Skip to main content
Version: Next

chaitin-waf

Description#

After enabling the chaitin-waf plugin, the traffic will be forwarded to the Chaitin WAF service for detection and prevention of various web application attacks, ensuring the security of the application and user data.

Response Headers#

Depending on the plugin configuration, it is optional to add additional response headers.

The response headers are listed below:

  • X-APISIX-CHAITIN-WAF: Whether APISIX forwards the request to the WAF server.
    • yes: forwarded
    • no: not forwarded
    • unhealthy: matches the match variables, but no WAF server is available.
    • err: an error occurred during the execution of the plugin. Also includes the X-APISIX-CHAITIN-WAF-ERROR header.
    • waf-err: error while interacting with the WAF server. Also includes the X-APISIX-CHAITIN-WAF-ERROR header.
    • timeout: request to the WAF server timed out.
  • X-APISIX-CHAITIN-WAF-ERROR: Debug header. Contains WAF error message.
  • X-APISIX-CHAITIN-WAF-TIME: The time in milliseconds that APISIX spent interacting with WAF.
  • X-APISIX-CHAITIN-WAF-STATUS: The status code returned to APISIX by the WAF server.
  • X-APISIX-CHAITIN-WAF-ACTION: The action returned to APISIX by the WAF server.
    • pass: request valid and passed.
    • reject: request rejected by WAF service.
  • X-APISIX-CHAITIN-WAF-SERVER: Debug header. Indicates which WAF server was selected.

Plugin Metadata#

NameTypeRequiredDefault valueDescription
nodesarray(object)trueA list of addresses for the Chaitin SafeLine WAF service.
nodes[0].hoststringtrueThe address of Chaitin SafeLine WAF service. Supports IPv4, IPv6, Unix Socket, etc.
nodes[0].portintegerfalse80The port of the Chaitin SafeLine WAF service.
modestringfalseblockThe global default mode if a Route doesn't specify its own: off, monitor, or block.
configobjectfalseWAF configuration defaults if none are specified on the Route.
config.connect_timeoutintegerfalse1000Connect timeout, in milliseconds.
config.send_timeoutintegerfalse1000Send timeout, in milliseconds.
config.read_timeoutintegerfalse1000Read timeout, in milliseconds.
config.req_body_sizeintegerfalse1024Request body size, in KB.
config.keepalive_sizeintegerfalse256Maximum concurrent idle connections to the SafeLine WAF detection service.
config.keepalive_timeoutintegerfalse60000Idle connection timeout, in milliseconds.
config.real_client_ipbooleanfalsetrueSpecifies whether to use the X-Forwarded-For as the client IP (if present). If false, uses the direct client IP from the connection.
note

You can fetch the admin_key from config.yaml and save to an environment variable with the following command:

admin_key=$(yq '.deployment.admin.admin_key[0].key' conf/config.yaml | sed 's/"//g')
curl http://127.0.0.1:9180/apisix/admin/plugin_metadata/chaitin-waf -H "X-API-KEY: $admin_key" -X PUT -d '
{
"nodes": [
{
"host": "unix:/path/to/safeline/resources/detector/snserver.sock",
"port": 8000
}
],
"mode": "block",
"config": {
"real_client_ip": true
}
}'

Attributes#

NameTypeRequiredDefault valueDescription
modestringfalseblockDetermines how the plugin behaves for matched requests. Valid values are off, monitor, or block. When set to off, the plugin skips WAF checks. In monitor mode, the plugin logs potential blocks without actually blocking the request. In block mode, the plugin enforces blocks as determined by the WAF service.
matcharray[object]falseA list of matching rules. The plugin evaluates these rules to decide whether to perform the WAF check on a request. If empty, all requests are processed.
match.varsarray[array]falseList of variables used for matching requests. Each rule is specified as [variable, operator, value] (for example, ["http_waf", "==", "true"]). These variables refer to NGINX internal variables. For supported operators, see lua-resty-expr.
append_waf_resp_headerboolfalsetrueDetermines whether the plugin adds WAF-related response headers (such as X-APISIX-CHAITIN-WAF, X-APISIX-CHAITIN-WAF-ACTION, etc.) to the response.
append_waf_debug_headerboolfalsefalseDetermines whether debugging headers (such as X-APISIX-CHAITIN-WAF-ERROR and X-APISIX-CHAITIN-WAF-SERVER) are added. Effective only when append_waf_resp_header is enabled.
configobjectfalseProvides route-specific configuration for the Chaitin SafeLine WAF service. Settings here override the corresponding metadata defaults when specified.
config.connect_timeoutintegerfalse1000The connect timeout for the WAF server, in milliseconds.
config.send_timeoutintegerfalse1000The send timeout for transmitting data to the WAF server, in milliseconds.
config.read_timeoutintegerfalse1000The read timeout for receiving data from the WAF server, in milliseconds.
config.req_body_sizeintegerfalse1024The maximum allowed request body size, in KB.
config.keepalive_sizeintegerfalse256The maximum number of idle connections to the WAF detection service that can be maintained concurrently.
config.keepalive_timeoutintegerfalse60000The idle connection timeout for the WAF service, in milliseconds.
config.real_client_ipbooleanfalsetrueSpecifies whether to determine the client IP from the X-Forwarded-For header. If set to false, the plugin uses the direct client IP from the connection.

Below is a sample Route configuration that uses:

  • httpbun.org as the upstream backend.
  • mode set to monitor, so the plugin only logs potential blocks.
  • A matching rule that triggers the plugin when the custom header waf: true is set.
  • An override to disable the real client IP logic by setting config.real_client_ip to false.
curl http://127.0.0.1:9180/apisix/admin/routes/1 \
-H "X-API-KEY: $admin_key" \
-X PUT -d '
{
"uri": "/*",
"plugins": {
"chaitin-waf": {
"mode": "monitor",
"match": [
{
"vars": [
["http_waf", "==", "true"]
]
}
],
"config": {
"real_client_ip": false
},
"append_waf_resp_header": true,
"append_waf_debug_header": false
}
},
"upstream": {
"type": "roundrobin",
"nodes": {
"httpbun.org:80": 1
}
}
}'

Test Plugin#

With the sample configuration described above (including your chosen mode and real_client_ip settings), the plugin behaves as follows:

  • If the match condition is not satisfied (for example, waf: true is missing), the request proceeds normally without contacting the WAF. You can observe:

    curl -H "Host: httpbun.org" http://127.0.0.1:9080/get -i

    HTTP/1.1 200 OK
    Content-Type: application/json
    Content-Length: 408
    Connection: keep-alive
    X-APISIX-CHAITIN-WAF: no
    Date: Wed, 19 Jul 2023 09:30:42 GMT
    X-Powered-By: httpbun/3c0dc05883dd9212ac38b04705037d50b02f2596
    Server: APISIX/3.3.0

    {
    "args": {},
    "headers": {
    "Accept": "*/*",
    "Connection": "close",
    "Host": "httpbun.org",
    "User-Agent": "curl/8.1.2",
    "X-Forwarded-For": "127.0.0.1",
    "X-Forwarded-Host": "httpbun.org",
    "X-Forwarded-Port": "9080",
    "X-Forwarded-Proto": "http",
    "X-Real-Ip": "127.0.0.1"
    },
    "method": "GET",
    "origin": "127.0.0.1, 122.231.76.178",
    "url": "http://httpbun.org/get"
    }
  • Potential injection requests (e.g., containing SQL snippets) are forwarded unmodified if they do not meet the plugin’s match rules, and might result in a 404 Not Found or other response from the upstream:

      curl -H "Host: httpbun.org" http://127.0.0.1:9080/getid=1%20AND%201=1 -i

    HTTP/1.1 404 Not Found
    Content-Type: text/plain; charset=utf-8
    Content-Length: 19
    Connection: keep-alive
    X-APISIX-CHAITIN-WAF: no
    Date: Wed, 19 Jul 2023 09:30:28 GMT
    X-Content-Type-Options: nosniff
    X-Powered-By: httpbun/3c0dc05883dd9212ac38b04705037d50b02f2596
    Server: APISIX/3.3.0

    404 page not found
  • Matching safe requests (those that satisfy match.vars, such as -H "waf: true") are checked by the WAF. If deemed harmless, you see:

      curl -H "Host: httpbun.org" -H "waf: true" http://127.0.0.1:9080/get -i

    HTTP/1.1 200 OK
    Content-Type: application/json
    Content-Length: 427
    Connection: keep-alive
    X-APISIX-CHAITIN-WAF-TIME: 2
    X-APISIX-CHAITIN-WAF-STATUS: 200
    X-APISIX-CHAITIN-WAF: yes
    X-APISIX-CHAITIN-WAF-ACTION: pass
    Date: Wed, 19 Jul 2023 09:29:58 GMT
    X-Powered-By: httpbun/3c0dc05883dd9212ac38b04705037d50b02f2596
    Server: APISIX/3.3.0

    {
    "args": {},
    "headers": {
    "Accept": "*/*",
    "Connection": "close",
    "Host": "httpbun.org",
    "User-Agent": "curl/8.1.2",
    "Waf": "true",
    "X-Forwarded-For": "127.0.0.1",
    "X-Forwarded-Host": "httpbun.org",
    "X-Forwarded-Port": "9080",
    "X-Forwarded-Proto": "http",
    "X-Real-Ip": "127.0.0.1"
    },
    "method": "GET",
    "origin": "127.0.0.1, 122.231.76.178",
    "url": "http://httpbun.org/get"
    }
  • Suspicious requests that meet the plugin’s match rules and are flagged by the WAF are typically rejected with a 403 status, along with headers that include X-APISIX-CHAITIN-WAF-ACTION: reject. For example:

      curl -H "Host: httpbun.org" -H "waf: true" http://127.0.0.1:9080/getid=1%20AND%201=1 -i

    HTTP/1.1 403 Forbidden
    Date: Wed, 19 Jul 2023 09:29:06 GMT
    Content-Type: text/plain; charset=utf-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    X-APISIX-CHAITIN-WAF: yes
    X-APISIX-CHAITIN-WAF-TIME: 2
    X-APISIX-CHAITIN-WAF-ACTION: reject
    X-APISIX-CHAITIN-WAF-STATUS: 403
    Server: APISIX/3.3.0
    Set-Cookie: sl-session=UdywdGL+uGS7q8xMfnJlbQ==; Domain=; Path=/; Max-Age=86400

    {"code": 403, "success":false, "message": "blocked by Chaitin SafeLine Web Application Firewall", "event_id": "51a268653f2c4189bfa3ec66afbcb26d"}

Delete Plugin#

To remove the chaitin-waf plugin, you can delete the corresponding JSON configuration from the Plugin configuration. APISIX will automatically reload and you do not have to restart for this to take effect:

$ curl http://127.0.0.1:9180/apisix/admin/routes/1 -H "X-API-KEY: $admin_key" -X PUT -d '
{
"uri": "/*",
"upstream": {
"type": "roundrobin",
"nodes": {
"httpbun.org:80": 1
}
}
}'