File Manager
Upload
Current Directory: /home/lartcid/public_html/journal.lartc.id
[Back]
..
[Open]
Hapus
Rename
.htaccess
[Edit]
Hapus
Rename
.well-known
[Open]
Hapus
Rename
README.md
[Edit]
Hapus
Rename
api
[Open]
Hapus
Rename
cache
[Open]
Hapus
Rename
cgi-bin
[Open]
Hapus
Rename
classes
[Open]
Hapus
Rename
config.TEMPLATE.inc.php
[Edit]
Hapus
Rename
config.inc.php
[Edit]
Hapus
Rename
controllers
[Open]
Hapus
Rename
cypress.json
[Edit]
Hapus
Rename
dbscripts
[Open]
Hapus
Rename
docs
[Open]
Hapus
Rename
error_log
[Edit]
Hapus
Rename
favicon.ico
[Edit]
Hapus
Rename
index.php
[Edit]
Hapus
Rename
js
[Open]
Hapus
Rename
lib
[Open]
Hapus
Rename
locale
[Open]
Hapus
Rename
mini.php
[Edit]
Hapus
Rename
pages
[Open]
Hapus
Rename
php.ini
[Edit]
Hapus
Rename
plugins
[Open]
Hapus
Rename
public
[Open]
Hapus
Rename
registry
[Open]
Hapus
Rename
scheduledTaskLogs
[Open]
Hapus
Rename
schemas
[Open]
Hapus
Rename
styles
[Open]
Hapus
Rename
templates
[Open]
Hapus
Rename
tools
[Open]
Hapus
Rename
Edit File
owasp-crs-regressions ===================== Introduction ============ Welcome to the OWASP Core Rule Set regression testing suite. This suite is meant to test specific rules in OWASP CRS version 3. The suite is designed to uses preconfigured IDs that are specific to this version of CRS. The tests themselves can be run without CRS and one would expect the same elements to be blocked, however one must override the default Output parameter in the tests. Installation ============ The OWASP Core Rule Set project was part of the effort to develop FTW, the Framework for Testing WAFs. As a result, we use this project in order to run our regression testing. FTW is designed to use existing Python testing frameworks to allow for easy to read web based testing, provided in YAML. You can install FTW by from the repository (at https://github.com/CRS-support/ftw) or by running pip. ```pip install -r requirements.txt``` This will install FTW as a library. It can also be run natively, see the FTW documentation for more detail. Requirements ============ There are Three requirements for running the OWASP CRS regressions. 1. You must have ModSecurity specify the location of your error.log, this is done in the config.py file 2. ModSecurity must be in DetectionOnly (or anomaly scoring) mode 3. You must disable IP blocking based on previous events Note: The test suite compares timezones -- if your test machine and your host machine are in different timezones this can cause bad results To accomplish 2. and 3. you may use the following rule in your setup.conf: ``` SecAction "id:900005,\ phase:1,\ nolog,\ pass,\ ctl:ruleEngine=DetectionOnly,\ ctl:ruleRemoveById=910000,\ setvar:tx.paranoia_level=4,\ setvar:tx.crs_validate_utf8_encoding=1,\ setvar:tx.arg_name_length=100,\ setvar:tx.arg_length=400" ``` Once these requirements have been met the tests can be run by using pytest. Running The Tests ================= On Windows this will look like: ------------------------------- Single Rule File: ```py.test.exe -v CRS_Tests.py --rule=tests/test.yaml``` The Whole Suite: ```py.test.exe -v CRS_Tests.py --ruledir_recurse=tests/``` On Linux this will look like: ----------------------------- Single Rule File: ```py.test -v CRS_Tests.py --rule=tests/test.yaml``` The Whole Suite: ```py.test -v CRS_Tests.py --ruledir_recurse=tests/``` Contributions ============= We'd like to thank Fastly for their help and support in developing these tests.
Simpan