![]() Check the Error log screen from the Live HTTP logs subsection, where you should find an entry like this one:Į apache2_util.c(273): ModSecurity: Access denied with code 412 (phase 2).Open the page of your website where you get the 412 error.Allow about a minute for the Live HTTP logs subsection to start displaying the logs in near real time.Navigate to the hosting Control Panel > Logs section > Live HTTP logs subsection.If you encounter an error 412 when browsing a specific page, you can easily find which mod_security2 rule triggers the error by inspecting the server error logs for your website. Finding which mod_security2 rule triggers error 412 The settings in this file apply to the directory in which it is located and recursively to its subdirectories. htaccess file can be easily created using the File Manager in the hosting Control Panel. htaccess file – it should contain the following piece of code: If your website is using an xmlrpc.php file, but it is not WordPress-based, you can still disable mod_security2 for it with an. To read more on how to allow access to this file through the WordPress section of the Control Panel, please check our Enabling access to XML-RPC article. All Jetpack IP addresses are whitelisted on our servers, so you do not need to disable mod_security2 to use the Jetpack plugin. The XML-RPC protocol is used by some WordPress modules to communicate with external resources, most notably - the Jetpack plugin and the official WordPress mobile apps. Disabling mod_security2 for XML-RPC files You can disable certain blocking rules, or completely disable mod_security2, by using an. When this happens, the error message returned by the server is 412 Request Blocked (Precondition failed). However, it is possible for certain legitimate requests/scripts to match a rule and be blocked. ![]() This additional security feature is activated by default on our servers in order to provide maximum protection from hacker attacks for the websites of our customers. Rules include blocks against common server attacks, and they filter requests to vulnerable software. ![]() ![]() Mod_security2 is an Apache2 module which blocks requests to the web server based on a list of server-side rules, also known as a Web Application Firewall ( WAF). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |