Hello, I'm trying out Litespeed web server and noticed a couple of strange things.
Some preliminary info:
- I am getting the same results with the standard and enterprise editions, v3.3.4. Running on Debian Etch i386.
- All the settings are entered through the web interface. No httpd.conf or .htaccess
- I have logging set on INFO
- The request filter has been activated for POST payload scanning too, logging is on at level 9, my default action is deny,log,status:403
Here are my issues:
1) Let's say I want to deny access when a POST request is made and the parameter foo contains the value bar.
To test if the rules are working I am sending a POST request with something like:
foo=ABCbarABC
I could only obtain the desired behaviour with a rule like this:
SecFilterSelective ARGS "foo=.*bar.*"
Is this the only way to achieve the desired result?
I tried to use something like:
SecFilterSelective ARG_foo "bar"
but it doesn't work.
Is it to be expected?
2) Strangely enough if I use some nonsense like this:
SecFilterSelective ARG_foo "bar"
SecFilterSelective HTTP_foo "bar"
or
SecFilterSelective ENV_foo "bar"
SecFilterSelective HTTP_foo "bar"
it works fine. And if I change the order, putting the HTTP_foo line at the top, it works no more.
May this be a bug?
3) When the request filter blocks access I can't see anything in the vhost or server error.log, what am I doing wrong? This issue happens also with "SecFilterSelective REQUEST_URI" rules. Setting status:404 doesn't help.
4) The POST_PAYLOAD location doesn't seem to be implemented, am I right?
Edit: 5) Moreover, no matter what I try I can't get the request filter to process cookies. If anybody has any suggestions that would really help, thanks.
I hope you can shed some light on the above issues, thanks!
-Mark
Some preliminary info:
- I am getting the same results with the standard and enterprise editions, v3.3.4. Running on Debian Etch i386.
- All the settings are entered through the web interface. No httpd.conf or .htaccess
- I have logging set on INFO
- The request filter has been activated for POST payload scanning too, logging is on at level 9, my default action is deny,log,status:403
Here are my issues:
1) Let's say I want to deny access when a POST request is made and the parameter foo contains the value bar.
To test if the rules are working I am sending a POST request with something like:
foo=ABCbarABC
I could only obtain the desired behaviour with a rule like this:
SecFilterSelective ARGS "foo=.*bar.*"
Is this the only way to achieve the desired result?
I tried to use something like:
SecFilterSelective ARG_foo "bar"
but it doesn't work.
Is it to be expected?
2) Strangely enough if I use some nonsense like this:
SecFilterSelective ARG_foo "bar"
SecFilterSelective HTTP_foo "bar"
or
SecFilterSelective ENV_foo "bar"
SecFilterSelective HTTP_foo "bar"
it works fine. And if I change the order, putting the HTTP_foo line at the top, it works no more.
May this be a bug?
3) When the request filter blocks access I can't see anything in the vhost or server error.log, what am I doing wrong? This issue happens also with "SecFilterSelective REQUEST_URI" rules. Setting status:404 doesn't help.
4) The POST_PAYLOAD location doesn't seem to be implemented, am I right?
Edit: 5) Moreover, no matter what I try I can't get the request filter to process cookies. If anybody has any suggestions that would really help, thanks.
I hope you can shed some light on the above issues, thanks!
-Mark
Last edited: