A web application firewall(WAF) written in lua. This project draws lessons from loveshell/ngx_lua_waf. This project fixes some bypass loopholes in the original project.
Admittedly, there are always loopholes in firewalls, but I will insist on finding and fixing them.
If you find a bug bypassing, please submit details in `Issues'.
Project Official Website: luawaf.com
Project Mailbox: [email protected]
LuaWAF交流QQ群: 618740528
The current version will save all POST content to the log file and update the log save switch in a few days.
- Sensitive information protection. Hide server information, server field. Hide server program information, x-powered-by field.
- IP Black and White List
- URI Black and White List
- XSS protection
- SQL Injection Protection
- Path Crossing Protection
- Upload File Content Check
- Base64 Coded Content Check
- Support API protection (on schedule)
- Configurable Depth POST Detection (on schedule)
There are different ways to install OpenResty on different operating systems. Here I just take CentOS7 as an example.
yum update -y
yum install readline-devel pcre-devel openssl-devel perl gcc automake autoconf libtool make epel-release redis -y
cd Downloads
wget https://openresty.org/download/openresty-1.15.8.1.tar.gz
tar -xzvf openresty-1.15.8.1.tar.gz
cd openresty-1.15.8.1
./configure --with-luajit\
--with-http_iconv_module
gmake
gmake install
echo export PATH=$PATH:/usr/local/openresty/nginx/sbin >> /etc/profile
echo export LUAJIT_LIB=/usr/local/openresty/luajit/lib >> /etc/profile
echo export LUAJIT_INC=/usr/local/openresty/luajit/include/luajit-2.1 >> /etc/profile
source /etc/profile
mkdir /usr/local/openresty/nginx/logs/luawaf
chown nobody /usr/local/openresty/nginx/logs/luawaf
This project can run on any operating system with OpenResty installed, including but not limited to CentOS.
git clone https://github.com/wubonetcn/luawaf.git
cp luawaf /usr/local/openresty/nginx/conf/
vim /usr/local/openresty/nginx/conf/nginx.conf
/usr/local/openresty/nginx/conf/nginx.conf
user nobody;
worker_processes 1;
error_log logs/error.log;
#error_log logs/error.log notice;
#error_log logs/error.log info;
#pid logs/nginx.pid;
events {
worker_connections 1024;
}
http {
include mime.types;
default_type application/octet-stream;
#log_format main '$remote_addr - $remote_user [$time_local] "$request" '
# '$status $body_bytes_sent "$http_referer" '
# '"$http_user_agent" "$http_x_forwarded_for"';
#access_log logs/access.log main;
sendfile on;
#tcp_nopush on;
#keepalive_timeout 0;
keepalive_timeout 65;
#gzip on;
server {
listen 80;
server_name localhost;
#charset koi8-r;
#access_log logs/host.access.log main;
location / {
root html;
index index.html index.htm;
}
#error_page 404 /404.html;
# redirect server error pages to the static page /50x.html
#
error_page 500 502 503 504 /50x.html;
location = /50x.html {
root html;
}
# proxy the PHP scripts to Apache listening on 127.0.0.1:80
#
#location ~ \.php$ {
# proxy_pass http://127.0.0.1;
#}
# pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000
#
#location ~ \.php$ {
# root html;
# fastcgi_pass 127.0.0.1:9000;
# fastcgi_index index.php;
# fastcgi_param SCRIPT_FILENAME /scripts$fastcgi_script_name;
# include fastcgi_params;
#}
# deny access to .htaccess files, if Apache's document root
# concurs with nginx's one
#
#location ~ /\.ht {
# deny all;
#}
}
# another virtual host using mix of IP-, name-, and port-based configuration
#
#server {
# listen 8000;
# listen somename:8080;
# server_name somename alias another.alias;
# location / {
# root html;
# index index.html index.htm;
# }
#}
# HTTPS server
#
#server {
# listen 443 ssl;
# server_name localhost;
# ssl_certificate cert.pem;
# ssl_certificate_key cert.key;
# ssl_session_cache shared:SSL:1m;
# ssl_session_timeout 5m;
# ssl_ciphers HIGH:!aNULL:!MD5;
# ssl_prefer_server_ciphers on;
# location / {
# root html;
# index index.html index.htm;
# }
#}
lua_package_path "/usr/local/openresty/nginx/conf/luawaf/?.lua;/usr/local/openresty/lualib/?.lua;;";
lua_shared_dict limit 10m;
init_by_lua_file /usr/local/openresty/nginx/conf/luawaf/init.lua;
access_by_lua_file /usr/local/openresty/nginx/conf/luawaf/main.lua;
}
nginx
Enjoy it!
Please read those posts.
- 《基于OpenResty的WAF构建笔记》
- 《使用wrk2压力测试WAF》
- 《Web应用防火墙执行流程(执行模块)》
- 《OpenResty学习笔记》
- 《SQL注入学习笔记》
- 《XSS(跨站脚本攻击)学习笔记》
- 《Lua学习笔记》
- 《扫描器扫描、路径穿越攻击、CC攻击特征学习笔记》
- In 2019.09.01, POST checking was rewritten to support file content checking, picture horse checking and Base64 encoding checking. Fixed the bug that POST could not log normally.
- 2019.08.04 Fixed a problem that the log could not be logged properly. Added the ability to record malicious cookies. New open switches for whitelist IP and blacklist IP have been added. For this project, a simple official website
luawaf.com
has been set up. - 2019.07.09 Added LUAJIT_LIB and LUAJIT_INC configuration items to support LUAJIT.
- 2019.06.12 Open Source Project.