Author | Kacper Wysocki |
Contact | |
Date | March 22, 2012 |
Edward B. Fjellskål, security analyst
Kacper Wysocki, security consultant
Kristian Lyngstøl, Varnish (was security analyst)
Eduardo Scarpellini, OWASP, Masters student @ ITA
Varnish has
sweet architecture
really REALLY high loads
flexible control and transparency
can make things more secure too
Usually we use varnish to:
scale a website
hack around application issues
DDoS mitigation..
Project started in 2008
XSS/hole mitigation
Can we do better?
security rule framework in VCL
PoC Breach rule translator
expert rules for GET
POST handling
what we do today:
common malicious access
SQL injection
Cross site scripting
Cloaking
reject, alert
redirect
g-line / offensive script
honeypot
Eduardo Scarpellini's VFW master thesis
Varnish 2 with inline C for POST
Testing of effectiveness
Web GUI
POST access
normalization
merge VFW and Sec.vcl
6BD0 3F9C 5F77 AD24 F60A 86EC FD82 7E34 674A 506F
References:
http://www.varnish-cache.org/trac/wiki