Home › Forums › BulletProof Security Pro › HTTP_USER_AGENT: curl/7.47.0 – 403 error
- This topic has 22 replies, 2 voices, and was last updated 7 years, 11 months ago by
Mohamad Hegazy.
-
AuthorPosts
-
Mohamad Hegazy
Participantno problem, i gonna remove jetpack till you guys figure it out, thank you again very much for your time, effort, and this awesome plugin.
AITpro Admin
KeymasterOk I finally got Jetpack installed and connected, but unfortunately the BPS POST Attack Protection Bonus Custom code will simply not work with Jetpack. I’m not exactly sure why it does not work. There is something happening in the background with Jetpack that is not being logged so I have nothing to go on to create a whitelist rule for whatever that might be.
Mohamad Hegazy
Participantok i removed it already and i will keep it like that
i was using it for commenting platform and for automatically sharing my posts on my social media platforms.i will check for alternate solution
thanks for your support
its highly appreciatedmean while i received those post blocked from my main page and they affect my page speed if you can take give me a whitelist codes for them
[403 GET Request: 12 2017 - 4:20 ] BPS Pro: 12.8 WP: 4.7.3 Event Code: PFWR-PSBR-HPRA Solution: https://forum.ait-pro.com/forums/topic/security-log-event-codes/ REMOTE_ADDR: 76.164.234.154 Host Name: usse02.proinity.net SERVER_PROTOCOL: HTTP/1.0 HTTP_CLIENT_IP: HTTP_FORWARDED: HTTP_X_FORWARDED_FOR: HTTP_X_CLUSTER_CLIENT_IP: REQUEST_METHOD: GET HTTP_REFERER: https://www.mtmrev.com/ REQUEST_URI: /wp-content/plugins/better-adsmanager/js/advertising.min.js?ver=1.8.4 QUERY_STRING: HTTP_USER_AGENT: Mozilla/5.0 (X11; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0 [403 GET Request: 12 2017 - 4:20 ] BPS Pro: 12.8 WP: 4.7.3 Event Code: PFWR-PSBR-HPRA Solution: https://forum.ait-pro.com/forums/topic/security-log-event-codes/ REMOTE_ADDR: 76.164.234.154 Host Name: usse02.proinity.net SERVER_PROTOCOL: HTTP/1.0 HTTP_CLIENT_IP: HTTP_FORWARDED: HTTP_X_FORWARDED_FOR: HTTP_X_CLUSTER_CLIENT_IP: REQUEST_METHOD: GET HTTP_REFERER: https://www.mtmrev.com/ REQUEST_URI: /wp-content/plugins/custom-sidebars/inc/external/wpmu-lib/js/wpmu-ui.3.min.js?ver=4.7.3 QUERY_STRING: HTTP_USER_AGENT: Mozilla/5.0 (X11; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0 [403 GET Request: 12 2017 - 4:20 ] BPS Pro: 12.8 WP: 4.7.3 Event Code: PFWR-PSBR-HPRA Solution: https://forum.ait-pro.com/forums/topic/security-log-event-codes/ REMOTE_ADDR: 76.164.234.154 Host Name: usse02.proinity.net SERVER_PROTOCOL: HTTP/1.0 HTTP_CLIENT_IP: HTTP_FORWARDED: HTTP_X_FORWARDED_FOR: HTTP_X_CLUSTER_CLIENT_IP: REQUEST_METHOD: GET HTTP_REFERER: https://www.mtmrev.com/ REQUEST_URI: /wp-content/plugins/js_composer/assets/js/dist/js_composer_front.min.js?ver=5.1.1 QUERY_STRING: HTTP_USER_AGENT: Mozilla/5.0 (X11; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0
thank you again for your amazing support.
Mohamad Hegazy
Participanti will try to contact jetpack folks if they can explain what calls they used to make things functional but i guess its a lost hope specially while i’m using free version, you can enable debug mode for their plugin also from here https://jetpack.com/support/development-mode/ if it can help, because as i can see you was determined to figure it out.
AITpro Admin
KeymasterDon’t bother asking Jetpack support about this. They will not be able to give you answer since this is a very complex issue. The answer is simply that you cannot use the BPS POST Attack Protection Bonus Custom Code with Jetpack. 😉
The solution for the Visual Composer (js_composer) 403 error is here: https://forum.ait-pro.com/forums/topic/visual-composer-blocked-by-bps-pro/#post-25258
I checked your site and did not see any 403 errors for those other 2 Security Log entries. So that means Plugin Firewall AutoPilot Mode already automatically created Plugin Firewall whitelist rules for these plugin scripts. You can scroll down in your BPS Security Log and check that or check the Plugin Firewall > Plugins Script|File Whitelist Text Area to verify that whitelist rules have been created for these 2 plugin scripts.
/better-adsmanager/js/advertising.min.js
/custom-sidebars/inc/external/wpmu-lib/js/wpmu-ui.3.min.jsMohamad Hegazy
Participantthen goodbye jetpack 😀
as for the rest indeed autopilot has whitelisted all of the 3 plugins!
i guess i have to wait 15 min after any new plugin till plugins autopilot kicks in and do its magic or simply i can decrease corn time!
now all my problem are solved thanks to you.
Have a very nice great day!
AITpro Admin
KeymasterYep, the default AutoPilot Mode cron run time is 15 minutes. Yep, you can of course set the cron to run more frequently. Jetpack does a lot of cool stuff, but what I don’t like about Jetpack is it requires allowing additional connections on your website, which to me means more possible ways to mess with a website. 😉 I prefer less possible ways to get hacked. ha ha ha.
Mohamad Hegazy
Participant😀 yea if i gonna be hacked at least i know the “jetpack” reason 😀
-
AuthorPosts
- You must be logged in to reply to this topic.