WAF
Function Description
The waf plugin implements a ModSecurity-based rule protection engine, which can block suspicious requests based on user-defined rules, and supports OWASP CRS, providing basic protection features for the site.
Running Attributes
Plugin execution phase: authorization phase
Plugin execution priority: 330
Configuration Fields
Name | Data Type | Filling Requirements | Default Value | Description |
---|---|---|---|---|
useCRS | bool | Optional | false | Whether to enable OWASP CRS, for details refer to coreruleset |
secRules | array of string | Optional | - | User-defined WAF protection rules, syntax rules can refer to ModSecurity Chinese Manual |
Configuration Example
useCRS: truesecRules: - "SecDebugLogLevel 3" - "SecRuleEngine On" - "SecAction \"id:100,phase:1,pass\"" - "SecRule REQUEST_URI \"@streq /admin\" \"id:101,phase:1,t:lowercase,deny\"" - "SecRule REQUEST_BODY \"@rx maliciouspayload\" \"id:102,phase:2,t:lowercase,deny\""
Based on this configuration, the following requests will be prohibited from access:
curl http://example.com/admincurl http://example.com -d "maliciouspayload"