CentOS 8 安装Nginx和ModSecurity反向代理测试WAF

本文介绍如何通过安装和配置ModSecurity模块来增强Nginx的安全防护能力,包括设置规则引擎、导入OWASP核心规则集、重启Nginx服务及验证防护效果。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

dnf install -y https://repo.aerisnetwork.com/pub/aeris-release-8.rpm
yum install nginx-more
yum install libmodsecurity
yum install nginx-more-module-modsecurity

cd /tmp
git clone https://github.com/SpiderLabs/ModSecurity 
cd ModSecurity 
mkdir -p /etc/nginx/modsec
cp unicode.mapping /etc/nginx/modsec/
cp modsecurity.conf-recommended /etc/nginx/modsec/modsecurity.conf

vi /etc/nginx/modsec/modsecurity.conf
SecRuleEngine On

vi /etc/nginx/modsec/main.conf
Include "/etc/nginx/modsec/modsecurity.conf"
Include "/etc/nginx/modsec/crs/crs-setup.conf"
Include "/etc/nginx/modsec/crs/rules/*.conf"

vi /etc/nginx/nginx.conf

server {
        modsecurity on;
        modsecurity_rules_file /etc/nginx/modsec/main.conf;
        location / {
            proxy_pass http://192.168.174.1/;
            sub_filter my your;
            sub_filter_once off;
            sub_filter_types *;

            }
        }


cd /tmp
wget https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.2.0.tar.gz
tar -zxvf v3.2.0.tar.gz
cd owasp-modsecurity-crs-3.2.0
mkdir -p /etc/nginx/modsec/crs
cp crs-setup.conf.example  /etc/nginx/modsec/crs/crs-setup.conf
cd rules
mkdir -p /etc/nginx/modsec/crs/rules/
cp * /etc/nginx/modsec/crs/rules/
systemctl restart nginx
curl localhost/index.html?exec=/bin/bash
cd /var/log
more modsec_audit.log

# more modsec_audit.log
---qR5tEZ3Z---A--
[02/Aug/2020:07:42:52 +0800] 159632537210.626465 127.0.0.1 39492 127.0.0.1 80
---qR5tEZ3Z---B--
GET /index.html?exec=/bin/bash HTTP/1.1
Host: localhost
User-Agent: curl/7.61.1
Accept: */*

---qR5tEZ3Z---D--

---qR5tEZ3Z---E--
<html>\x0d\x0a<head><title>403 Forbidden</title></head>\x0d\x0a<body>\x0d\x0a<center><h1>403 Forbidden</h1></center>\x0d\x0a<hr><center>nginx</center>\x0d\x0a</body>\x0
d\x0a</html>

Rebuild started: Project: Project *** Using Compiler &#39;V6.22&#39;, folder: &#39;E:\Keil_v5\ARM\ARMCLANG\Bin&#39; Rebuild target &#39;Target 1&#39; assembling startup_stm32f10x_md.s... Start/core_cm3.c(445): error: non-ASM statement in naked function is not supported 445 | uint32_t result=0; | ^ Start/core_cm3.c(442): note: attribute is here 442 | uint32_t __get_PSP(void) __attribute__( ( naked ) ); | ^ Start/core_cm3.c(465): error: parameter references not allowed in naked functions 465 | "BX lr \n\t" : : "r" (topOfProcStack) ); | ^ Start/core_cm3.c(461): note: attribute is here 461 | void __set_PSP(uint32_t topOfProcStack) __attribute__( ( naked ) ); | ^ Start/core_cm3.c(479): error: non-ASM statement in naked function is not supported 479 | uint32_t result=0; | ^ Start/core_cm3.c(476): note: attribute is here 476 | uint32_t __get_MSP(void) __attribute__( ( naked ) ); | ^ Start/core_cm3.c(499): error: parameter references not allowed in naked functions 499 | "BX lr \n\t" : : "r" (topOfMainStack) ); | ^ Start/core_cm3.c(495): note: attribute is here 495 | void __set_MSP(uint32_t topOfMainStack) __attribute__( ( naked ) ); | ^ 4 errors generated. compiling core_cm3.c... compiling misc.c... compiling system_stm32f10x.c... compiling stm32f10x_adc.c... compiling stm32f10x_dac.c... compiling stm32f10x_exti.c... compiling stm32f10x_dbgmcu.c... compiling stm32f10x_dma.c... compiling stm32f10x_crc.c... compiling stm32f10x_cec.c... compiling stm32f10x_bkp.c... compiling stm32f10x_can.c... compiling stm32f10x_flash.c... compiling stm32f10x_pwr.c... compiling stm32f10x_fsmc.c... compiling stm32f10x_
03-31
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值