Thanks Nick.
Yes, it looks like mod_security provides dynamic collections that I
could use to match header parameters against a whitelist and change
that list on demand (for example by hitting defined URL address).
Does Ironbee provide any similar functionality?
Daniel
-
Ok, thanks Jeff. I think I can work around that problem.
What about this scenario:
1) Filter incoming request based on content (HTTP POST)
2) Stop further processing of a request if content matches (or
doesn't match) dynamic criteria (Perl script is aware of these
criteria)
3) do not pass
.out"
SetInputFilter myFilterIn
SetOutputFilter myFilterOut
Request:
curl -X POST -H "Content-Type: application/json" -H "custom: 1234567890" -d
'{"username":"xyz","password":"xyz"}' http://localhost/api/login
Thanks
I try to filter incoming HTTP request. Here is configuration of my filter:
LoadModule ext_filter_module modules/mod_ext_filter.so
ExtFilterDefine myFilter ftype=30 mode=input \
cmd="c:/tools/perl/bin/perl.exe c:/temp/dump.pl c:/temp/dump.out"
SetOutputFilter myFilter
and Perl script I'm
I have the same problem. Nothing in the log. Did you try: ab -n 10
http://domain.org:80/ ?
If I execute this I can see the problem: apr_pollset_poll: The timeout
specified has expired (70007)
arch=x64
mpm=prefork/worker
httpd=2.4.1
php=5.4.0/5.3.10