HTTP_USER_AGENT: curl/7.47.0 – 403 error

Home Forums BulletProof Security Pro HTTP_USER_AGENT: curl/7.47.0 – 403 error

Tagged: ,

Viewing 8 posts - 16 through 23 (of 23 total)
  • Author
    Posts
  • #32956
    Mohamad Hegazy
    Participant

    no problem, i gonna remove jetpack till you guys figure it out, thank you again very much for your time, effort, and this awesome plugin.

    #32961
    AITpro Admin
    Keymaster

    Ok I finally got Jetpack installed and connected, but unfortunately the BPS POST Attack Protection Bonus Custom code will simply not work with Jetpack.  I’m not exactly sure why it does not work.  There is something happening in the background with Jetpack that is not being logged so I have nothing to go on to create a whitelist rule for whatever that might be.

    #32962
    Mohamad Hegazy
    Participant

    ok i removed it already and i will keep it like that
    i was using it for commenting platform and for automatically sharing my posts on my social media platforms.

    i will check for alternate solution

    thanks for your support
    its highly appreciated

    mean while i received those post blocked from my main page and they affect my page speed if you can take give me a whitelist codes for them

    
    [403 GET Request: 12  2017 - 4:20 ]
    BPS Pro: 12.8
    WP: 4.7.3
    Event Code: PFWR-PSBR-HPRA
    Solution: https://forum.ait-pro.com/forums/topic/security-log-event-codes/
    REMOTE_ADDR: 76.164.234.154
    Host Name: usse02.proinity.net
    SERVER_PROTOCOL: HTTP/1.0
    HTTP_CLIENT_IP: 
    HTTP_FORWARDED: 
    HTTP_X_FORWARDED_FOR: 
    HTTP_X_CLUSTER_CLIENT_IP: 
    REQUEST_METHOD: GET
    HTTP_REFERER: https://www.mtmrev.com/
    REQUEST_URI: /wp-content/plugins/better-adsmanager/js/advertising.min.js?ver=1.8.4
    QUERY_STRING: 
    HTTP_USER_AGENT: Mozilla/5.0 (X11; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0
    
    [403 GET Request: 12  2017 - 4:20 ]
    BPS Pro: 12.8
    WP: 4.7.3
    Event Code: PFWR-PSBR-HPRA
    Solution: https://forum.ait-pro.com/forums/topic/security-log-event-codes/
    REMOTE_ADDR: 76.164.234.154
    Host Name: usse02.proinity.net
    SERVER_PROTOCOL: HTTP/1.0
    HTTP_CLIENT_IP: 
    HTTP_FORWARDED: 
    HTTP_X_FORWARDED_FOR: 
    HTTP_X_CLUSTER_CLIENT_IP: 
    REQUEST_METHOD: GET
    HTTP_REFERER: https://www.mtmrev.com/
    REQUEST_URI: /wp-content/plugins/custom-sidebars/inc/external/wpmu-lib/js/wpmu-ui.3.min.js?ver=4.7.3
    QUERY_STRING: 
    HTTP_USER_AGENT: Mozilla/5.0 (X11; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0
    
    [403 GET Request: 12  2017 - 4:20 ]
    BPS Pro: 12.8
    WP: 4.7.3
    Event Code: PFWR-PSBR-HPRA
    Solution: https://forum.ait-pro.com/forums/topic/security-log-event-codes/
    REMOTE_ADDR: 76.164.234.154
    Host Name: usse02.proinity.net
    SERVER_PROTOCOL: HTTP/1.0
    HTTP_CLIENT_IP: 
    HTTP_FORWARDED: 
    HTTP_X_FORWARDED_FOR: 
    HTTP_X_CLUSTER_CLIENT_IP: 
    REQUEST_METHOD: GET
    HTTP_REFERER: https://www.mtmrev.com/
    REQUEST_URI: /wp-content/plugins/js_composer/assets/js/dist/js_composer_front.min.js?ver=5.1.1
    QUERY_STRING: 
    HTTP_USER_AGENT: Mozilla/5.0 (X11; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0
    

    thank you again for your amazing support.

    #32964
    Mohamad Hegazy
    Participant

    i will try to contact jetpack folks if they can explain what calls they used to make things functional but i guess its a lost hope specially while i’m using free version, you can enable debug mode for their plugin also from here https://jetpack.com/support/development-mode/ if it can help, because as i can see you was determined to figure it out.

    #32965
    AITpro Admin
    Keymaster

    Don’t bother asking Jetpack support about this.  They will not be able to give you answer since this is a very complex issue.  The answer is simply that you cannot use the BPS POST Attack Protection Bonus Custom Code with Jetpack. 😉

    The solution for the Visual Composer (js_composer) 403 error is here:  https://forum.ait-pro.com/forums/topic/visual-composer-blocked-by-bps-pro/#post-25258

    I checked your site and did not see any 403 errors for those other 2 Security Log entries.  So that means Plugin Firewall AutoPilot Mode already automatically created Plugin Firewall whitelist rules for these plugin scripts.  You can scroll down in your BPS Security Log and check that or check the Plugin Firewall > Plugins Script|File Whitelist Text Area to verify that whitelist rules have been created for these 2 plugin scripts.

    /better-adsmanager/js/advertising.min.js
    /custom-sidebars/inc/external/wpmu-lib/js/wpmu-ui.3.min.js

    #32966
    Mohamad Hegazy
    Participant

    then goodbye jetpack 😀

    as for the rest indeed autopilot has whitelisted all of the 3 plugins!

    i guess i have to wait 15 min after any new plugin till plugins autopilot kicks in and do its magic or simply i can decrease corn time!

    now all my problem are solved thanks to you.

    Have a very nice great day!

    #32967
    AITpro Admin
    Keymaster

    Yep, the default AutoPilot Mode cron run time is 15 minutes.  Yep, you can of course set the cron to run more frequently.  Jetpack does a lot of cool stuff, but what I don’t like about Jetpack is it requires allowing additional connections on your website, which to me means more possible ways to mess with a website. 😉  I prefer less possible ways to get hacked. ha ha ha.

    #32968
    Mohamad Hegazy
    Participant

    😀 yea if i gonna be hacked at least i know the “jetpack” reason 😀

Viewing 8 posts - 16 through 23 (of 23 total)
  • You must be logged in to reply to this topic.