From 225ea5ac424019b6b5c042dfb921025cb543a361 Mon Sep 17 00:00:00 2001 From: sspencerwire Date: Wed, 20 Dec 2023 09:54:05 -0600 Subject: [PATCH] # `ossec-hids.md` and `modsecurity.md` * fix URLs that had changed slightly * change the version of the rules for ossec-hids to the latest --- .../web/apache_hardened_webserver/modsecurity.md | 12 ++++++------ .../web/apache_hardened_webserver/ossec-hids.md | 2 +- 2 files changed, 7 insertions(+), 7 deletions(-) diff --git a/docs/guides/web/apache_hardened_webserver/modsecurity.md b/docs/guides/web/apache_hardened_webserver/modsecurity.md index e5026eab15..ee8fe38d58 100644 --- a/docs/guides/web/apache_hardened_webserver/modsecurity.md +++ b/docs/guides/web/apache_hardened_webserver/modsecurity.md @@ -26,7 +26,7 @@ tags: If you want to use this and other hardening tools, refer back to the [Apache Hardened Web Server guide](index.md). This document also uses all of the assumptions and conventions outlined in that original document. It is a good idea to review it before continuing. -One thing missing with `mod_security` when installed from the generic Rocky Linux repositories, is that the rules installed are minimal. To get a more extensive package of no cost `mod_security` rules, this procedure uses [OWASP mod_security rules found here](https://www.netnea.com/). OWASP stands for the Open Web Application Security Project. You can [find out more about OWASP here](https://owasp.org/). +One thing missing with `mod_security` when installed from the generic Rocky Linux repositories, is that the rules installed are minimal. To get a more extensive package of no cost `mod_security` rules, this procedure uses [OWASP `mod_security` rules found here](https://coreruleset.org/). OWASP stands for the Open Web Application Security Project. You can [find out more about OWASP here](https://owasp.org/). !!! tip @@ -61,26 +61,26 @@ dnf install mod_security wget 5. Enter `wget` and paste your link. Example: ``` - wget https://github.com/coreruleset/coreruleset/archive/refs/tags/v3.3.4.tar.gz + wget https://github.com/coreruleset/coreruleset/archive/refs/tags/v3.3.5.tar.gz ``` 6. Decompress the file: ``` - tar xzvf v3.3.4.tar.gz + tar xzvf v3.3.5.tar.gz ``` - This creates a directory with the release information in the name. Example: "coreruleset-3.3.4" + This creates a directory with the release information in the name. Example: "coreruleset-3.3.5" 7. Create a symbolic link called "crs" linking to the directory of the release. Example: ``` - ln -s coreruleset-3.3.4/ /etc/httpd/conf/crs + ln -s coreruleset-3.3.5/ /etc/httpd/conf/crs ``` 8. Remove the `tar.gz` file. Example: ``` - rm -f v3.3.4.tar.gz + rm -f v3.3.5.tar.gz ``` 9. Copy the temporary configuration so that it will load when started: diff --git a/docs/guides/web/apache_hardened_webserver/ossec-hids.md b/docs/guides/web/apache_hardened_webserver/ossec-hids.md index 0302d899bf..fe9e706abc 100644 --- a/docs/guides/web/apache_hardened_webserver/ossec-hids.md +++ b/docs/guides/web/apache_hardened_webserver/ossec-hids.md @@ -40,7 +40,7 @@ dnf install wget epel-release Download and enable Atomicorp's no cost repository: ``` -wget -q -O - http://www.atomicorp.com/installers/atomic | sh +wget -q -O - https://www.atomicorp.com/installers/atomic | sh ``` This script will ask you to agree to the terms. Enter "yes" or Enter to accept the default.