/forbidden/403.php Copy to clipboard
Tiki: Error 403
Oops, sorry!
Your request got filtered out due to possible security issues.
1. You tried to access a page you are not allowed to.
or
2. One or more things in your request were suspicious (defective request header, invalid cookies, bad parameters, ...).
If you think you did nothing wrong
- try again with a different browser
- avoid any evil characters inside the request url
Your request was:
Your post data were:
$v) print( "".htmlspecialchars($key)." " );
?>
All set up. Now test your config and then tell apache to reload config.
phpinfo() should tell you that mod_security is enabled and a new logfile should be available: /var/log/apache2/modsec_audit.log
Example error log entry of a blocked 'bad robot':
Copy to clipboard --25f26844-A--
[03/Nov/2011:12:25:35 +0100] TrJ6LLwoNcsAABrw@7wAAAAh 41.82.184.111 2521 188.40.53.203 80
--25f26844-B--
GET / HTTP/1.1
Accept: text/html
Cache-Control: no-cache, no-cache
Proxy-Connection: Keep-Alive
User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows NT; DigExt; DTS Agent
Pragma: no-cache
Connection: close
Host: tiki.org
--25f26844-F--
HTTP/1.1 403 Forbidden
Vary: Accept-Encoding
Content-Length: 1677
Connection: close
Content-Type: text/html; charset=utf-8
--25f26844-H--
Message: Access denied with code 403 (phase 2). [file "modsecurity_crs_35_bad_robots.conf"] [line "27"] [id "990012"] [rev "2.2.2"] [msg "Rogue web site crawler"] [data "DTS Agent"] [severity "WARNING"] [tag "AUTOMATION/MALICIOUS"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
Action: Intercepted (phase 2)
Stopwatch: 1320319532916353 2998180 (- - -)
Stopwatch2: 1320319532916353 2998180; combined=710, p1=232, p2=443, p3=0, p4=0, p5=34, sr=48, sw=1, l=0, gc=0
Producer: ModSecurity for Apache/2.6.2 (http://www.modsecurity.org/); core ruleset/2.2.2.
Server: Apache/2.2.9
--25f26844-Z--
Now let it run for some time and then check for false positives. If you found one, grab the rule id from the log (here it is: id "990012") and the filename of the rule file: file %22modsecurity_crs_35_bad_robots.conf%22. Go to the rulefile and adjust the rule to exclude the false positive or disable the rule completely by commenting it out with a leading # character.
If you think the rules are good, adjust /etc/apache2/mod_security/modsecurity_crs_10_config.conf from
Copy to clipboard SecRuleEngine DetectionOnly
to
Copy to clipboard SecRuleEngine On
and let apache reload the configuration:
Copy to clipboard /etc/init.d/apache2 reload
related pages
Security Admin
Advanced Settings
external links
aliases for this page
mod security | mod_security
|