12/23/2017

Lighttpd Mod_sec

46
Lighttpd Mod_fastcgiLighttpd Mod_fastcgi

In most large enterprises there is a requirement to comply with various standards. The hot potato in the Ecommerce space at the moment (and has been for a few years!) is PCI-DSS. Diablo 2 Expansion Disc Iso Torrent. At $WORK we have to comply with PCI-DSS with the full audit and similar occurring due to the number of transactions we perform. Recently we’ve deployed lighttpd for one of our platforms, which has caused an issue for our Information Security Officers and Compliance staff. PCI-DSS 6.6 requires EITHER a Code review to be preformed, which whilst this may seem to be an easy task, when you’re talking about complex enterprise applications following a very agile development process it’s not always an option. The other option is to use a WAF (Web Application Firewall).

How to Monitor Lighttpd. $ sudo apt-get install apachetop $ sudo lighty-enable-mod accesslog $ sudo /etc/init.d/lighttpd force. ( 82. Dapayk Padberg Black Beauty Rar there. 5/sec ) 1149. I have set up lighttpd with mod_websocket as discussed in Dom Bramley's blog entry (except that I am using a BeagleBone Black with Debian Wheezy instead of an rPi.

Now there are multiple products available that sit upstream and perform this task. There is however an issue if you use SSL for your traffic. Most WAF will not do the SSL decryption / reencryption between the client and server (effectively becoming a Man in the Middle). There are however a few products which do this, F5 networks’ ASM being one that springs to mind.

Unfortunately this isn’t always an option due to licensing fees and similar. An alternative is to run a WAF on the server its self. A common module for this is Mod_Security for Apache. Unfortunately, a similar module does not exist for Lighttpd. In response to $WORKs requirement for this I’ve used mod_magnet to run a small lua script to emulate the functionality of mod_security (to an extent at least!). Please note that mod_magent is blocking, so will cause any requests to be blocked until the mod_magnet script has completed, so be very careful with the script, and ensure that it’s not causing any lag in a test environment, prior to deploying into live!

Below is a copy of an early version of the script (most of the mod_security rules that we have are specific to work, so are not being included for various reasons), however I’ll post updates to this soon. Mod_security alike in LUA for mod_magnet LOG = true DROP = true function returnError(e) if (lighty.env['request.remote-ip']) then remoteip = lighty.env['request.remote-ip'] else remoteip = 'UNKNOWN_IP' end if (LOG == true) then print ( remoteip. ' blocked due to '.

Lighttpd Fast and Secure Web Server The Lighttpd web server, also oddly called 'lighty' by the author, is an excellent tool for small to medium sized web sites. The server is a great way to off load static content like pictures or binary downloads from an overloaded Apache server and it is perfect for small home web servers or corporate LAN. It is incredibly fast serving out pages under load and very easy to setup. Lighttpd is more configurable than and significantly more efficient than the resource hungry Apache web server, running faster on the same hardware while using less than 1/10th the resources. Lighttpd is a fast, secure and efficient web server. Security, speed, compliance, and flexibility -- all of these describe lighttpd (pron. Lighty) which is rapidly redefining efficiency of a web server; as it is designed and optimized for high performance environments.

limieagle – 2018