本是Apache上的一款开源waf,可以有效的增强web安全性,目前已经支持nginx和IIS,配合nginx的灵活和高效,可以打造成生产级的WAF,是保护和审核web安全的利器。
7 G u# w/ z" W+ _- h( o4 y6 g
# W3 M* ^2 k1 \$ W一.准备工作
1 z+ I7 }4 k0 j; _6 H! z F! \# f- ^3 e5 O
系统:centos 6.5 64位、 tengine 2.1.0, modsecurity 2.8.0* J1 b/ i0 t# P' ] ~* A
S; K) I% V, |) V" D! x
tengine : http://tengine.taobao.org/download/tengine-2.1.0.tar.gz/ x$ w# w( q" e ^' g/ A
* R' H: g. x# C; O/ P/ Tmodsecurity for Nginx: https://www.modsecurity.org/tarball/2.8.0/modsecurity-2.8.0.tar.gz
7 {3 W3 z# I5 w- ]7 D2 J- [2 Y
" I& E! c; }6 D* Y2 UOWASP规则集: https://github.com/SpiderLabs/owasp-modsecurity-crs
" [ N9 d+ a: K- p
: {' {! }% b+ G/ Z/ f+ j依赖关系:
2 ^- W3 S& y2 N+ m9 N+ u, {8 jtengine(nginx)依赖: pcre 、zlib、 openssl, 这三个包centos 6.5 系统源里都有:
" _; T5 _, k4 m e. ]. @2 H: m# E& o
yum install zlib zlib-devel openssl openssl-devel pcre pcre-devel
- _8 ~# ^; O; _% Q" n* D* qmodsecurty依赖的包:pcre httpd-devel libxml2 apr
* q% F% g, `' H' L3 F% g4 M7 n3 M# n& L* P5 X3 |% w: X
yum install httpd-devel apr apr-util-devel apr-devel pcre pcre-devel libxml2 libxml2-devel
- `: d4 c8 j4 ~7 J/ b二.启用standalone模块并编译
, v& B' { ]! r+ m, v) g
+ f( u: q) K3 ?. U. ~, d下载modsecurity for nginx 解压,进入解压后目录执行:( M: G8 @/ `) k+ d
' ]/ Q' K: ~$ H" E
./autogen.sh) C3 s* `4 N# U, Q! J$ Q3 y
./configure --enable-standalone-module --disable-mlogc
0 D5 m3 U0 N& v Y cmake
; ~5 Z+ ^& p+ }4 q7 y: p三.nginx添加modsecurity模块
3 e+ {- C# y1 p( d5 ~7 w6 t3 m6 K$ { R( }1 w1 i8 X+ {
在编译standalone后,nginx编译时可以通过"--add-module"添加modsecurity模块:
& `+ v6 m4 z( c( ]; e* C9 [2 t. A) M: C! y1 k; N
./configure --add-module=/root/modsecurity-2.8.0/nginx/modsecurity/ --prefix=/opt/tengine
/ B$ ^8 E8 ?/ ~# E0 L% R1 smake && make install: D7 s/ ]# M! ]
四.添加规则/ M+ j6 C7 Y2 ?* I6 J+ b: }; T
, T! z- e9 R2 u! s8 Q8 D
modsecurity倾向于过滤和阻止web危险,之所以强大就在于规则,OWASP提供的规则是于社区志愿者维护的,被称为核心规则CRS(corerules),规则可靠强大,当然也可以自定义规则来满足各种需求。
3 r8 |- P. S( ^( b1 E; |
2 m4 w f# T: _5 T. z1.下载OWASP规则:
/ E& b/ m% H. H- X0 M. V+ t& e" e
3 T2 {/ h7 X. L- E3 K4 Vgit clone https://github.com/SpiderLabs/owasp-modsecurity-crs; o5 e; w6 v' Q5 ]
0 W; I/ G1 X2 X: }/ t, D1 V, Pmv owasp-modsecurity-crs /opt/tengine/conf/! ^/ B( g& x, I
) P ^# Y# t2 P+ d
cd /opt/tengine/conf/owasp-modsecurity-crs && mv modsecurity_crs_10_setup.conf.example modsecurity_crs_10_setup.conf
* L$ f1 z1 o5 ]3 C, \2.启用OWASP规则:
( `5 k. K" S; c. N" ~& l) @ m8 i+ ?2 y) {! r. W
复制modsecurity源码目录下的modsecurity.conf-recommended和unicode.mapping到nginx的conf目录下,并将modsecurity.conf-recommended重新命名为modsecurity.conf。5 q9 y$ l0 S7 q* j% T
9 k- C3 t' M5 w2 _) z8 T: n6 P8 g7 d编辑modsecurity.conf 文件,将SecRuleEngine设置为 on0 i+ L6 |+ p! H m) @
6 @& x0 r$ Z1 _+ ~owasp-modsecurity-crs下有很多存放规则的文件夹,例如base_rules、experimental_rules、optional_rules、slr_rules,里面的规则按需要启用,需要启用的规则使用Include进来即可。 c' E* P+ ~# _1 L2 _
" U2 Z* `3 e3 J
Include owasp-modsecurity-crs/modsecurity_crs_10_setup.conf
k( x1 `8 M. O! CInclude owasp-modsecurity-crs/base_rules/modsecurity_crs_41_sql_injection_attacks.conf
. o* s( r5 i* ~) e, w1 i9 OInclude owasp-modsecurity-crs/base_rules/modsecurity_crs_41_xss_attacks.conf2 w0 E. z! x+ p4 L
Include owasp-modsecurity-crs/base_rules/modsecurity_crs_40_generic_attacks.conf
' I# U1 ?& n. RInclude owasp-modsecurity-crs/experimental_rules/modsecurity_crs_11_dos_protection.conf4 \+ v" E9 r' o6 V W+ k4 _
Include owasp-modsecurity-crs/experimental_rules/modsecurity_crs_11_brute_force.conf
1 C& j) |% b& M* H% }: yInclude owasp-modsecurity-crs/optional_rules/modsecurity_crs_16_session_hijacking.conf6 F e: _) f/ a
五.配置nginx
% }8 P0 J8 Q3 ?5 i! m" }: _& _" V
/ u* o$ W4 ?& t$ `8 t在需要启用modsecurity的主机的location下面加入下面两行即可:3 S+ ? n/ |+ _& a( n9 T+ L
{& \/ M2 F9 O0 t3 \- m* P
ModSecurityEnabled on;
( l% k* [( Q. s2 ]2 Q. GModSecurityConfig modsecurity.conf;# E4 c# R1 v/ T, {5 _- O
下面是两个示例配置,php虚拟主机:: w9 ?( Q! c& r1 c8 o7 _ k) F* ?
5 H f E1 h2 @4 c' L% vserver {/ c2 S- z' }/ u+ G4 E1 k
listen 80;5 J, k" A/ ~$ _% E6 E% H4 S
server_name 52os.net www.52os.net;4 I4 B! }- g, r( u+ T0 \; V5 W
4 |. F s0 s6 a7 _# d2 v location ~ \.php$ {5 h* H8 b( E9 z$ n( R
ModSecurityEnabled on; 3 M B5 q7 ?& H3 G( Y* E
ModSecurityConfig modsecurity.conf;
8 V4 e/ f) X, s* u7 L3 ?' `9 d2 d6 Z% I" p4 F1 v6 d& `) ?
root /web/wordpress;
4 Q: C0 ?1 Q4 M/ t. O4 P9 ` G index index.php index.html index.htm;
. e" c3 G+ t- r R8 E8 l + m; }7 j) ^/ j, E3 O5 R1 k
fastcgi_pass 127.0.0.1:9000;: U2 r9 l0 F. c# ]( N
fastcgi_index index.php;
" w: O0 |1 P% b. F9 j! Z1 w2 S fastcgi_param SCRIPT_FILENAME $Document_root$fastcgi_script_name;( X; m7 d8 h! \1 T
include fastcgi_params;& j& a2 S' Y- g# M- M, g: a7 Y
}
: P3 o& a5 {! t3 [4 q* i8 q } O8 a6 E5 z1 t+ T9 ^5 t. x
upstream负载均衡:+ q" P3 X0 k7 C# D$ V: v; x" `
: m% n$ E, d/ c+ e- a- {0 B: jupstream 52os.net {0 T" g5 _8 T2 N, g+ Y R
server 192.168.1.100:8080;' }$ Z9 f8 D9 z% w
server 192.168.1.101:8080 backup;& b" W/ y$ v9 [5 {! J
}+ f6 K$ t9 o! F. I7 C0 j) K8 S; w5 i
- v) D" W/ P& W. u Hserver {) \' i7 n8 `& Y" h
listen 80;1 e5 k+ I& M) h3 E9 g/ M- c$ q
server_name 52os.net www.52os.net;
9 C" \/ j$ q: U/ @* V) [
" p5 n( z6 |: tlocation / {$ C5 H' s( {0 \1 E5 c" @% P: F
ModSecurityEnabled on; : u% C, r5 L. Q* v8 [
ModSecurityConfig modsecurity.conf;
; V& X b3 @) z- ^+ V2 Z
2 `. k- L6 v6 l proxy_pass http://online;) a# t, h2 m& b2 L# j/ r) v/ O
proxy_redirect off;9 Z# ?" v7 w" {2 z/ O! B
proxy_set_header Host $host;6 Y1 I9 @2 M+ h1 [+ Z6 x1 H, {
proxy_set_header X-Real-IP $remote_addr;' j _- O% m: B7 t) V
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;, J. I' ]% H, p6 ^
}% }6 ]' V0 u( `: G- u# z+ S
}
& O/ j, `3 R: M8 h六.测试
- j" R1 ]- Y" Z& Y6 }
& A0 _" J; P# E我们启用了xss和sql注入的过滤,不正常的请求会直接返回403。以php环境为例,新建一个phpinfo.php内容为:2 {+ a& z- Y& Z& c" t$ X$ |
4 |5 F" c* O: v4 M& [5 G/ U
<?php6 f2 A9 T, u& a1 a
phpinfo();
6 j# G! @0 z& m- L$ v5 U0 N?>
: \& a+ f' {* l$ l0 @1 j( U在浏览器中访问:% W7 B6 _" T2 r
Z9 p' _ W: F, l, x7 U! H2 X
http://www.52os.net/phpinfo.php?id=1 正常显示。
2 D# b$ J2 i% _http://www.52os.net/phpinfo.php?id=1 and 1=1 返回403。
4 ]: l9 }& V5 w" L: bhttp://www.52os.net/phpinfo.php?search=<scritp>alert('xss');</script> 返回403。' _6 e e) z- e" P9 s6 Y3 d7 ]+ g q
说明sql注入和xss已经被过滤了
" b- R2 }* F4 m
2 y p, P& x1 ]* a' F七、安装过程中排错1 g0 L- I0 J; Q8 l2 o" i" q
' m, n: w2 z3 E" p% l2 n1.缺少APXS会报错+ a6 M; a: e `- a* `( n6 a
9 e, P+ {3 c, x2 q8 `, A6 K( ~9 Vconfigure: looking for Apache module support via DSO through APXS
- t/ b. G8 D* Q# [: mconfigure: error: couldn't find APXS
$ K' N" s( a, K# l/ X+ }apxs是一个为Apache HTTP服务器编译和安装扩展模块的工具,用于编译一个或多个源程序或目标代码文件为动态共享对象。
9 |. {: D3 g" i/ P7 [6 \解决方法:
9 s4 E& r) A/ w% f) E+ j( B4 Y: _% z
yum install httpd-devel
6 ~9 E v0 P1 _: `1 r- ]% p% V+ `2.没有pcre. W8 n; R2 \4 j) A: m
* l) R4 F- `- W, V4 ^2 q, ` z qconfigure: *** pcre library not found.! a% p! ?, N3 l& s
configure: error: pcre library is required3 f6 f i5 Y" \5 M( U& ^
解决方法:
+ m( d- I* x9 F2 _
1 z$ T x: h, h( k' e1 O- Vyum install pcre pcre-devel( v7 X7 e$ b- e& f& {- z
3.没有libxml20 d4 o7 W$ I- j8 z1 K0 g" D
; l# S3 }2 z/ `. `( c8 ?0 c' V
$ I. M2 Z. ^4 zconfigure: *** xml library not found.
E% D( y9 f* h, _configure: error: libxml2 is required/ u2 i, M% F3 P+ F
解决方法:6 S6 Y& |2 w) Q) t
0 {3 p5 R& S# E. Oyum install libxml2 libxml2-devel
9 T- D1 \2 [) ^4.执行 /opt/tengine/sbin/nginx -m 时有警告
5 r j* s8 z& I" u0 }& e4 \9 P0 I. b* {& j
Tengine version: Tengine/2.1.0 (nginx/1.6.2)
& ^1 z& i- R8 q' x, o5 i& Snginx: [warn] ModSecurity: Loaded APR do not match with compiled!" @6 Y6 ]2 J4 D% a
原因:modsecurity编译时和加载时的apr版本不一致造成的,并且会有以下error.log
2 v5 u1 M* f/ G0 a* A$ W! I4 S8 c( E. m4 ^
2015/01/26 02:04:18 [notice] 29036#0: ModSecurity for nginx (STABLE)/2.8.0 () configured.1 k, W6 n3 ~' \# D% _! s, @2 Y
2015/01/26 02:04:18 [notice] 29036#0: ModSecurity: APR compiled version="1.5.0"; loaded version="1.3.9"+ e+ l# C; `; N$ e y- f
2015/01/26 02:04:18 [warn] 29036#0: ModSecurity: Loaded APR do not match with compiled!
2 r- ]0 }& ?" k% q2015/01/26 02:04:18 [notice] 29036#0: ModSecurity: PCRE compiled version="7.8 "; loaded version="7.8 2008-09-05") Y7 ?/ {+ c; s3 m' H
2015/01/26 02:04:18 [notice] 29036#0: ModSecurity: LIBXML compiled version="2.7.6"* E$ N; g5 B9 e0 x, s) j$ m
2015/01/26 02:04:18 [notice] 29036#0: Status engine is currently disabled, enable it by set SecStatusEngine to On./ o# M2 P- o( G
解决方法,移除低版本的APR (1.3.9)6 w& P& E+ ^2 P- I
4 H* Q6 y5 N j& [: J8 w
yum remove apr
5 V; T) I8 ]+ D+ e3 `& o5.Error.log中有: Audit log: Failed to lock global mutex/ N! q4 v8 F# W
/ h8 v' [6 z2 L: T! ]& A- h2015/01/26 04:15:42 [error] 61610#0: [client 10.11.15.161] ModSecurity: Audit log: Failed to lock
6 `4 \/ W3 k8 H* s0 Y F6 ~. Dglobal mutex: Permission denied [hostname ""] [uri "/i.php"] [unique_id "AcAcAcAcAcAcAcA4DcA7AcAc"]
, Z( o( l( ]3 u解决方法:& W) i$ i& l/ L2 U& g& }
编辑modsecurity.conf,注释掉默认的SecAuditLogType和SecAuditLog,添加以下内容:
7 ?8 v" U3 `4 g3 ~: t g9 O# k5 K; }4 j0 g3 N& L
SecAuditLogDirMode 0777
1 P) a; s) `0 I7 ^+ iSecAuditLogFileMode 05507 y4 u- B6 L3 s2 f# P7 N) w
SecAuditLogStorageDir /var/log/modsecurity
' W( l: a3 K5 F- r# [ P; fSecAuditLogType Concurrent0 M: g- O/ ~. H0 C/ q \1 ?
参考文章:
8 L! [4 p* w/ `& thttps://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#Installation_for_NGINX
. J+ p+ P, G$ Z$ a" I. @' T" E6 nhttp://drops.wooyun.org/tips/2614 |
|