I have an apache server with ModSecurity. I need to block all IPs except for a few ones.
The list of IPs is like this:
194.83.128.0/21
191.143.32.0/19
145.126.72.0/21
101.28.248.0/22
40.64.64.0/22
180.11.124.0/22
190.230.64.0/18
109.154.0.0/16
42.60.0.0/16
43.223.0.0/16
2a03:e980::/29
Right now I applied this rule:
SecRule REMOTE_ADDR "@ipMatch 194.83.128.0/21,191.145.32.0/19,145.126.72.0/21,101.28.248.0/22,40.64.64.0/22,180.11.124.0/22,190.230.64.0/18,109.154.0.0/16,42.60.0.0/16,43.223.0.0/16,2a03:e980::/29" "id:162"
But the rule above seems to be doing a whitelist rather than blocking all IPs except for the ones defined in the rule.
I'm not sure how to achieve blocking all IPs except the ones on my list. Most of the documentation I have found is related to blocking or adding IPs to a deny list, when some action happens, like constantly accessing 404 pages.
Is there a way to block by default all the IPs, except the ones defined in my list?
There are a couple options that you can use here.
This will allow only the IPs you add to that list.
The rule you want is to do something similar to:
Adding all your IP CIDR ranges on that list.
Optionally you can use store that list in a file (in this example,
ips.txt
) with one cidr range per line and use the@ipMatchFromFile
operator:In the modsecurity rule I added the
nolog
action so you won't see any matches from those IPs. If you want to take a peek and see that they are being recognized, uselog
instead.Warning Note: please be 100% sure that no attacks are coming from your networks. Pay special attention to SSRF. Because this will disable modsecurity entirely from anything coming from your listed IP ranges.