diff options
-rw-r--r-- | www-apache/modsecurity-crs/ChangeLog | 6 | ||||
-rw-r--r-- | www-apache/modsecurity-crs/Manifest | 10 | ||||
-rw-r--r-- | www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild | 10 |
3 files changed, 19 insertions, 7 deletions
diff --git a/www-apache/modsecurity-crs/ChangeLog b/www-apache/modsecurity-crs/ChangeLog index ee9c29661e59..f6bb760a65ab 100644 --- a/www-apache/modsecurity-crs/ChangeLog +++ b/www-apache/modsecurity-crs/ChangeLog @@ -1,6 +1,10 @@ # ChangeLog for www-apache/modsecurity-crs # Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.4 2010/12/01 21:38:02 flameeyes Exp $ +# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.5 2010/12/03 01:34:34 flameeyes Exp $ + + 03 Dec 2010; Diego E. Pettenò <flameeyes@gentoo.org> + modsecurity-crs-2.0.10.ebuild: + Add log about the recent changes in 2.0.9+ about blocking/scoring. *modsecurity-crs-2.0.10 (01 Dec 2010) diff --git a/www-apache/modsecurity-crs/Manifest b/www-apache/modsecurity-crs/Manifest index 244326ef86bb..264c88b78a5f 100644 --- a/www-apache/modsecurity-crs/Manifest +++ b/www-apache/modsecurity-crs/Manifest @@ -3,14 +3,14 @@ Hash: SHA1 DIST modsecurity-crs_2.0.10.tar.gz 149997 RMD160 00ef9f03b69e86b5dcd930ce352b734b80ef8560 SHA1 32e52f534f84d0c2bb9ce57464670bf76b8578be SHA256 9f26c579f802fe1ef9ab254e34a6a34a4c3e468bfe0d61d09eea36485b208865 DIST modsecurity-crs_2.0.8.tar.gz 155889 RMD160 c4fb5ef6c48a8aade6d9b8c95e9acd2f9c5d2a40 SHA1 382713ecdb6ab57904a03fdae0eae311f8d4b3c3 SHA256 11ec4bb68f455924298e998a283664ba710aeb45d4ea6e70dd5ac8a22345f890 -EBUILD modsecurity-crs-2.0.10.ebuild 2334 RMD160 bfe32f9dd6a5a54b1904fd147a3799b5714714e4 SHA1 e83add2857f40282f65840a749080b50ae223f89 SHA256 4a1e925356ebacd7cb94ded2f0620f0b3e483a3762802bc81c6bd10807f6514e +EBUILD modsecurity-crs-2.0.10.ebuild 2769 RMD160 f077099c6bd0696b9b05437f474eb7257dc428ea SHA1 6b89cebe2263219c1a3b04069448cd67e1d0f302 SHA256 3b5dbbd7d7818a79abbd4901765ed111a7ced0c8cd1815feb5eed3f22795b817 EBUILD modsecurity-crs-2.0.8.ebuild 2176 RMD160 1c627c98c4491a89db6e0aeabaeac3005fe28b38 SHA1 7c98f5444697f8af091d48782af8c2fb49d5f5fd SHA256 6586b994e412d1122a1dd3f6fde94c4cbae75140e6beb067b9a2a6847dc537ea -MISC ChangeLog 852 RMD160 cac106db4790c1b99bab514c5482eb18a2aeb0ea SHA1 36106859ca1568c59c70d25f29f88c390700541c SHA256 0bd4ed072edc4aa662498362891bec19ed20a441ce34029589c141e9e9382d85 +MISC ChangeLog 1011 RMD160 2409f67efbc65dadde3ebc0f973d6f4dc1e5219a SHA1 14457454e49bdeb2735b07bdc0661bbca514cdac SHA256 1f574ed302e08172d7ba8c46f15f56337a83ecc2de124b8ad61cb1741833873e MISC metadata.xml 663 RMD160 86ce5a300643284f72a5c9a657f6946163e23e44 SHA1 6b9a9355f552f3c869a1b00ad8586b77a132cf16 SHA256 aceb77ecf1564c16e052cfb222a508649ffe176ed6745d13a22d2b1a2cceae45 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (GNU/Linux) -iEYEARECAAYFAkz2wDwACgkQAiZjviIA2XgHMgCeMa5aCT0h4ia1sxnS8TPvGF+X -v3gAoOcbV/gp2/NyE3lkTLUkbkMnLHqy -=h0CY +iEYEARECAAYFAkz4SRYACgkQAiZjviIA2XilOQCgmoO0J7YNjnNGshy6G4+lu2f8 +ppcAnRY6rItJlG7gw3nI7WqS2Kq+c0OU +=ydzG -----END PGP SIGNATURE----- diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild index 5bdbb41a67fd..14d971d38804 100644 --- a/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild +++ b/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2010 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild,v 1.1 2010/12/01 21:38:02 flameeyes Exp $ +# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild,v 1.2 2010/12/03 01:34:34 flameeyes Exp $ EAPI=2 @@ -64,4 +64,12 @@ pkg_postinst() { elog elog "If you want to enable further rules, check the following directory:" elog " ${APACHE_MODULES_CONFDIR}/mod_security/optional_rules" + elog "" + elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block" + elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you" + elog "should change modsecurity_crs_10_config.conf so that you have these settings enabled:" + elog "" + elog " SecDefaultAction \"phase:1,pass\"" + elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\"" + elog "" } |