You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After giving a Developer Presentation on ModSecurity, we got a question about how do we compensate for a security rule that was disabled i.e. how do we test for HTTP Smuggling attacks now that we've disabled it on the firewall.
I believe it's best to re-enable this but fine tune it. This is because HTTP Smuggling attack protection isn't built into Rails. I think puma has it but i'll need to do further digging into that.
CCCD uses Unicorn (web server). I can't seem to find Unicorn in the Snyk database :/ but i do see stuff around https://yhbt.net/unicorn.git/ . I've emailed Unicorn [email protected] to ask them if they protect against http smuggling attacks by default.
However, we do have HTTP 2 set on the nginx server which provides some level of protection (more info here).
We can turn the rule back on in the firewall and then fine tune it to allow specific types of sentences with regex.
ATM, i want to try and POC a way to alert us on slack when modsecurity has matched on data relating to a http smuggling attack. This means we'll be alerted of false positives, if any.
After giving a Developer Presentation on ModSecurity, we got a question about how do we compensate for a security rule that was disabled i.e. how do we test for
HTTP Smuggling attacks
now that we've disabled it on the firewall.Extra: There was also a question of if we needed to disable the rule and instead can we fine tune it further?
The text was updated successfully, but these errors were encountered: