Skip to content

Commit 7536c8e

Browse files
author
Till Brehm
committed
Updated security README.txt
1 parent f9529b3 commit 7536c8e

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed

security/README.txt

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,45 @@ Setting: remote_api_allowed
6969
Options: yes/no
7070
Description: Disables the remote API
7171

72+
Setting: ids_enabled
73+
Options: yes/no
74+
Description: Enables the Intrusion Detection System
75+
76+
Setting: ids_log_level
77+
Options: 1 (number, default = 1)
78+
Description: IDS score that triggers the log in /usr/local/ispconfig/interface/temp/ids.log
79+
This log can be used to feed the whitelist.
80+
81+
Example:
82+
83+
cat /usr/local/ispconfig/interface/temp/ids.log >> /usr/local/ispconfig/security/ids.whitelist
84+
rm -f /usr/local/ispconfig/interface/temp/ids.log
85+
86+
If you want to use a custom whitelist, then store it as /usr/local/ispconfig/security/ids.whitelist.custom
87+
88+
Setting: ids_warn_level
89+
Options: 5 (number, default = 5)
90+
Description: When the IDS score exceeds this level, a error message is logged into the system log. No message is displayed to the user.
91+
92+
Setting: ids_block_level
93+
Options: 100 (number, default = 100)
94+
Description: When the IDS score exceeds this level, a error message is shown to the user and further processing is blocked. A score of 100 will most likely never be reached.
95+
We have choosen such a high score as default until we have more complete whitelists for this new feature.
96+
97+
Setting: sql_scan_enabled
98+
Options: yes/no
99+
Description: Enables the scan for SQL injections in the DB library.
100+
101+
Setting: sql_scan_action
102+
Options: warn/block
103+
Description: warn = write errot message to log only. Block = block user action and show error to the user.
104+
105+
Setting: apache_directives_scan_enabled
106+
Options: yes/no
107+
Description: Scan apache directives field for potentially malicious directives. This function uses the regex
108+
list from /usr/local/ispconfig/security/apache_directives.blacklist file.
109+
If you want to use a custom blacklist, then store it as /usr/local/ispconfig/security/apache_directives.blacklist.custom
110+
72111
Setting: security_admin_email
73112
Options: email address
74113
Description: Email address of the security admin

0 commit comments

Comments
 (0)