lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 18 Oct 2003 23:40:07 +0100
From: Ivan Ristic <ivanr@...kreator.com>
To: bugtraq@...urityfocus.com
Subject: [ANNOUNCE] mod_security 1.7 released



Mod_security 1.7 has been released. It is immediately available for
download from:

    http://www.modsecurity.org/download/

This release contains major new functionality, see changes below for
more details.

About mod_security
------------------
Mod_security is an Apache module whose purpose is to protect
vulnerable applications and reject human or automated attacks.
It is an open source intrusion detection and prevention system
for Apache. In addition to request filtering, it also creates Web
application audit logs. Requests are filtered using regular
expressions. Some of the things possible are:

  * Apply filters against any part of the request (URI,
    headers, either GET or POST)
  * Apply filters against individual parameters
  * Reject SQL injection attacks
  * Reject Cross site scripting attacks

With few general rules mod_security can protect from both
known and unknown vulnerabilities.

Changes (v1.7)
--------------

  * Output filtering has been added to Apache 2.x.

  * The ability to filter cookies directly has been added.

  * Apache can now pretend to be some other Web server through
    the SecServerSignature directive.

  * Three new actions: "allow" to finish filter processing and let
    the request through, "chain" to chain several filter together
    (logical AND), and "skipnext" to skip over filters.

  * A new anti-evasion technique to fight null-byte attacks.

  * Finally, the module now runs on Netware.







Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ