fix(waf): Add 'strict' sensitivity alias and fix false positives
- secubox_analytics.py: Add 'strict' as alias for 'aggressive' in autoban - Fix waf_bypass false positives on LuCI static resources - Root cause: different analytics versions across mitmproxy instances - Update HISTORY.md with OpenClaw Gemini fix and WAF tuning Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
parent
55ec009c13
commit
af222328ee
@ -3838,3 +3838,29 @@ git checkout HEAD -- index.html
|
||||
- Integrations view: Enable/configure messaging and productivity integrations
|
||||
- RPCD backend: 9 ubus methods (status, get_config, set_config, list_models, chat, test_api, get_history, clear_history, install, update)
|
||||
- ACL permissions for read/write operations
|
||||
|
||||
49. **OpenClaw Gemini API Integration (2026-02-27)**
|
||||
- **Problem:** Gemini 1.5 models deprecated/removed (404 errors)
|
||||
- **Fix:** Updated RPCD handler model list to current Gemini 2.x series:
|
||||
- `gemini-2.0-flash`, `gemini-2.5-flash`, `gemini-2.5-pro`, `gemini-flash-latest`
|
||||
- Tested successfully with `gemini-2.5-flash` (higher rate limits than 2.0)
|
||||
- LuCI chat and settings views working with Gemini provider
|
||||
|
||||
50. **WAF Auto-Ban Tuning & False Positive Fix (2026-02-27)**
|
||||
- **Problem:** LuCI static resources flagged as "waf_bypass" (high severity)
|
||||
- Affected URLs: `/luci-static/resources/cbi.js?v=26.021.66732~4b823e3`
|
||||
- **Root Cause:** Different `secubox_analytics.py` versions across mitmproxy instances
|
||||
- `/srv/mitmproxy-in/` had different file hash than `/srv/mitmproxy/`
|
||||
- Stale Python bytecode cache (.pyc files) still loading old code
|
||||
- **Fix:**
|
||||
- Synced identical `secubox_analytics.py` to all three mitmproxy instances
|
||||
- Cleared `__pycache__` directories in all addons folders
|
||||
- Restarted mitmproxy services
|
||||
- **Result:** No more false positives on LuCI/Nextcloud static resources
|
||||
- **Autoban Sensitivity Fix:**
|
||||
- UCI config uses `sensitivity='strict'` but code expected `'aggressive'`
|
||||
- Added `'strict'` as alias for `'aggressive'` in `_should_autoban()` function
|
||||
- Both values now trigger threshold=1 (immediate ban) behavior
|
||||
- **Verified Working:**
|
||||
- `.env` probes correctly detected as `path_scan` / `config_hunting`
|
||||
- Autoban config properly loaded: `sensitivity=strict`, `min_severity=medium`
|
||||
|
||||
@ -809,7 +809,7 @@ class SecuBoxAnalytics:
|
||||
severity_order = {'low': 0, 'medium': 1, 'high': 2, 'critical': 3}
|
||||
|
||||
# Get threshold settings based on sensitivity
|
||||
if sensitivity == 'aggressive':
|
||||
if sensitivity in ('aggressive', 'strict'):
|
||||
threshold = 1 # Immediate ban
|
||||
window = 60
|
||||
elif sensitivity == 'permissive':
|
||||
|
||||
Loading…
Reference in New Issue
Block a user