Open GoogleCodeExporter opened 9 years ago
Hey mex :)
I'm not 100% sure I understood you, but you could give a try to post action.
It's something that is called upon request completion (and naxsi already uses
that in learning mode), like :
location /Denied {
proxy_pass http://your_server_that_returns_stuff:8080;
post_action /NxIntercept;
}
location /NxIntercept {
proxy_pass http://nx_intercept:8080;
}
But please remind, we are going to kill nx_intercept/live learning !
If you have a problem with that (killing live learning), please let me know ;)
Original comment by ori...@gmail.com
on 13 Mar 2013 at 8:54
either this or
location /RequestDenied {
proxy_pass http://nx_intercept:8080;
}
in in naxsi-ui.conf
redirect_location = "/why-you-came-here"
Original comment by lazy.dog...@gmail.com
on 13 Mar 2013 at 12:28
Original comment by didier.c...@googlemail.com
on 4 Apr 2013 at 1:53
i had a nice talk recently with some owasp - guys who told me that a timing -
attack is possible if the waf simply drops the connection, thus allowing an
attacker to determine which rules are loaded and which waf might be used. if we
pass the intercepted request to a default error-page, handeled by the app,
those timing-attacks are more difficult.
see https://www.usenix.org/system/files/conference/woot12/woot12-final2.pdf
Original comment by lazy.dog...@gmail.com
on 10 Apr 2013 at 10:27
Attachments:
Original issue reported on code.google.com by
lazy.dog...@gmail.com
on 12 Mar 2013 at 8:57