Useful and perfect to help us to protect our CGI / LC Server apps. I use it 
since v 4G ;-)

> Perishable Press 
>  
> 5G Blacklist 2012
> Posted: 11 Jan 2012 12:47 PM PST
>  The 5G Blacklist helps reduce the number of malicious URL requests that hit 
> your website. It’s one of many ways to improve the security of your site and 
> protect against evil exploits, bad requests, and other nefarious garbage.
> 
> After extensive beta testing, the 5G Blacklist/Firewall is solid and ready to 
> help secure sites hosted on Apache servers. In addition to beta testing for 
> the 5G, this is the 5th major update of my “G”-series blacklists. Here is a 
> quick overview of its evolution:
> 
> 
>       • Ultimate htaccess Blacklist (Compressed Version)
>       • 2G Blacklist: Closing the Door on Malicious Attacks
>       • Perishable Press 3G Blacklist
>       • The Perishable Press 4G Blacklist
>       • 5G Firewall (Beta)
> Along the way, I’ve explored a wide variety of different blacklist 
> techniques. The 5G is the culmination of all these efforts, and will 
> eventually be replaced by the imminent 6G Blacklist/Firewall.
> 
> What it does
> 
> The 5G Blacklist is a simple, flexible blacklist that checks all URI requests 
> against a series of carefully constructed HTAccess directives. This happens 
> quietly behind the scenes at the server level, saving resources for stuff 
> like PHP and MySQL for all blocked requests.
> 
> How it works
> 
> Blacklists can block just about any part of a request: IP, user agent, 
> request string, query string, referrer, and everything in between. But IP 
> addresses change constantly, and user agents and referrers are easily 
> spoofed. As discussed, request strings yield the best results: greater 
> protection with fewer false positives.
> 
> The 5G works beautifully with WordPress, and should help any site conserve 
> bandwidth and server resources while protecting against malicious activity.
> 
> How to use
> 
> To install the 5G Firewall, append the following code to your site’s root 
> .htaccess:
> 
> # 5G BLACKLIST/FIREWALL
> # @ http://perishablepress.com/5g-blacklist/
> 
> # 5G:[QUERY STRINGS]
> <IfModule mod_rewrite.c>
>  RewriteEngine On
>  RewriteBase /
>  RewriteCond %{QUERY_STRING} (environ|localhost|mosconfig|scanner) [NC,OR]
>  RewriteCond %{QUERY_STRING} (menu|mod|path|tag)\=\.?/? [NC,OR]
>  RewriteCond %{QUERY_STRING} boot\.ini  [NC,OR]
>  RewriteCond %{QUERY_STRING} echo.*kae  [NC,OR]
>  RewriteCond %{QUERY_STRING} etc/passwd [NC,OR]
>  RewriteCond %{QUERY_STRING} \=\\%27$   [NC,OR]
>  RewriteCond %{QUERY_STRING} \=\\\'$    [NC,OR]
>  RewriteCond %{QUERY_STRING} \.\./      [NC,OR]
>  RewriteCond %{QUERY_STRING} \?         [NC,OR]
>  RewriteCond %{QUERY_STRING} \:         [NC,OR]
>  RewriteCond %{QUERY_STRING} \[         [NC,OR]
>  RewriteCond %{QUERY_STRING} \]         [NC]
>  RewriteRule .* - [F]
> </IfModule>
> 
> # 5G:[USER AGENTS]
> <IfModule mod_setenvif.c>
>  SetEnvIfNoCase User-Agent ^$ keep_out
>  SetEnvIfNoCase User-Agent (casper|cmsworldmap|diavol|dotbot)   keep_out
>  SetEnvIfNoCase User-Agent (flicky|ia_archiver|jakarta|kmccrew) keep_out
>  SetEnvIfNoCase User-Agent (libwww|planetwork|pycurl|skygrid)   keep_out
>  SetEnvIfNoCase User-Agent (purebot|comodo|feedfinder|turnit)   keep_out
>  SetEnvIfNoCase User-Agent (zmeu|nutch|vikspider|binlar|sucker) keep_out
>  <Limit GET POST PUT>
>   Order Allow,Deny
>   Allow from all
>   Deny from env=keep_out
>  </Limit>
> </IfModule>
> 
> # 5G:[REQUEST STRINGS]
> <IfModule mod_alias.c>
>  RedirectMatch 403 (https?|ftp|php)\://
>  RedirectMatch 403 /(cgi|https?|ima|ucp)/
>  RedirectMatch 403 /(Permanent|Better)$
>  RedirectMatch 403 (\=\\\'|\=\\%27|/\\\'/?|\)\.css\()$
>  RedirectMatch 403 (\,|//|\)\+|/\,/|\{0\}|\(/\(|\.\.\.|\+\+\+|\||\\\"\\\")
>  RedirectMatch 403 \.(cgi|asp|aspx|cfg|dll|exe|jsp|mdb|sql|ini|rar)$
>  RedirectMatch 403 /(contac|fpw|install|pingserver|register)\.php$
>  RedirectMatch 403 (base64|crossdomain|localhost|wwwroot|e107\_)
>  RedirectMatch 403 (eval\(|\_vti\_|\(null\)|echo.*kae|config\.xml)
>  RedirectMatch 403 \.well\-known/host\-meta
>  RedirectMatch 403 /function\.array\-rand
>  RedirectMatch 403 \)\;\$\(this\)\.html\(
>  RedirectMatch 403 proc/self/environ
>  RedirectMatch 403 msnbot\.htm\)\.\_
>  RedirectMatch 403 /ref\.outcontrol
>  RedirectMatch 403 com\_cropimage
>  RedirectMatch 403 indonesia\.htm
>  RedirectMatch 403 \{\$itemURL\}
>  RedirectMatch 403 function\(\)
>  RedirectMatch 403 labels\.rdf
>  RedirectMatch 403 /playing.php
>  RedirectMatch 403 muieblackcat
> </IfModule>
> 
> # 5G:[BAD IPS]
> <Limit GET POST PUT>
>  Order Allow,Deny
>  Allow from all
>  # uncomment/edit/repeat next line to block IPs
>  # Deny from 123.456.789
> </Limit>
> 
> That’s the golden ticket right there. The 5G Firewall is serious protection 
> for your website: extensively tested, plug-n-play, and completely free. 
> “Grab, gulp, n go” as they say. For more information, see the beta article 
> (and comments).
> 
> Troubleshooting
> 
> Remember, test thoroughly. If something stops working when the 5G is 
> installed, try removing the 5G. If things start working normally again, you 
> can either pass on the 5G or investigate further. Investigating further is 
> straightforward using something like the halving method, where you remove 
> chunks of the 5G until isolating and identifying the issue. Here is a quick 
> example:
> 
>       • I’ve installed the 5G, thanks Jeff.
>       • Uh-oh, the page at http://example.com/indonesia.html stopped loading
>       • Hmm, the URL contains the phrase “indonesia”, so let’s check the 5G 
> for it
>       • Yep, there’s a rule that blocks indonesia\.htm
>       • Removing that line resolves the issue, thanks me.
> Is it okay to remove rules that are blocking your own pages? Yes, the only 
> downside is that malicious requests that would have otherwise been blocked 
> will now get through. The 5G will continue to block a massive volume of 
> malicious requests — it’ll just be a bit less effective. The protective 
> effect is cumulative, not dependent on any one rule. So customization is 
> encouraged. Once you dial it in, you’re all set.
> 
> Disclaimer
> 
> The 5G Firewall is provided “as-is”, with the intention of helping site 
> administrators protect their sites against bad requests and other malicious 
> activity. The code is open and free to use and modify as long as the first 
> two credit lines remain intact. By using this code you assume all risk & 
> responsibility for anything that happens, whether good or bad. In short, use 
> wisely, test thoroughly, don’t sue me.
> 
> Learn more..
> 
> To learn more about the theory and development of the 5G Firewall, check out 
> my articles on building the 3G, 4G and 5G Blacklist. A search for “blacklist” 
> in the sidebar should also yield many results.
> 
> Happy securing!
> 
> © 2012 Perishable Press
> 
>         
> You are subscribed to email updates from Perishable Press 
> To stop receiving these emails, you may unsubscribe now.      Email delivery 
> powered by Google
> Google Inc., 20 West Kinzie, Chicago IL USA 60610

--
Pierre Sahores
mobile : 06 03 95 77 70
www.sahores-conseil.com




_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to