-
Notifications
You must be signed in to change notification settings - Fork 291
header already sent while sending response to client #14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @amq, Sorry for the delay. Thank you for the report. We are investigating. |
Hi @amq, I was testing the issue using the following versions:
The problem seems to be fixed using ModSecurity as static module. Notice that in addition to the rules used in your test, I have also set "block" to deny with 403, as illustrated below:
It seems like running the module as dynamic leads nginx to an infinite loop. It may not be a problem with ModSecurity-nginx itself, but with the nginx. Thereat, I am inviting @phantom-az to the discussion. |
@phantom-az, any news on this one? Have you had a chance to get something? |
I checked the same configuration with nginx/1.11.5, image_filter module from nginx-module-image-filter package, libmodsecurity from owasp-modsecurity/ModSecurity@1b28776 and libmodsecurity nginx connector module from 7d2a4ee, and everything works just fine. Configuration:
Requests:
Access log:
Error log:
modsec_debug.log:
|
Closing this issue based on @defanator comments. |
nginx -V
nginx.conf
site.com.conf
access.log
error.log
nginx.spec
/opt/ModSecurity
git status
git log -n 1
~/rpmbuild/SOURCES/ModSecurity-nginx
git status
git log -n 1
The text was updated successfully, but these errors were encountered: