mirror of
https://github.com/fabriziosalmi/patterns.git
synced 2025-12-17 09:45:34 +00:00
Update README.md
This commit is contained in:
parent
c87f286fa0
commit
b98230ca52
127
README.md
127
README.md
@ -1,47 +1,43 @@
|
||||
# Patterns
|
||||
Automate the scraping of **OWASP Core Rule Set (CRS)** patterns and convert them into **Caddy web server WAF configurations**.
|
||||
This project helps protect Caddy servers against common web attacks like **SQL Injection (SQLi)**, **XSS**, **RCE**, and more – all with minimal effort!
|
||||
# 🔒 Patterns – Automated OWASP CRS for Caddy, Nginx, and Apache
|
||||
Automate the scraping of **OWASP Core Rule Set (CRS)** patterns and convert them into **Caddy, Nginx, and Apache** WAF configurations.
|
||||
|
||||
---
|
||||
> This project helps protect web servers against common web attacks like **SQL Injection (SQLi)**, **XSS**, **RCE**, **LFI**, and more – automatically updated and deployed!
|
||||
|
||||
## 🚀 Project Overview
|
||||
- **🎯 Goal**: Automate OWASP CRS rule collection and generate Caddy WAF configs.
|
||||
- **⚡ Automation**: GitHub Actions fetch rules daily and push new configurations.
|
||||
- **📄 Output**: Caddy `.conf` files categorized by attack type (SQLi, XSS, LFI).
|
||||
|
||||
---
|
||||
- **🎯 Goal**: Automate OWASP CRS rule collection and generate WAF configs for **Caddy, Nginx, and Apache**.
|
||||
- **⚡ Automation**: GitHub Actions fetch rules **daily** and push updated configurations to the repository.
|
||||
- **📄 Output**: WAF `.conf` files categorized by attack type (SQLi, XSS, LFI) for **three web servers**.
|
||||
|
||||
## 📂 Project Structure
|
||||
```
|
||||
patterns/
|
||||
├── waf_patterns/ # 🔧 Generated Caddy WAF config files
|
||||
│ ├── sql.conf # SQL Injection patterns
|
||||
│ ├── xss.conf # XSS patterns
|
||||
│ └── bots.conf # Bot detection patterns
|
||||
│── owasp.py # 🕵️ OWASP scraper (fetch CRS rules)
|
||||
├── waf_patterns/ # 🔧 Generated WAF config files
|
||||
│ ├── caddy/ # Caddy WAF configs
|
||||
│ ├── nginx/ # Nginx WAF configs
|
||||
│ └── apache/ # Apache WAF configs (ModSecurity)
|
||||
├── owasp.py # 🕵️ OWASP scraper (fetch CRS rules)
|
||||
├── owasp2caddy.py # 🔄 Convert OWASP JSON to Caddy WAF configs
|
||||
├── owasp2nginx.py # 🔄 Convert OWASP JSON to Nginx WAF configs
|
||||
├── owasp2apache.py # 🔄 Convert OWASP JSON to Apache ModSecurity configs
|
||||
├── owasp_rules.json # 📊 Fetched OWASP rules (raw)
|
||||
├── requirements.txt # 🔄 Required tools
|
||||
└── .github/workflows/ # 🤖 GitHub Actions for automation
|
||||
└── update_patterns.yml
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## 🛠️ How It Works
|
||||
### 🔹 1. Scraping OWASP Rules
|
||||
- `owasp.py` scrapes the latest OWASP CRS patterns from GitHub.
|
||||
- Pulls attack patterns for **SQLi**, **XSS**, **RCE**, **LFI** from OWASP CRS `.conf` files.
|
||||
|
||||
### 🔹 2. Conversion to Caddy WAF
|
||||
- `owasp2caddy.py` converts OWASP patterns (`owasp_rules.json`) into **Caddy-compatible WAF** config files.
|
||||
- Output is stored in `waf_patterns/` by attack category.
|
||||
### 🔹 2. Multi-Platform WAF Config Generation
|
||||
- **`owasp2caddy.py`** – Generates Caddy WAF configs using OWASP patterns.
|
||||
- **`owasp2nginx.py`** – Converts OWASP patterns into Nginx WAF rules.
|
||||
- **`owasp2apache.py`** – Converts OWASP rules into Apache **ModSecurity** configurations.
|
||||
|
||||
### 🔹 3. Automation (GitHub Actions)
|
||||
- GitHub Actions fetch new rules **daily at midnight**.
|
||||
- Updated rules are committed and pushed automatically to the repository.
|
||||
|
||||
---
|
||||
- Automatically commits and pushes new `.conf` files for all three platforms (Caddy, Nginx, Apache).
|
||||
|
||||
## ⚙️ Installation
|
||||
**1. Clone the Repository:**
|
||||
@ -59,27 +55,54 @@ pip install -r requirements.txt
|
||||
```bash
|
||||
python owasp.py
|
||||
python owasp2caddy.py
|
||||
python owasp2nginx.py
|
||||
python owasp2apache.py
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## 🚀 Usage (Caddy WAF Integration)
|
||||
**1. Copy the Generated `.conf` Files:**
|
||||
## 🚀 Usage (Web Server Integration)
|
||||
### 🔹 1. Caddy WAF Integration
|
||||
```bash
|
||||
sudo cp waf_patterns/*.conf /etc/caddy/
|
||||
sudo cp waf_patterns/caddy/*.conf /etc/caddy/
|
||||
```
|
||||
|
||||
**2. Import Patterns in Your Caddyfile:**
|
||||
Add to **Caddyfile**:
|
||||
```caddy
|
||||
import waf_patterns/*.conf
|
||||
import waf_patterns/caddy/*.conf
|
||||
```
|
||||
|
||||
**3. Reload Caddy:**
|
||||
Reload Caddy:
|
||||
```bash
|
||||
caddy reload
|
||||
```
|
||||
|
||||
---
|
||||
### 🔹 2. Nginx WAF Integration
|
||||
```bash
|
||||
sudo cp waf_patterns/nginx/*.conf /etc/nginx/waf/
|
||||
```
|
||||
Modify Nginx config:
|
||||
```nginx
|
||||
server {
|
||||
include /etc/nginx/waf/*.conf;
|
||||
location / {
|
||||
# Other configs...
|
||||
}
|
||||
}
|
||||
```
|
||||
Reload Nginx:
|
||||
```bash
|
||||
sudo nginx -s reload
|
||||
```
|
||||
|
||||
### 🔹 3. Apache ModSecurity Integration
|
||||
```bash
|
||||
sudo cp waf_patterns/apache/*.conf /etc/modsecurity.d/
|
||||
```
|
||||
Add to Apache config:
|
||||
```apache
|
||||
IncludeOptional /etc/modsecurity.d/*.conf
|
||||
```
|
||||
Restart Apache:
|
||||
```bash
|
||||
sudo systemctl restart apache2
|
||||
```
|
||||
|
||||
## 🤖 Automation (GitHub Workflow)
|
||||
The GitHub Action (`.github/workflows/update_patterns.yml`) automates updates:
|
||||
@ -88,51 +111,35 @@ The GitHub Action (`.github/workflows/update_patterns.yml`) automates updates:
|
||||
- 🚀 **Pushes Updated WAF Files** to `waf_patterns/`
|
||||
|
||||
To enable:
|
||||
- Ensure the workflow file is active in your repository.
|
||||
- Updated patterns will automatically sync to the repo.
|
||||
- Ensure the workflow is active in your repository.
|
||||
- Updated patterns will automatically sync to the repo and reflect in your WAF setup.
|
||||
|
||||
---
|
||||
|
||||
## 🧩 Example Output (Caddy WAF)
|
||||
**SQL Injection Blocking (waf_patterns/sql.conf)**:
|
||||
```caddy
|
||||
@block_sqli {
|
||||
path_regexp sqli "(?i)(union.*select|insert.*into|delete.*from|drop table)"
|
||||
}
|
||||
respond @block_sqli 403
|
||||
## 🧩 Example Output (ModSecurity – Apache WAF)
|
||||
**SQL Injection Blocking (waf_patterns/apache/sql.conf)**:
|
||||
```apache
|
||||
SecRuleEngine On
|
||||
|
||||
SecRule REQUEST_URI "union.*select|insert.*into|delete.*from|drop table" "id:1000,phase:1,deny,status:403,log,msg:'SQLi attack detected'"
|
||||
SecRule REQUEST_URI "alter table|truncate.*|--" "id:1001,phase:1,deny,status:403,log,msg:'SQLi attack detected'"
|
||||
```
|
||||
|
||||
**XSS Blocking (waf_patterns/xss.conf)**:
|
||||
```caddy
|
||||
@block_xss {
|
||||
path_regexp xss "(?i)<.*script.*>|javascript:|alert\(.*\)"
|
||||
}
|
||||
respond @block_xss 403
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## 🔧 Contributing
|
||||
1. Fork the repository.
|
||||
2. Create a feature branch (`feature/new-patterns`).
|
||||
3. Commit and push changes.
|
||||
4. Open a pull request (PR).
|
||||
|
||||
---
|
||||
|
||||
## 📄 License
|
||||
This project is licensed under the **MIT License**.
|
||||
See the [LICENSE](LICENSE) file for details.
|
||||
|
||||
---
|
||||
|
||||
## 🌐 Resources
|
||||
- [OWASP CRS GitHub](https://github.com/coreruleset/coreruleset)
|
||||
- [Caddy Web Server](https://caddyserver.com/)
|
||||
- [Nginx](https://nginx.org/)
|
||||
- [Apache ModSecurity](https://modsecurity.org/)
|
||||
- [MIT License](https://opensource.org/licenses/MIT)
|
||||
|
||||
---
|
||||
|
||||
## 🚨 Issues
|
||||
If you encounter any issues, please open a ticket in the [Issues Tab](https://github.com/your-username/patterns/issues).
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user