mirror of
https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker.git
synced 2025-09-01 18:19:55 +00:00
Update Regex Pattern [ci skip]
This commit is contained in:
parent
caea2eef4e
commit
395dc75615
1 changed files with 15 additions and 15 deletions
|
@ -5,8 +5,8 @@
|
|||
|
||||
# VERSION INFORMATION #
|
||||
#----------------------
|
||||
# Version: V4.2019.07
|
||||
# Updated: 2019-06-28
|
||||
# Version: V4.2019.08
|
||||
# Updated: 2019-07-05
|
||||
#----------------------
|
||||
# VERSION INFORMATION #
|
||||
|
||||
|
@ -40,25 +40,25 @@
|
|||
|
||||
# Make sure any words that contain special characters are escaped and include word boundaries as per the Regex examples below.
|
||||
|
||||
# Example the User-Agent name "someverybaduseragentname1" is entered as "(?:\b)someverybaduseragentname1(?:\b|)"
|
||||
# Example the User-Agent name "some-very-bad-useragentname2" is entered as "(?:\b)some\-very\-bad\-useragentname1(?:\b|)"
|
||||
# the "(?:\b)" and "(?:\b|)" are word boundaries which prevents partial matching and false positives.
|
||||
# Example the User-Agent name "someverybaduseragentname1" is entered as "(?:\b)someverybaduseragentname1(?:\b)"
|
||||
# Example the User-Agent name "some-very-bad-useragentname2" is entered as "(?:\b)some\-very\-bad\-useragentname1(?:\b)"
|
||||
# the "(?:\b)" and "(?:\b)" are word boundaries which prevents partial matching and false positives.
|
||||
|
||||
# BY DEFAULT ALL THE EXAMPLES BELOW ARE COMMENTED OUT AND HENCE NOT ENABLED
|
||||
|
||||
# ---------------------
|
||||
# WHITELISTING EXAMPLES
|
||||
# ---------------------
|
||||
# "~*(?:\b)someverygooduseragentname1(?:\b|)" 0;
|
||||
# "~*(?:\b)someverygooduseragentname2(?:\b|)" 0;
|
||||
# "~*(?:\b)some\-very\-good\-useragentname2(?:\b|)" 0;
|
||||
# "~*(?:\b)someverygooduseragentname1(?:\b)" 0;
|
||||
# "~*(?:\b)someverygooduseragentname2(?:\b)" 0;
|
||||
# "~*(?:\b)some\-very\-good\-useragentname2(?:\b)" 0;
|
||||
|
||||
# ---------------------
|
||||
# BLACKLISTING EXAMPLES
|
||||
# ---------------------
|
||||
# "~*(?:\b)someverybaduseragentname1(?:\b|)" 3;
|
||||
# "~*(?:\b)someverybaduseragentname2(?:\b|)" 3;
|
||||
# "~*(?:\b)some\-very\-bad\-useragentname2(?:\b|)" 3;
|
||||
# "~*(?:\b)someverybaduseragentname1(?:\b)" 3;
|
||||
# "~*(?:\b)someverybaduseragentname2(?:\b)" 3;
|
||||
# "~*(?:\b)some\-very\-bad\-useragentname2(?:\b)" 3;
|
||||
|
||||
# Here are some default things I block on my own server, these appear in various types of injection attacks
|
||||
# You can disable them if you have problems or don't agree by switching thir value to 0 or moving them into the whitelist section first and then making their value 0
|
||||
|
@ -73,7 +73,7 @@
|
|||
# MY BLACKLIST
|
||||
# ------------
|
||||
|
||||
"~*(?:\b)x22(?:\b|)" 3;
|
||||
"~*(?:\b){|}(?:\b|)" 3;
|
||||
"~*(?:\b|)mb_ereg_replace(?:\b|)" 3;
|
||||
"~*(?:\b|)file_put_contents(?:\b|)" 3;
|
||||
"~*(?:\b)x22(?:\b)" 3;
|
||||
"~*(?:\b){|}(?:\b)" 3;
|
||||
"~*(?:\b)mb_ereg_replace(?:\b)" 3;
|
||||
"~*(?:\b)file_put_contents(?:\b)" 3;
|
||||
|
|
Loading…
Add table
Reference in a new issue