package: libapache2-mod-security

A new upstream stable version is available.
mod_security 1.9 contains the following changes since 1.8.7:

06/11/2005 1.9
--------------

 * No changes since 1.9RC4.


03/11/2005 1.9RC4
-----------------

 * Warning messages emitted from chained rules are now logged at
   level 3.


01/11/2005 1.9RC3
-----------------

 * Made SecFilterSignatureAction behave in a slightly more consistent
   manner. When defined it applies to rules that do not have custom
   actions.


29/10/2005 1.9RC2
-----------------

 * Discovered (and fixed) a fragment of non multithred-safe code.

 * Fix a bug with the chain action.

 * Improved the per-rule performance figures not to include
   debug logging (which can be quite slow).


03/10/2005 1.9RC1
-----------------

 * Removed -DWORKER_HACK since it is easier and more elegant
   to use LoadFile.

 * Improvements to the output filtering to prevent Apache from
   printing the error message twice (when we have a regex
   match in the response body).

 * Improvements to the multipart parser, now it is more strict with
   that it accepts. (Incidently, Mozilla and IE don't know how to
   construct a proper multipart/form-data body, but Opera does.)

 * New directive, SecFilterSignatureAction. If specified, all signatures
   that follow the directive in the configuration file will use the
   actions it specified, optionally merging with the per-rule action
   list (if any specified).


16/09/2005 1.9dev4
------------------

 * Limited the GuardianLog line size when doing piped logging. Writes
   are atomic over a pipe only if the size of the data is less than
   PIPE_BUF.

 * Added a hack (compile with -DWORKER_HACK) to force the pthreads
   dynamic library to be loaded before chroot is performed. (Apache
   2.x only)

 * Fixed the \xHH unescaping bug when the character was a regex
   meta character. Such characters are now escaped with \. (Apache
   1.x only)

 * Unicode encoding checks not performed on the contents of the
   Referer request header.

 * Added the manual (in DocBook) format to the CVS.

 * Added action "rev", to be used as a rule serial number, allowing
   the "id" to remain unchanged (and unique).

 * Many changes related to how actions are processed. Introduced
   SecFilterActionsRestricted. When enabled, only the meta-data
   per-rule actions are allowed. This is useful when you want to
   include third-party rules to your configuration, and you don't
   want them to specify just anything in the action. Per-rule actions
   are now added on top of SecFilterDefaultAction actions.

 * Wrote a new action parser from scratch. It is now possible to
   escape action values, and even have a comma inside the
   value (yay).

 * Fixed doubling of response headers in the (serial) audit log.

 * Added support to enable or disable mod_security per request
   using an environment variable - MODSEC_ENABLE. This is something
   that is likely to be useful in combination with SetEnvif. This
   environment variable will not affect audit logging.


18/08/2005 1.9dev3
------------------

 * Files uploaded via PUT are now treated in the same manner
   as files uploaded via POST and multipart/form-data encoding.

 * Added experimental support for mod_security to run in an early
   hook. To test this compile with -DENABLE_EARLY_HOOK.

 * Implemented SecAuditLogRelevantStatus

 * Implemented an entirely new approach to audit logging - concurrent
   audit logging where each request is stored in its own file.

 * Changed the way internal chroot works. We are not using a
   file-based lock any more. The process is much cleaner. (I just
   need to test it thoroughly to see if it performs under all
   circumstances.)

 * Many changes to improve handling of DynamicOnly and related
   internal stuff.

 * Added OUTPUT_STATUS to the Apache 2.x version.

 * Implemented SecGuardianLog, to allow mod_security to pass information
   to httpd-guardian (see http://www.apachesecurity.net/tools/).

 * Removed debug log locking (writes should be atomic - why did I think
   otherwise?).

 * Log level is now present on every entry in the debug log.

 * Significantly enhanced the filter (rule) inheritance functionality
   by adding three new directives (SecFilterImport, SecFilterRemove,
   SecFilterInheritanceMandatory) and one new action (mandatory).

 * Added "proxy" action to rewrite URL through the internal reverse
   proxy when a rule is triggered.

 * Added the script that converts Nessus scripts (.nasl files) into
   mod_security rules. Written by Javier Fernandez-Sanguino
   <[EMAIL PROTECTED]>.

 * Use GetTempPath on Windows to get the path for temporary files.

 * Non-existent named parameters (ARG_name) and cookies (COOKIE_name) are
   now treated as empty. This should allow us to write rules that trigger
   when a named parameter is not present.


19/04/2005 1.9dev2
------------------

 * Added individual rule timing (Apache 2.x only)

 * Deprecated SecServerResponseToken. It no longer works and it
   outputs a warning message.

 * mod_security now logs its version to the error log upon
   startup (as notice).

 * When SecServerSignature is used, mod_security now logs the
   real server signature to the error log (as notice).

 * Added two new actions: setenv, setnote

 * Added two new actions: auditlog, noauditlog

 * Added three new actions: id, msg, severity. These are simple
   text fields that appear in the error messages. They can be
   used to clasify problems.

 * Added RelevantOnly as option to SecUploadKeepFiles.

 * BUG Fixed the "pass" action bug.

 * 404 responses are no longer considered relevant.

 * The request body is now exported through the "mod_security-body"
   note. (This can be useful for logging other than through the
   audit log.

 * BUG Fixed a double URL-decoding bug (Apache first, then us), which
   could sometimes lead to a false positive.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to