Forum Discussion
mwitt_65218
Nimbostratus
May 19, 2009How to disable a particular Attack Sig for a specific user-input parameter
Greetings,
I have the 416-page user manual but have had no other training, so please bear with me.
I am having problems figuring out how to disable a particular Attack Signature for a particular user-input parameter called username.
A user could not login with the username jroot@morrison.com because of the Attack Signature SQL-INJ ROOT@ (per the log in Reports).
When I clicked on that log, I then clicked ACCEPT with the hope that this jroot@morrison.com would be able to login. The users use an email address for the username textbox/parameter. Still though this jroot@morrison.com could not login and received the blocking from the SQL-INJ ROOT@ Attack Sig.
So I went to the username parameter. It already had the Meta Character @(64) allowed. For that parameter, I brought to the left with the << button the SQL-INJ ROOT@ Attack Signature and it was already disabled but I brought it to the left with the << button anyway and I clicked UPDATE with its state as disabled. Still though jroot@morrison.com could not login and received the blocking error from the SQL-INJ ROOT@ Attack Sig.
I do not want to change the class from Blocking to Transparent.
In the Policy/Blocking/Settings area, Block is not checked for any of the check boxes and Learn and Alarm are checked for all of the check boxes. The Attack Signature Detected though has no option to put into Learn, Alarm, or Block as there are no check boxes for Attack Signature Detected. It was my understanding that a log will go to Policy Building - Manual if the Learn is checked, but this SQL-INJ ROOT@ blocking did not produce an error in Policy Building - Manual. I guess this is because the Attack Signature Detected has no check boxes for Learn/Alarm/Block. But the Alarm puts the log into Reports and the Reports log shows how jroot@morrison.com was blocked because of the SQL-INJ ROOT@ Attack Sig (though the Attack Signature Detected has no check boxes for Learn, Alarm, or Block).
So yesterday in Attack Signatures section, I found the Policy Attack Signatures. I clicked to disable SQL-INJ ROOT@ by unchecking the Enabled check box. I saved and applied the policy and the 7-day staging period started yesterday.
Today jroot@morrison.com could login successfully.
Even if jroot@morrison.com will be able to login successfully after the 7-day staging period, have I disabled the SQL-INJ ROOT@ Attack Signature for everything, for the entire policy?
Why can't I disable somehow this one SQL-INJ ROOT@ Attack Signature for ONLY the user-input parameter named username? It seems that the user's last name "root" or the "root@" in the user's email address is causing the SQL-INJ ROOT@ Attack Signature to block when the user types "jroot@morrison.com" into the username textbox to login.
Any suggestions or ideas would be greatly appreciated.
Thanks!
mwitt
- hoolio
Cirrostratus
Hi, - Benjamin_9036Historic F5 AccountGreetings again!
- mwitt_65218
Nimbostratus
Thanks to you both for your replies, Hoolio and Ben. - mwitt_65218
Nimbostratus
Just an update in case you two, or anybody else for that matter, are interested .... - Benjamin_9036Historic F5 AccountThanks for the updates! To clarify the effects of staging on the changes you made - if the staging period is currently active, any violations which are in staging should not cause actual blocking responses. This is the section of the manual that goes over this:
- mwitt_65218
Nimbostratus
Thanks Ben, I will look into it when I get a chance.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects