ModSecurity and XML-RPC?
-
In the link https://jetpack.com/support/how-to-add-jetpack-ips-allowlist/ I found the following information:
Allow all Communications Between Jetpack and WordPress.com
Some hosts and plugins believe that blocking access to xmlrpc.php will stop various hacking attempts. However, XML-RPC support has been built into WordPress core since version 3.5 and is a stable tool. Jetpack, like other plugins, services, and mobile apps, relies on the XML-RPC file to communicate with WordPress.com. If this is blocked, your Jetpack connection will stop working properly.You should be able to protect a site’s XML-RPC file without having to allow specific IP ranges. The most popular hosts use tools like fail2ban or ModSecurity, for example.If you’d prefer to use an allowlist, you’ll need to allow these IP ranges:
- 122.248.245.244/32
- 54.217.201.243/32
- 54.232.116.4/32
- 192.0.80.0/20
- 192.0.96.0/20
- 192.0.112.0/20
- 195.234.108.0/22
Important:
These IP addresses are subject to change. If you are writing IP-based firewall rules, you’ll need to update those rules any time the addresses change. We also have machine-readable versions of these IP ranges in JSON and plain text format that you can use to automate configuration changes on your systems.
When it says, “You should be able to protect a site’s XML-RPC file without having to allow specific IP ranges. The most popular hosts use tools like fail2ban or ModSecurity, for example,” it means that ModSecurity can allow blocking connections to xmlrpc except for Jetpack’s connections? If so, how would you do it with ModSecurity?In my hosting, there is a security rule that blocks requests to WordPress’ xmlrpc, which only has the option to activate or deactivate it. If it can’t be done with ModSecurity, could you provide a detailed method that allows filtering and keeping the Jetpack IP lists updated to block all other connections attempting to connect to WordPress?
The page I need help with: [log in to see the link]
- The topic ‘ModSecurity and XML-RPC?’ is closed to new replies.