In the LSWS Web Admin console, there is a Web Application Firewall (WAF) section which allows you to enable ModSecurity and add a rule set on an LSWS native server. (For a control panel environment, these steps are unnecessary. Simply enable the ModSecurity rule set from the control panel, the same way you would enable a rule set for Apache. For more information on that, please see this wiki.)
Navigate to Server > Security
In the Web Application Firewall (WAF) section, you can choose whether to enable Request Content Deep Inspection. This feature is equivalent to Apache's ModSecurity, which can be used to detect and block requests with ill intention by matching them to known signatures.
There are many rule sets you can choose from, such as:
And others. LSWS is compatible with these rule sets, and you may choose your favorite. You may also define your own customized rules, if you are familiar with crafting ModSecurity rule sets.
Let's see how to enable a ModSecurity rule set, using Comodo as an example.
Comodo is a ModSecurity rule set created by the Comodo Team. It provides real-time protection for web apps running on LiteSpeed Web Server. Its functions include:
First, download Comodo rules that are compatible with Litespeed.
cd /usr/local/lsws/conf wget https://waf.comodo.com/api/cpanel_litespeed_vendor unzip cpanel_litespeed_vendor cd comodo_litespeed/ mv rules.conf.main rules.conf
This will download Comodo Litespeed rules, and move rules.conf.main
to rules.conf
. This is the master file including all rules. You can reference in the WebAdmin console for this master file.
Navigate to Configuration > Server > Security > WAF Rule Set
Click Add to edit the WAF Rule Set.
Comodo Litespeed
None
Yes
Include $SERVER_ROOT/conf/comodo_litespeed/rules.conf
Click Save to activate the rules.
You can include as many rule files as you like in the Rules Definition area.
The Comodo Rules.conf.main
file is a Comodo master file to include all rules in order. It the same as manually entering the following:
Include 00_Init_Initialization.conf Include 01_Init_AppsInitialization.conf Include 02_Global_Generic.conf Include 03_Global_Agents.conf Include 04_Global_Domains.conf Include 05_Global_Incoming.conf Include 06_Global_Backdoor.conf Include 07_XSS_XSS.conf Include 08_Global_Other.conf Include 09_Bruteforce_Bruteforce.conf Include 10_HTTP_HTTP.conf Include 11_HTTP_HTTPDoS.conf Include 12_HTTP_Protocol.conf Include 13_HTTP_Request.conf Include 14_Outgoing_FilterGen.conf Include 15_Outgoing_FilterASP.conf Include 16_Outgoing_FilterPHP.conf Include 17_Outgoing_FilterSQL.conf Include 18_Outgoing_FilterOther.conf Include 19_Outgoing_FilterInFrame.conf Include 20_Outgoing_FiltersEnd.conf Include 21_PHP_PHPGen.conf Include 22_SQL_SQLi.conf Include 23_ROR_RORGen.conf Include 24_Apps_Joomla.conf Include 25_Apps_JComponent.conf Include 26_Apps_WordPress.conf Include 27_Apps_WPPlugin.conf Include 28_Apps_WHMCS.conf Include 29_Apps_Drupal.conf Include 30_Apps_OtherApps.conf
If using some commercial rules set (like the Atomic rule set) or your own rules set, which does not have such a master file, you have two options:
If including multi-rul files for mod_security, the files must be included in the right order to make them work properly.
Navigate to Configuration > Server > Security > Web Application Firewall (WAF)
Yes
0
deny,log,status:403
Yes
(If set to Yes
will scan post request body)/tmp
Not Set
Not Set
$SERVER_ROOT/logs/security_audit.log
Click Save to enable the firewall, and perform a Graceful Restart.
To check CWAF for protection, send this request:
http://$server_domain/?a=b AND 1=1
If it's working, the server should respond with a 403 status code.
You can check that CWAF works properly by sending a GET or POST request parameter cwaf_test_request=a12875a9e62e1ecbcd1dded1879ab06949566276
Like this:
http://$server_domain/?cwaf_test_request=a12875a9e62e1ecbcd1dded1879ab06949566276
If the web server returns a 403 Forbidden status, then CWAF works fine.
The following test method for a command injection attack won't work due to the ModSecurity rule set change:
delete.php
file with following code: <?php print("Please specify the name of the file to delete"); print("<p>"); $file=$_GET['filename']; system("rm $file"); ?>
touch bob.txt
http://$server_domain/delete.php?filename=bob.txt;id
You will not get a 403 forbidden page if you test in this way. Please use other methods for testing.
In terms of how to test for command injection attack protection, you may need to consult the corresponding ModSecurity rules providers. As LiteSpeed is not a ModSecurity rule set provider, we are not in a position to provide such recommendations.