Hi Ryan,

+1 to the repo idea.  ModSecurity is the only software I maintain from source, 
because I fight to keep everything else installed from a repo.

I would humbly suggest the ModSecurity team consider running their own yum 
repository and Debian/Ubuntu PPA.  I think it would definitely help keep people 
up to to date, and you wouldn't have to rely on upstream maintainers.

Thanks,

Jeremy Brown

===========================================

From: owasp-modsecurity-core-rule-set-boun...@lists.owasp.org 
[mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org] On Behalf Of 
Ryan Barnett
Sent: Friday, August 10, 2012 6:38 AM
To: mod-security-us...@lists.sourceforge.net; 
owasp-modsecurity-core-rule-set@lists.owasp.org
Subject: [Owasp-modsecurity-core-rule-set] Using the latest ModSecurity Versions

Question for the lists - if you are not running the latest version of 
ModSecurity (v.2.6.7), what are the reasons why you have not upgraded?

I ask this question because we are constantly adding new features to 
ModSecurity that can then be leveraged with the OWASP ModSecurity CRS.  For 
example, we have added some new actions:
. ver - which will hold the rule package data.  Example - 
"id:'959901',ver:'OWASP_CRS/2.2.5',."
. maturity - which will give the user a better idea of how well tested the rule 
is.  Example - "id:'959901',ver:'OWASP_CRS/2.2.5',maturity:'9'."
. accuracy - which will give the user a better idea of the potential false 
positive/false negative rates.  Example 
- "id:'959901',ver:'OWASP_CRS/2.2.5',maturity:'9',accuracy:'9'."
These new features are valuable and I am looking to add them to the OWASP CRS 
however there is no good way to make this backward compatible.  If you are 
using an older version of ModSecurity then it will fail on an Apache restart as 
it won't recognize these new actions.

So, I am looking to better understand why users are not always upgrading the 
latest versions.  One issue might be that many users simply use the OS repos to 
install ModSecurity rather than compiling from source.  If this is the case, 
then perhaps we can work better with these repo owners to get the 
latest/greatest versions out in the repos sooner.

Thanks.

-- 
Ryan Barnett
Trustwave SpiderLabs 
ModSecurity Project Leader
OWASP ModSecurity CRS Project Leader

________________________________________
This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
STRICTLY PROHIBITED. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to