Initial Commit
This commit is contained in:
52
naxsi-0.55.3/README.md
Normal file
52
naxsi-0.55.3/README.md
Normal file
@@ -0,0 +1,52 @@
|
||||
<img alt="naxsi logo" src="https://www.nbs-system.com/wp-content/uploads/nbs-logo-naxsi1.png" align="center"/>
|
||||
|
||||
[](https://scan.coverity.com/projects/1883)
|
||||
[](https://travis-ci.org/nbs-system/naxsi)
|
||||
[](https://coveralls.io/github/nbs-system/naxsi?branch=master)
|
||||
[](http://codecov.io/github/nbs-system/naxsi?branch=master)
|
||||
|
||||
### We need your help
|
||||
|
||||
[Please fill in this little feedback survey](https://docs.google.com/spreadsheet/viewform?formkey=dG9UWDFuTEhiWWt4UF9fZEtwWFVJUlE6MQ), 2 minutes of your time, great help for us !
|
||||
|
||||
|
||||
## What is Naxsi?
|
||||
|
||||
NAXSI means [Nginx]( http://nginx.org/ ) Anti [XSS]( https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29 ) & [SQL Injection]( https://www.owasp.org/index.php/SQL_injection ).
|
||||
|
||||
Technically, it is a third party nginx module, available as a package for
|
||||
many UNIX-like platforms. This module, by default, reads a small subset of
|
||||
[simple (and readable) rules]( https://github.com/nbs-system/naxsi/blob/master/naxsi_config/naxsi_core.rules )
|
||||
containing 99% of known patterns involved in
|
||||
website vulnerabilities. For example, `<`, `|` or `drop` are not supposed
|
||||
to be part of a URI.
|
||||
|
||||
Being very simple, those patterns may match legitimate queries, it is
|
||||
the Naxsi's administrator duty to add specific rules that will whitelist
|
||||
legitimate behaviours. The administrator can either add whitelists manually
|
||||
by analyzing nginx's error log, or (recommended) start the project with an
|
||||
intensive auto-learning phase that will automatically generate whitelisting
|
||||
rules regarding a website's behaviour.
|
||||
|
||||
In short, Naxsi behaves like a DROP-by-default firewall, the only task
|
||||
is to add required ACCEPT rules for the target website to work properly.
|
||||
|
||||
## Why is it different?
|
||||
|
||||
Contrary to most Web Application Firewalls, Naxsi doesn't rely on a
|
||||
signature base like an antivirus, and thus cannot be circumvented by an
|
||||
"unknown" attack pattern. Another main difference between Naxsi and other
|
||||
WAFs, Naxsi filters only GET and POST requests,
|
||||
is [Free software]( https://www.gnu.org/licenses/gpl.html ) (as in freedom)
|
||||
and free (as in free beer) to use.
|
||||
|
||||
## What does it run on?
|
||||
Naxsi is compatible with any nginx version, although it currently doesn't play well with the new HTTPv2 protocol added in recent nginx versions. See [issue #227]( https://github.com/nbs-system/naxsi/issues/227 ) for more details.
|
||||
|
||||
It depends on `libpcre` for its regexp support, and is reported to work great on NetBSD, FreeBSD, OpenBSD, Debian, Ubuntu and CentOS.
|
||||
|
||||
### Getting started
|
||||
|
||||
- The [documentation](https://github.com/nbs-system/naxsi/wiki)
|
||||
- Some [rules]( https://github.com/nbs-system/naxsi-rules ) for mainstream software
|
||||
- The [nxapi/nxtool]( https://github.com/nbs-system/naxsi/tree/master/nxapi ) to generate rules
|
||||
Reference in New Issue
Block a user