Whitelist Mod Security Rules that are being triggered by Ninja Firewall:
In Putty run:
grep YourDomain.com /usr/local/apache/logs/error_log | grep ModSecurity
*Change Domain and path to apache error logs per your environment.
Look for any triggered rules:
Here is a sample;
[Wed Apr 16 20:28:58 2014] [error] [client 23.243.248.121] ModSecurity: Access denied with code 403 (phase 2). Matched phrase “varchar” at ARGS:nfw_conf_arr[phpini_data].
[file “/var/cpanel/cwaf/rules/cwaf_01.conf”] [line “614”] [id “211040”] [msg “COMODO WAF: Blocking SQL injection”] [data “varchar”] [severity “CRITICAL”]
[hostname “www.YourDomain.com”] [uri “/wp-admin/admin.php”] [unique_id “U08gSsDSw-EAAHXmcN8AAAAM”]
Look for ARGS: nfw_conf_arr (nfw=ninja firewall).
After whitelisting 4 rules. I am getting a 500 Internal Server Error.
Surprisingly when I use a php.ini file and not a .user.ini, I get to the “Test Ninja Configuration” button and it loops back to the beginning.
Almost there.