As you have it now, it can only detect DENY events. It cannot however detect DROP events.
currently:
Code: Select all
\[error\] \[client (\S+)\] mod_security: Access denied with code/))
\[error\] \[client (\S+)\] ModSecurity:(( \[[^]]+\])*)? Access denied with code/))
Code: Select all
[error] [client x.x.x.x] ModSecurity: Access denied with connection close (phase 1).
So it's never matched and CSF never catches the event to block the IP at iptables level.
Thanks for all the brilliant work on CSF!