OK - regarding
https://support.plesk.com/hc/en-us/...*MTczNzU2MzI2MS4xNy4xLjE3Mzc1NjMzOTguNjAuMC4w
- When i disable OWASP rules #1 949110 and 959100 globally, it works - but that is for EVERY DOMAIN
- When i disable OWASP rules #1 949110 and 959100 for domain (www.)mydomain.com it does
NOT work for webmail.mydomain.com
So you think this is correctly?
Fully disabling OWASP for a subdomain( e.g. webmail.*) is easy:
SecRule REQUEST_HEADERS:Host "@beginsWith webmail." \
"id:1001010,\
phase:1,\
pass,\
nolog,\
setvar:tx.webmail_roundcube=1"
SecRule TX:webmail_roundcube "@eq 1" \
"id:1001011,\
phase:1,\
pass,\
nolog,\
ctl:ruleRemoveByTag=OWASP_CRS"
Paste these 2 rules into additional global modsec rules.
Only disabling SOME of the rules depending on conditions however is the issue I am trying to solve.
There is an officially tested OWASP plugin (
GitHub - EsadCetiner/roundcube-rule-exclusions-plugin: OWASP CRS 3rd party plugin for Roundcube webmail) for roundcube that disables certain rules, while keeping others enabled for roundcube.
However, the plugin uses a relative path like / or /roundcube/, not a subdomain or whatever internal URL (re)-writing that might go on within Plesk for roundcube.
With the Comodo ruleset basically stagnant, and Atomicorp free being very basic, it would be cool if at least the apps that come with / are supported by Plesk, like Roundcube, are made compatible with the OWASP ruleset by Plesk, maybe by maintaining a conditional whitelist like the plugin does. Because, otherwise, if integral services like webmail stop working when using this ruleset, it’s either quite useless or quite unsafe, if the „solution“ is to disable triggered rules globally.