Aum configuration
Ruleset Settings
These allow you to enable/disable entire Rulesets and classes of rules. If you want to configure a specific rule, use the ASL Rule Manager.
Crawler Protector
This unique feature of ASL and our modsecurity rules protects not only your system, but also your search engine rankings. Unlike other security products, this automatically and securely detects real search engine crawlers and prevents modsecurity from accidentally blocking them (ASL will also prevent firewall rules from blocking search engines). It can also detect when attackers are trying to pretend to be search engines, in hopes of getting around your security systems, and can safely block them, without blocking the real crawlers!
MODSEC_00_SEARCHENGINE
Bogus Search Engine Ruleset
This ruleset will detect search engine crawlers, as well as attackers pretending to be search engine crawlers. It can securely determine if a bot is legitimate, or a forgery.
Default: disabled
Note: You should only use this ruleset if the server has a local DNS resolver server installed on the server itself. You can use a remote resolver, but a local resolver will be faster and more reliable, and a remote resolver will slow down your web server if these rules are enabled.
These rules require a locally installed DNS server for maximum performance. It is not recommended you enable these rules without a local DNS server installed on this server. (If you do not know if you have a DNS server installed on this server, do not enable these rules). Apache must also be configured with "HostnameLookups Double". ASL will automatically configure HostnameLookups Double.
MODSEC_00_AUTOWHITELIST_SEARCHENGINE
Autowhitelist Search Engine Ruleset
This ruleset will automatically, and securely, whitelist search engine crawlers to prevent them from being blocked accidentally. This will protect your page rank with search engine crawlers.
NOTE: This ruleset requires the MODSEC_00_SEARCENGINE setting to be enabled for this to work.
Default: disabled
Warning: You should only use this ruleset if the server has a fast local DNS resolver server installed on the server itself.
MODSEC_00_WHITELIST
Whitelist Ruleset
Enable/Disable application of the whitelist for the WAF.
By default whitelisting does not apply to the WAF.
Note: enabling this will bypass *ALL* security checks for hosts on the whitelist for the WAF.
Default: off
By default, this is not enabled. We dont recommend you you use this unless you know you can completely and totally trust every host on your whitelist every time. Most users will not need to enable this.
Warning: We do not recommend you include your servers IP on this whitelist if you have a shared hosting server. Whitelisting localhost (127.0.0.1) and your local servers IP(s) from the WAF will means that local users can launch attacks against the server and against other domains on the server which will be neither detected nor prevented. If you have a rule that is being triggered by a local script, please report it as a false positive if it is a false positive, and if not, this may be an actual attack on your system or a poorly developed application. If you have a false positive from a whitelisted IP, please report it to us. Whitelisting in general is extremely dangerous and attackers know that users do this, which is why they target desktops and other trusted systems. If they can get access to these trusted systems, they can usually gain unfetered access to everything that users desktop, mobile device, laptop or other trusted system can access.
MODSEC_00_ANTIEVASION
Antievasion Ruleset
Enable/Disable the antievasion rule class. This ruleset prevents attacks that try to bypass the WAF itself.
MODSEC_00_STRICT
Strict Multiform Ruleset
Enable/Disable the strict multiform checks rule class. This ruleset enforces strict adherence RFCs for multiform messages. This prevents advanced attacks that may try to bypass the WAF. Note: Broken applications and clients that do not adhere to RFCs will not be able to send multiform to the system if you enable this. This not a false positive, these clients and applications are broken. If you are unfortunately stuck with these, you will have to disable this.
MODSEC_00_RBL
RBL Ruleset
Enable/Disable Real-time Black List (RBL) rule class. Currently this uses the Spamhaus XBL which is operated by the Spamhaus project. This RBL is not operated or controlled by Atomicorp. Please contact Spamhaus if you have issues with the IPs on this RBL, or disable this option.
Default: off
Warning: You should only use this ruleset if the server has a really fast DNS server installed on the server itself.
This ruleset will look up every request in the DNS to see if its on a blacklist, and will not finish serving the request until the DNS server responds. This can slow down requests if the DNS server is slow. Basically, web requests will move at the speed of the DNS servers replies.
If your web server is responding slowly to requests, and you have this ruleset enabled your DNS server is too slow to meet your lookup needs. You will need to either disable this ruleset, or tune your DNS server to respond to queries more quickly.
MODSEC_00_AE_RULES
Anti-Evasion Protection system
Antievasion Ruleset/MODSEC_00_ANTIEVASION: Enable/Disable the antievasion rule class. This ruleset prevents attacks that try to bypass the WAF itself.
MODSEC_01_RULES
Advanced Antievasion Ruleset
Enable/Disable the advanced antievasion protection rule class. This ruleset prevents attacks that try to bypass the WAF itself or can be used to trick applications into parsing data in ways that may compromise the application.
MODSEC_01_APP_RULES
This is a special ruleset that most users will never need. Please see this article to see if this ruleset applies to you:
WAF_rule_families#01_asl_rules_special.conf
Default:no
Note: Do not enable this ruleset unless you know what you are doing.
MODSEC_01_DOMAIN_BLOCKS
MODSEC_01_DOMAIN_BLOCKS
Enable/Disable user defined custom domain blocking class. This ruleset blocks connections from a user defined list of domains. This allows you to block hosts based on their DNS names.
[Default: no]
Note: Available in ASL 4.0.1 and up. This works by comparing the forward and reverse DNS records, if they do not match the rule will not match.
MODSEC_03_DOS
Denial of Service Protection
Enable/Disable the Denial of Services protection rule class. This ruleset prevents the so-called "slowaris" Denial of Service attacks, as well as "fast" DOS attacks. DDOS attacks can not be mitigated on the host itself.
Note: Some fastcgi implementations, specifically cpanel, require this to be disabled.
MODSEC_10_ANTIMALWARE
Anti-Malware Ruleset
Enable/Disable the anti-malware rule class. This will look at any requests to the system for known malware domains and indicators of malware injection requests (this does not do the same thing as the MODSEC_99_SCANNER class, which will inspect uploads for malware).
MODSEC_10_RULES
Generic Attack Ruleset
Enable/Disable the core rule class. This class contains the core generic rules, which will look for things like SQLi, XSS, CSRF, recursion, code injection, command injection, XML attacks and other generic attack patterns. You should always leave this class enabled.
MODSEC_11_ADV_RULES
Advanced Attack Ruleset
Enable/Disable the advanced protection rule class. This class contains advanced rules.
MODSEC_11_DLP
Data Loss Protection Ruleset
Enable/Disable the data loss protection rule class. This will detect certain Data Loss events, such as credit card information being sent or errors messages from applications that may reveal sensitive information or that the system or application is vulnerable to particular attack.
MODSEC_12_BRUTE
Brute Force Protection Ruleset
Enable/Disable the web brute force attack protection rule class. Detects attempts to brute force web applications authentication mechanisms.
This ruleset can not block repeated login failures without the use of ASL. ASL will intelligently and safely identify actual brute force and slow authentication failures.
Note: This works by analysing the output of the web application, and does not rely on log analysis or htaccess files. Therefore, do not use application internal compression schemes on output. For example, do not enable GZIP compression in applications such as Joomla, PHPBB, Wordpress and others, as this will make it difficult for the WAF to see the output. You can still compress the output if you use an apache module such as mod_deflate, which accomplishes the same thing and is less CPU intensive that application internal compression. Litespeed does not currently support this ruleset. If you require this protection with Litespeed, you must use ASL and configure ASL to setup a local WAF, via ASL, in front of Litespeed.
Discussion:
For the WAF to be able to analyze out from web applications, the WAF must be able to understand the output from the web application. Applications that compress output send this compressed output to Apache, which creates a situation where the WAF will only see compressed content. In this case, the WAF will not be able to understand it because the WAF will not decompress it.
Whereas it is possible for the WAF to decompress this content, and then recompress it, this is extremely wasteful for the CPU and will unnecessarily slow the system down. Essentially the web server would be compressing the content, decompressing it, and then compressing it again. Add in two unnecessary steps, and tripling the work load. The most efficient solution is to not compress output in the application, let the WAF inspect it, and then let apache compress it.
Inline decompression with the WAF is no longer supported and has been removed from the WAF code as this leads to poor performance due to misconfiguration of the system.
MODSEC_20_USERAGENTS
Malicious Useragents Ruleset
Enable/Disable the useragents rule class. Detects known malicious or suspicious user agents.
MODSEC_30_ANTISPAM
Anti-Spam Ruleset
Enable/Disable the anti-spam rule class. This class contains tuned antispam rules, designed to work with all known blogs, forums, guestbooks, CMS' and other web content management systems that allow users to post content.
MODSEC_31_ANTISPAM_URI
Anti-Spam URI RBL Ruleset
Enable/Disable the anti-spam URI rule class. Looks up all URIs in a post against RBLs to see if its a known spam domain. As with the MODSEC_00_RBL rules, these should only be used if the server has a local fast DNS server.
Warning: You should only use this ruleset if the ASL server has a really fast DNS server installed on the ASL server.
This ruleset will look up every request in the DNS to see if its on a blacklist, and will not finish serving the request until the DNS server responds. This can slow down requests if the DNS server is slow. Basically, web requests will move at the speed of the DNS servers replies.
If your web server is responding slowly to requests, and you have this ruleset enabled your DNS server is too slow to meet your lookup needs. You will need to either disable this ruleset, or tune your DNS server to respond to queries more quickly.
MODSEC_50_ROOTKITS
Rootkit Detection Ruleset
Enable/Disable the rootkit rule class. This class detects and blocks known rootkits, PHP/ASP/PERL shells, spam tools and other malicious web applications from running on the system. (These rules exist for cases where malicious software may already be installed on the system, this is a defense in depth rule set)
MODSEC_60_RECONS
Reconnaissance Attacks Ruleset
Enable/Disable the recon rule class. This class blocks known "google hacks" or webserver probes that look for vulnerable applications and signs of compromised systems running unauthorized shells, or unprotected applications that allow uploads which would give an attacker access to the system.
MODSEC_61_DLP
Data Leak Prevention Ruleset
Enable/Disable the data loss protection class. These rules detect Data Loss Search engine "hacks". These are search engine probes for sensitive files, often used by malicious parties to find sensitive information accidentally exposed on web servers.
MODSEC_99_JITP
Just In Time Patches
Enable/Disable the Just In Time Patches(JITP) rule class. Just in Time Patches. We publish JITPs daily if there is a new web application vulnerability that the 10_asl_rules.conf do not protect the system against. These are tuned rules for specific vulnerabilities in a web application.
MODSEC_99_REDACTOR
Malicious Output Removal Ruleset
Enable/Disable the automatic malicious/hidden iframe and malware removal rule class. Automatically removes malicious code from web pages, such as hidden iframes, encoded javascript and other malicious code.
MODSEC_99_MALWARE_OUTPUT
Malicious Output Detector
Enable/Disable the malware output rule class.
MODSEC_99_SCANNER
Web Malware Upload Scanner
Malicious code upload scanner. Enable this to scan web uploads for malicious code.