-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Open
Labels
2.xRelated to ModSecurity version 2.xRelated to ModSecurity version 2.x3.xRelated to ModSecurity version 3.xRelated to ModSecurity version 3.x🥇 good first issuebugIt is a confirmed bugIt is a confirmed bugduplicateOps. Somebody else already hit that bumpOps. Somebody else already hit that bump
Description
Describe the bug
This is a duplicated issue, the first one is more that 4 years old - see #2210.
Seems like @rbl
operator does not support IPv6.
There was the issue #3111, during the investigation I found this behavior.
Logs and dumps
This is what I found the log while I tried the operator:
libmodsecurity3:
Target value: "::1" (Variable: REMOTE_ADDR)
Failed to understand `::1' as a valid IP address, assuming domain format input
RBL lookup of ::1 failed.
mod-security2:
Target value: "::1"
RBL lookup of ::1.xbl.spamhaus.org failed at REMOTE_ADDR.
The expected format would be:
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ipv6.xbl.spamhaus.org
To Reproduce
Use the rule set given at this issue comment, and send a request:
curl -H "Host: localhost" http://[::1]/
Expected behavior
In the log it should be the expected format above, eg:
RBL lookup of 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ipv6.xbl.spamhaus.org failed at REMOTE_ADDR.
Server (please complete the following information):
- ModSecurity version (and connector): libmodsecurity3 all versions, mod_security2 all versions
Metadata
Metadata
Assignees
Labels
2.xRelated to ModSecurity version 2.xRelated to ModSecurity version 2.x3.xRelated to ModSecurity version 3.xRelated to ModSecurity version 3.x🥇 good first issuebugIt is a confirmed bugIt is a confirmed bugduplicateOps. Somebody else already hit that bumpOps. Somebody else already hit that bump