Releases: jazir555/NGINX-8G-Firewall
V2 - Events section added to the top of the config
V1 full release
This is the initial full release of the 8G nginx firewall rules.
Changes made:
-
Removes unnecessary leading quote character from the XSS detection pattern.
-
Adds word boundaries to the SQL injection patterns for improved accuracy.
-
Added a $ anchor at the end ensures it matches the TLD at the end of the domain, reducing false positives where those strings might appear as substrings
-
Modified some overly broad regex patterns
-
Reduced redundancy
-
Provide more clear, structured comments to explain each section.
-
Ensured logging of blocked requests is in place and properly configured.
-
Went ballistic and added more rules
Version 5 - Release Candidate
Release Candidate version of the 8G NGINX firewall rules
V3
V3 8G firewall with enhanced protections:
1. Additional Event Handler Coverage:
Expands coverage by adding modern event handlers such as touchstart, touchmove, pointerdown, pointerup, and wheel. These additions help mitigate more advanced XSS and DOM manipulation techniques targeting mobile and modern web apps.
2. More Comprehensive SQL Injection Protections:
Extends SQLi protection to include time-based SQL injection methods (pg_sleep, pg_terminate_backend) and encoding techniques (like hex(), ascii()), offering broader defense against various database types.
3. Extended Command Injection Protection:
Significantly expands command injection detection by including additional dangerous binaries and system commands, such as openssl, tcpdump, gdb, and strace. These are frequently used in post-exploitation scenarios and can be used for privilege escalation or lateral movement.
4. Improved Evasive Encoding Detection:
Incorporates detection for advanced encoding manipulation, such as base64 payloads and hex encoding strategies used to bypass standard input filters.
5. Expanded Directory Traversal and File Inclusion Protections:
Extends to block additional sensitive files (like .bash_history, .pem, php://stdin, and phar://). This enhances protection against RFI/LFI attacks targeting broader file systems.
6. Advanced User Agent Blocking:
Includes more modern attack tools and user agents for headless browsers (like puppeteer, selenium, phantomjs), which are often used in scraping or automated attacks.
7. Additional Referrer Blocking:
Introduces more sophisticated referrer blocking, targeting SEO spam and referrer manipulation attacks using base64-encoded data and javascript-injection techniques.
8. Expanded File Extension Coverage
9. Rate Limiting on More Paths:
10. Stricter SSRF Protection:
Strengthens protections against SSRF attacks by more thoroughly blocking internal network ranges, cloud metadata services (AWS, GCP), and expanding to IPv6.