Skip to content

Commit 261d16c

Browse files
author
Felipe Zimmerle
committed
Version 2.8.0
1 parent 385a282 commit 261d16c

File tree

3 files changed

+67
-4
lines changed

3 files changed

+67
-4
lines changed

CHANGES

+63
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,66 @@
1+
31 Mar 2014 - 2.0.8
2+
-------------------
3+
4+
New features
5+
 * JSON Parser is no longer under tests. Now it is part of our mainline;
6+
 * Connection limits (SecConnReadStateLimit/SecConnWriteStateLimit) now support white and suspicious list;
7+
 * New variables: FULL_REQUEST and FULL_REQUEST_LENGTH were added, allowing the rules to access the full content of a request;
8+
 * ModSecurity status is now part of our mainline;
9+
 * New operator: @detectXSS was added. It makes usage of the newest libinjection XSS detection functionality;
10+
 * Append and prepend are now supported on nginx (Ref: #635);
11+
 * SecServerSignature is now available on nginx (Ref: #637).
12+
13+
Improvements 
14+
* Regression tests are not able to expect different values according to the platform;
15+
 * Visual C++ 12/10 runtime dependencies are now part of the IIS installer, no need to have it installed prior ModSecurity installation (Ref: #627);
16+
 * New script was added to the IIS versions to identify whenever there is a missing dependency (available through the Application Menu);
17+
 * Memory usage improvement: using correct memory pools according to the context (Ref: #618, #620, #619);
18+
 * Independent API call to free the connection allocations, independently from the request objects, improvements on Nginx performance, vide issue for more information (Ref: #620, #648);
19+
 * IIS installer is now using the correct 32/64bits folders to install;
20+
 * IIS Installer 32bits now refuses to install on 64bits environments;
21+
 * IIS: Using new WiX options to build the package in the correct architecture;
22+
 * While installing IIS version the installer will remove old ModSecurityIIS configuration or files before proceed with the installation, avoiding further errors;
23+
 * CRS from IIS version was upgraded to 2.2.9;
24+
 * IIS installer does not support repair anymore, in fact it was not working already and it is now disabled;
25+
 * ModSecurity now warns the user who tries to use "proxy" in IIS or Nginx. Proxy is Apache only;
26+
 * Remove warnings from the build process (Ref: #617);
27+
 * Apache configuration in regression tests was changed making it more platform independent;
28+
 * Reduced the amount of warnings during the compilation (Ref: #385a2828e87897bd611bd2a519727ef88dc6d632, #1e63e49db4a592d28e08a33fc60750c37a3886fe);
29+
* Regression tests were refactored to be more Nginx friendly;
30+
* Fixed some regression tests that were not being flexible to handle multiple platforms: (Ref #636)
31+
        - Fixed config/00-load-modsec.t test case. Now it expects for Nginx loaded message as it does for Apache. (Ref: #643);
32+
        - Fixed mixed/10-misc-directives.t. Now it does not expect for SecServerSignature on the logs, just in the headers as the Nginx does in silence.
33+
        - Fixed tnf/10-tfn-cache.t, action/10-logging.t, config/10-misc-directives.t, config/10-request-directives.t, misc/00-multipart-parser.t , misc/10-tfn-cache.t, rule/20-exceptions.t, rule/00-basics.t, rule/10-xml.t;
34+
        - Increased the timeout while reading the auditlog;
35+
        - SecAuditLogType Concurrent was removed from the regression test case, not compatible with all ports yet;
36+
        - Regression tests were speeded up, as the number of tests are growing it is impossible to have it slow;
37+
        - Fixed regression tests scripts paths, to make it MacOS friendly;
38+
        - Avoiding dead locks on Nginx regression tests by enforcing a timeout whenever a request appears to fail; 
39+
 * Updates to fix errors found by Parfait static code analysis (Ref: #612);
40+
 * Cleaning up on the repository, by removing unused files;
41+
 * IIS installer now supports to perform the installation without register the DLL on the system. It means that the user can download our MSI installer as it was a tarball archive (Ref #629, #624);
42+
 * IIS now support 32bits and 64bits pools, both are registered on IIS (Ref #628).
43+
44+
Bug fix
45+
 * Correctly handling inet_pton in IIS version;
46+
 * Nginx was missing a terminator while the charset string was mounted (Ref: #148);
47+
 * Added mod_extract_forwarded.c to run before mod_security2.c (Ref: #594);
48+
 * Added missing environment variables to regression tests;
49+
 * Build system is now more flexible by looking at liblua at: /usr/local/lib;
50+
 * Fixed typo in README file.
51+
 * Removed the non standard compliant HTTP response status code 44 from modsecurity recommended file (Ref: #665);
52+
 * Fixed segmentation fault if it fails to write on the audit log (Ref: #668);
53+
 * Not rejecting a larger request with ProcessPartial. Regression tests were also added (Ref: #597);
54+
 * Fixed UF8 to unicode conversion. Regression tests were also added(Ref: #672);
55+
 * Avoiding segmentation fault by checking if a structure is null before access its members;
56+
 * Removed double charset-header that used happen due a hardcoded charset in Nginx implementation (Ref: #650);
57+
 * Now alerting the users that there is no memory to proceed loading the configuration instead of just die;
58+
 * If SecRuleEngine is set to Off and SecRequestBodyAccess On Nginx returns error 500. Standalone is now capable to identify whenever ModSecurity is enabled or disabled, independently of ModSecurity core (Ref: #645); 
59+
 * Fixed missing headers on Nginx whenever SecResponseBodyAccess was set to On and happens to be a filter on phase equals or over 3. (Ref #634);
60+
 * IIS is now picking the correct version of AppCmd while uninstalling or installing ModSecurityISS. (Ref #632).
61+
62+
63+
164
17 Dec 2013 - 2.7.7
265
-------------------
366
Fixes:

apache2/msc_release.h

+3-3
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,10 @@
3737
#endif
3838

3939
#define MODSEC_VERSION_MAJOR "2"
40-
#define MODSEC_VERSION_MINOR "7"
41-
#define MODSEC_VERSION_MAINT "7"
40+
#define MODSEC_VERSION_MINOR "8"
41+
#define MODSEC_VERSION_MAINT "0"
4242
#define MODSEC_VERSION_TYPE ""
43-
#define MODSEC_VERSION_RELEASE ""
43+
#define MODSEC_VERSION_RELEASE "-RC1"
4444

4545
#define MODSEC_VERSION_SUFFIX MODSEC_VERSION_TYPE MODSEC_VERSION_RELEASE
4646

iis/installer.wxs

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
lightArgs:
88
-->
99
<Wix xmlns="http://schemas.microsoft.com/wix/2006/wi" xmlns:util="http://schemas.microsoft.com/wix/UtilExtension">
10-
<Product Id="22B04FDB-9BAB-46B0-87B8-A39544ECECD3" Name="ModSecurity IIS" Language="1033" Version="2.7.7" Manufacturer="ModSecurity" UpgradeCode="82F09489-1678-4C38-ADCB-08C3757653DB">
10+
<Product Id="22B04FDB-9BAB-46B0-87B8-A39544ECECD3" Name="ModSecurity IIS" Language="1033" Version="2.8.0" Manufacturer="ModSecurity" UpgradeCode="82F09489-1678-4C38-ADCB-08C3757653DB">
1111
<Package Description="ModSecurityISS" Comments="none" InstallerVersion="405" Compressed="yes" InstallPrivileges="elevated" InstallScope="perMachine" />
1212
<?define ProductName = "ModSecuirty IIS" ?>
1313
<?if $(sys.BUILDARCH) = x64 ?>

0 commit comments

Comments
 (0)