| Author | Kacper Wysocki |
| Contact | |
| Date | March 22, 2012 |
Edward B. Fjellskål, security analyst
Kacper Wysocki, security consultant
Kristian Lyngstøl, Varnish (was security analyst)
Eduardo Scarpellini, OWASP, Masters student @ ITA

Varnish has
sweet architecture
really REALLY high loads
flexible control and transparency
can make things more secure too


Usually we use varnish to:
scale a website
hack around application issues

DDoS mitigation..
Project started in 2008
XSS/hole mitigation
Can we do better?

security rule framework in VCL
PoC Breach rule translator
expert rules for GET
POST handling

what we do today:
common malicious access
SQL injection
Cross site scripting
Cloaking

reject, alert
redirect
g-line / offensive script
honeypot

Eduardo Scarpellini's VFW master thesis
Varnish 2 with inline C for POST
Testing of effectiveness
Web GUI

POST access
normalization
merge VFW and Sec.vcl

6BD0 3F9C 5F77 AD24 F60A 86EC FD82 7E34 674A 506F
References:
http://www.varnish-cache.org/trac/wiki