Mod Security Intro
Mod Security Intro
Ivan Ristic
Chief Evangelist
Breach Security
1/30
Introduction
Breach Security
Global headquarters in
Carlsbad, California
Web application security
provider for over six
years
Led by experienced
security executives
Trusted by large
enterprise customers
3/30
Part 1
What are Web Application Firewalls?
4/30
Problems with Web Applications
6/30
Why Use Web Application Firewalls?
7/30
Network Firewalls Do Not Work
Firewall
Application
Web Web Database
Client Server Application
Server
Neither do IDS/IPS
solutions.
8/30
WAF Identity Problem: Naming
9/30
WAF Identity Problem: Purpose
10/30
WAFEC
12/30
What is ModSecurity?
13/30
History of ModSecurity
15/30
Deployment Architectures
16/30
Use Cases
17/30
Security Models
1. Negative security
Easy to get started.
Trying to detect attacks.
Can be written by hand.
2. Positive security
1. Must be tailored per application.
2. But it only needs to determine what constitutes
valid data.
3. Virtual patches can be written by hand as they
are simple. Automated learning required
in all other cases.
18/30
ModSecurity Philosophy
Different operator:
SecRule ARGS "@verifyByteRange 10,13,32-126"
Interesting:
SecRule REMOTE_ADDR "@rbl sc.surbl.org"
22/30
Real-life Example
23/30
Status
24/30
Part 3
Projects related to ModSecurity
25/30
ModSecurity Core Rules
Coherent set of rules designed to detect
generic web application security attacks.
Bundled with ModSecurity, but
with a separate release cycle.
Lead by Ofer Shezaf.
Design goals:
Performance. Automated updates
starting with
Quality. ModSecurity 2.5.
Stability.
Plug and Play.
26/30
ModSecurity Community Console
27/30
REMO
A project to build a graphical rule editor for
ModSecurity with a positive / whitelist
approach.
REMO stands for
Rule Editor for
ModSecurity.
Community
project run by
Christian Folini.
28/30
Distributed Open Proxy Honeypots
29/30
Questions?
Thank you!
Ivan Ristic
[email protected]
30/30