Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

413 Request entity too large

In the WAF configuration If an user upload a file greater than 1 Mb receives the error 
Request body no files data length is larger than the configured limit - 413 Request entity too large

 

I found in the UTM you can modify the squid.conf-default, but I didn´t fine anythig about th XG.

 

Someone will know how to increase the Mb??



This thread was automatically locked due to age.
  • I am thinking this may require to stop a service, apache perhaps? But on this aspect I am not 100% sure.

    Respectfully, 

     

    Badrobot

     

  • Darn.. 

    It appears that the file is owned by root..

    The permissions are not there for the user "admin" to edit it.

    XG330_WP02_SFOS 17.5.7 MR-7# ls -l
    -rw-r--r-- 1 root 0 1844 Jul 4 08:40 base.conf 

    In order to make any changes to it the admin user would need to be a member of the sudoers group and/or you'd need root access.. (which you probably do)

  • Wonderful.

    So the only way to test this now is to have their dev team do it.

    I guess I'll be getting back on the phone.. mind you, the hold music loop is atrocious at best.. but hey why not, I haven't got anything better to do with my day.. 

    No root huh?.. grrrr.. 

  • Yes I do not know why they don't replace the hold music with IT related news.

    Respectfully, 

     

    Badrobot

     

  • I've spoken to some people in some pretty high places and I'm still waiting to hear from someone at the very very top.

    So as of the time of this post the only thing we can currently do to get this applied and working is to manually update the db record and force an update to the waf_reconfig.

     

    First is that you need to know all of the exclusions(skips) you'll need to enter into the policy under the GUI. 

    Add them them in and then save the policy. 

     

    You also need to know the policy ID, so you would run:  psql -U nobody -d corporate -c "select * from tblwafsecurityprofile;"

    (my query returns)

    Look for the number at the beginning of the line listing your policy, in my case the ID I'm interested in is 7.

    Next you'd need to apply the change to the value in the sec_request_body_no_files_limit record. in my case I'm defining it to be 10MB and I'm telling the query to apply it to policy ID = 7

    psql -U nobody -d corporate -c "update tblwafsecurityprofile set sec_request_body_no_files_limit ="10485760" where id ="7";"

    Then finally you need to force the system to update the important files with:

    opcode waf_reconfig -t json -b '{"Entity": "waf_advanced_config", "Event": "UPDATE"}' -ds nosync

    This will rebuild the reverseporxy.conf and get the WAF up and running with the new larger limit.. 

    After this is done, If you make ANY changes to this policy in the GUI you will need to do the above process again because the default 1048576 value will be reinserted into the db and reverseproxy.conf bringing you back to the broken and unusable 413 issue.

  • Hi

    We also have a remote sesion with support, and also he use the commands you mention:

     

    "We run the following commands in the XG to increase the file size allowed in the WAF from 1048576 [1MB] to 52428800 [50MB]. With the following command:

    SFVUNL_VM01_SFOS 17.5.7 MR-7# psql -U nobody -d corporate -c "update tblwafsecur
    ityprofile set sec_request_body_no_files_limit ="52428800" where id ="7";"
    UPDATE 1
    .
    SFVUNL_VM01_SFOS 17.5.7 MR-7# opcode waf_reconfig -t json -b '{"Entity": "waf_ad
    vanced_config", "Event": "UPDATE"}' -ds nosync
    200 OK
    { "status": "200", "statusmessage": "success" }
    .
    SFVUNL_VM01_SFOS 17.5.7 MR-7# psql -U nobody -d corporate -c "select name,id,sec
    _request_body_no_files_limit from tblwafsecurityprofile;"
               name            | id | sec_request_body_no_files_limit
    ---------------------------+----+---------------------------------
     Exchange AutoDiscover     |  1 |                         1048576
     Exchange General          |  2 |                         1048576
     Microsoft Lync            |  4 |                         1048576
     Microsoft RDG 2008        |  5 |                         1048576
     Microsoft RD Web 2008     |  6 |                         1048576
     Exchange Outlook Anywhere |  3 |                         1048576
     WAF Police                |  7 |                        52428800

     

    but we got the error again with files of more than 49KB, smaller than these worked fine.

     

    On the IIS we increase this value "" uploadReadAheadSize "which by default is -49KB to a larger one, after this all the files that failed previously it was possible to load them, although with 30MB files this still failed, but this change lets us see that the problem indicates that it is a configuration in the IIS that needs to be changed."

     

    So we´re waiting for the reply to this, because if we try to upload a file without passing through the WAF, and we did´t have this problem.

    I´ll let you know

     

  • I'm glad to read abut your progress. I'd be curious if you're working with Arjun.. He's been most helpful.

    Yes, IIS uploadReadAhaeadSize will definitely cause this issue, Actually that's the first thing we changed before I dove into the rabbit hole chasing this configuration directive override.

    If the WAF is blocking the transaction you can easily monitor it by watching the /log/reverseproxy.log during the post to the IIS server.

    That way you can see if it's the WAF or IIS dropping your file transfer at 30mb.

    tail -f reverseproxy.log | grep -i "<Testing PC IP Addy>"

    There is the possibility that another scan is killing the transfer for some other reason like a false positive on a Restricted SQL Character Anomaly, or some other pattern match.

    ...then again you wouldn't get a 413..

    Happy hunting. Just keep in mind that if you find that you need to add another rule ID to the skip rules list, you'll also need to reapply the value change to the db and rerun the opcode to apply the change again to your system.

    ...at least until they get a fix rolled out for this bug.

  • I just ran into the same problem, I will apply the commands, thanks all for your effort and sharing that information. But did any of know if this bug will be fixed? and if so, in which release?

     

    Thanks in advance

  • I just wanted to comment that this is still a ongoing issue and the fix listed here does not seem to be working for me.  We have a standard ActiveSync rule setup and it uses the "Exchange General" protection policy.  After upgrading from 17.5 MR 12 to 18 we no longer could receive attachments on emails from all our mobile clients.  After finding a similar thread (https://community.sophos.com/products/xg-firewall/f/email-protection/121372/exchange-server-via-activesync) and this thread I disabled the "Common threats filter" and email started working.  Turn it back on and it blocks them.  The log files show its because of file size but it doesn't make any sense since there is no "size" constraint under the common threats filter settings. The log file clearly shows its a size limit issue:

     

    [Wed Jul 22 10:01:48.054627 2020] [security2:error] [pid 14626:tid 140011471025920] [client 173.230.141.208:4131] [client 173.230.141.208] ModSecurity: Request body no files data length is larger than the configured limit (1048576).. Deny with code (413) [hostname "our.domain.com"] [uri "/Microsoft-Server-ActiveSync"] [unique_id "XxhGy38AAAEAADkiHDcAAABK"]

     

    Been going back and forth with support about it with no solution yet.  I have both the Exchange General and Exchange Outlook Anywhere policies set up to 30Mb with no change.  Turn off "Common threat filter" and it works fine but that's not the answer.  Also worked fine before the upgrade to 18.