Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Protocol enforcement blocks HTTP/3 #3246

Closed
jpds opened this issue Jul 1, 2023 · 1 comment · Fixed by #3218
Closed

Protocol enforcement blocks HTTP/3 #3246

jpds opened this issue Jul 1, 2023 · 1 comment · Fixed by #3218

Comments

@jpds
Copy link

jpds commented Jul 1, 2023

Description

The REQUEST-920-PROTOCOL-ENFORCEMENT.conf ruleset does not appear to be aware of HTTP/3.

How to reproduce the misbehavior (-> curl call)

I simply deployed https://github.com/corazawaf/coraza-caddy with a Caddy server of mine and the first request was immediately blocked as Caddy support HTTP/3 out of the box, using the suggested configuration from: https://github.com/corazawaf/coraza-caddy#using-owasp-core-ruleset

Logs

{"level":"error","ts":1688240826.057446,"logger":"http.handlers.waf","msg":"[client \"[XXXX:XXXX::YY]\"] Coraza: Access denied (phase 1). HTTP protocol version is not allowed by policy [file \"@owasp_crs/REQUEST-920-PROTOCOL-ENFORCEMENT.conf\"] [line \"2051\"] [id \"920430\"] [rev \"\"] [msg \"HTTP protocol version is not allowed by policy\"] [data \"HTTP/3.0\"] [severity \"critical\"] [ver \"OWASP_CRS/4.0.0-rc1\"] [maturity \"0\"] [accuracy \"0\"] [tag \"application-multi\"] [tag \"language-multi\"] [tag \"platform-multi\"] [tag \"attack-protocol\"] [tag \"paranoia-level/1\"] [tag \"OWASP_CRS\"] [tag \"capec/1000/210/272\"] [tag \"PCI/6.5.10\"] [hostname \"\"] [uri \"/\"] [unique_id \"MzmeIyFIWukHQZbe\"]\n"}

Your Environment

  • CRS version (e.g., v3.3.4): 4.0.0-rc1
  • Paranoia level setting (e.g. PL1) : 1
  • Web Server and version or cloud provider / CDN (e.g., Apache httpd 2.4.54): Caddy master / 2.7.0-beta2

Confirmation

[X] I have removed any personal data (email addresses, IP addresses,
passwords, domain names) from any logs posted.

@airween
Copy link
Contributor

airween commented Jul 2, 2023

Hi @jpds,

thanks for inform us - it seems meanwhile you've sent a PR, and found an existing one. Perhaps that will solve this issue too, so if you think that works, please close this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants