apache-mod_security-crs-2.2.9-1.mga6.noarch.rpm


Advertisement

Description

apache-mod_security-crs - Core Rules for mod_security

Property Value
Distribution Mageia 6.0
Repository Mageia Core x86_64
Package name apache-mod_security-crs
Package version 2.2.9
Package release 1.mga6
Package architecture noarch
Package type rpm
Installed size 379.65 KB
Download size 89.09 KB
Official Mirror distrib-coffee.ipsl.jussieu.fr
This package provides the base rules for mod_security.

Alternatives

Package Version Architecture Repository
apache-mod_security-crs-2.2.9-1.mga6.noarch.rpm 2.2.9 noarch Mageia Core
apache-mod_security-crs - - -

Requires

Name Value
apache-mod_security >= 2.9.0
config(apache-mod_security-crs) == 2.2.9-1.mga6

Provides

Name Value
apache-mod_security-crs == 2.2.9-1.mga6
config(apache-mod_security-crs) == 2.2.9-1.mga6

Download

Type URL
Binary Package apache-mod_security-crs-2.2.9-1.mga6.noarch.rpm
Source Package apache-mod_security-crs-2.2.9-1.mga6.src.rpm

Install Howto

  1. Enable Mageia Core repository on Install and Remove Software
  2. Update packages list:
    # urpmi.update -a
  3. Install apache-mod_security-crs rpm package:
    # urpmi apache-mod_security-crs

Files

Path
/etc/httpd/conf/modsecurity.d/modsecurity_35_bad_robots.data
/etc/httpd/conf/modsecurity.d/modsecurity_35_scanners.data
/etc/httpd/conf/modsecurity.d/modsecurity_40_generic_attacks.data
/etc/httpd/conf/modsecurity.d/modsecurity_50_outbound.data
/etc/httpd/conf/modsecurity.d/modsecurity_50_outbound_malware.data
/etc/httpd/conf/modsecurity.d/modsecurity_crs_10_config.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_20_protocol_violations.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_21_protocol_anomalies.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_23_request_limits.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_30_http_policy.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_35_bad_robots.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_40_generic_attacks.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_41_sql_injection_attacks.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_41_xss_attacks.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_42_tight_security.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_45_trojans.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_47_common_exceptions.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_48_local_exceptions.conf.example
/etc/httpd/conf/modsecurity.d/modsecurity_crs_49_inbound_blocking.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_50_outbound.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_59_outbound_blocking.conf
/etc/httpd/conf/modsecurity.d/modsecurity_crs_60_correlation.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_35_bad_robots.data
/usr/lib/modsecurity.d/base_rules/modsecurity_35_scanners.data
/usr/lib/modsecurity.d/base_rules/modsecurity_40_generic_attacks.data
/usr/lib/modsecurity.d/base_rules/modsecurity_50_outbound.data
/usr/lib/modsecurity.d/base_rules/modsecurity_50_outbound_malware.data
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_20_protocol_violations.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_21_protocol_anomalies.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_23_request_limits.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_30_http_policy.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_35_bad_robots.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_40_generic_attacks.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_41_sql_injection_attacks.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_41_xss_attacks.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_42_tight_security.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_45_trojans.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_47_common_exceptions.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_48_local_exceptions.conf.example
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_49_inbound_blocking.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_50_outbound.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_59_outbound_blocking.conf
/usr/lib/modsecurity.d/base_rules/modsecurity_crs_60_correlation.conf
/usr/share/doc/apache-mod_security-crs/CHANGES
/usr/share/doc/apache-mod_security-crs/INSTALL
/usr/share/doc/apache-mod_security-crs/LICENSE
/usr/share/doc/apache-mod_security-crs/README.md

Changelog

2016-02-25 - oden <oden> 2.2.9-1.mga6
+ Revision: 979143
- 2.2.9
2016-02-04 - umeabot <umeabot> 2.2.7-5.mga6
+ Revision: 936246
- Mageia 6 Mass Rebuild
2014-10-15 - umeabot <umeabot> 2.2.7-4.mga5
+ Revision: 741605
- Second Mageia 5 Mass Rebuild
2014-09-16 - umeabot <umeabot> 2.2.7-3.mga5
+ Revision: 677847
- Mageia 5 Mass Rebuild
2013-10-19 - umeabot <umeabot> 2.2.7-2.mga4
+ Revision: 525582
- Mageia 4 Mass Rebuild
2013-05-31 - oden <oden> 2.2.7-1.mga4
+ Revision: 433716
- fix build
- 2.2.7

See Also

Package Description
apache-mod_security-crs-extras-2.2.9-1.mga6.noarch.rpm Additional mod_security rules
apache-mod_session-2.4.26-1.mga6.x86_64.rpm Session interface for the Apache HTTP Server
apache-mod_speedycgi-2.220.0-15.mga6.x86_64.rpm SpeedyCGI module for the Apache HTTP Server
apache-mod_ssl-2.4.26-1.mga6.x86_64.rpm Strong cryptography using the SSL and TLS protocols
apache-mod_suexec-2.4.26-1.mga6.x86_64.rpm Allows CGI scripts to run as a specified user and Group
apache-mod_userdir-2.4.26-1.mga6.x86_64.rpm User-specific directories
apache-mod_wsgi-4.4.22-1.mga6.x86_64.rpm Python WSGI adapter module for Apache
apache-parent-18-2.mga6.noarch.rpm Parent POM file for Apache projects
apache-poi-3.14-1.mga6.noarch.rpm The Java API for Microsoft Documents
apache-poi-javadoc-3.14-1.mga6.noarch.rpm Javadoc for apache-poi
apache-python3-mod_wsgi-4.4.22-1.mga6.x86_64.rpm Python3 WSGI adapter module for Apache
apache-rat-0.11-4.mga6.noarch.rpm Apache Release Audit Tool (RAT)
apache-rat-core-0.11-4.mga6.noarch.rpm Core functionality for apache-rat
apache-rat-javadoc-0.11-4.mga6.noarch.rpm Javadocs for apache-rat
apache-rat-plugin-0.11-4.mga6.noarch.rpm Maven plugin for apache-rat
Advertisement
Advertisement