Hey Christian,
Thanks for the awesome breakdown!
We've really seen some of the older issues rear some nasty levels of false 
positives which as you noted was the reason behind many of these. However, 
based on your findings I'm open to including a more false-positive prone file 
that is maybe only anomaly based featuring some of the rules that have been 
taken out. (we've been talking about this already). There are other options 
also (see below)
Additionally I have it on my list to defang 950907 just a bit as its EXTEREMLY 
overzealous.
I'm surprised about the XSS rules as most of them were combined into single 
regex's (for speed reasons) I'll have to take a look
We feel your concern about LibInjection but the concept seems to work and is 
used currently by a number of major WAF's. We can work with the author on a 
code review if this is something we want to prioritize.
In terms of the 990012, I think this is something we should probably be able to 
add back, I'll submit a pull request sometime this week.

Thoughts from you, others?
Do you think the false-positives file is the best way to handle it or do you 
think these belong in their respective files with a HUGE warning. The last 
thing we want is people complaining about false positives and eliminating those 
three rules has gone a LONG way. I think putting them in anomaly only isn't a 
horrible idea, I'm glad you did a look at anomaly scoring, this is always a 
little bit of a dark art. On the new one in some places we've set it up we 
bumped it up to 7 but it is usually below 10. Also there are now multiple 
different anon scoring areas.

We should resolve this quickly as I'd like to try and have an RC1 of 3.x by 
mid-February. Thoughts on that as well.



Chaim Sanders
Security Researcher, SpiderLabs

Trustwave | SMART SECURITY ON DEMAND
www.trustwave.com

-----Original Message-----
From: owasp-modsecurity-core-rule-set-boun...@lists.owasp.org 
[mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org] On Behalf Of 
Christian Folini
Sent: Monday, December 21, 2015 12:34 AM
To: owasp-modsecurity-core-rule-set@lists.owasp.org
Subject: [Owasp-modsecurity-core-rule-set] Comparing 2.2.9 and 3.0.0-dev

Dear all,

The CRS 3.0.0-dev is in the making bringing a lot of new features and new 
rules. I tried to understand the differences and wrote a blog post about it.

http://scanmail.trustwave.com/?c=4062&d=2JX31uvfAV09c2P0_qCM5MP7s2dUhDPQ0reFkp-Msg&s=5&u=https%3a%2f%2fwww%2enetnea%2ecom%2fcms%2f2015%2f12%2f20%2fmodsec-crs-2-2-x-vs-3-0-0-dev%2f

If you are using the core rules, this will interest you. There are nice new 
rules, but based on my tests, it looks like we are also losing a lot of alerts.

I would love to have your feedback on this. Ideally here on the mailinglist, 
but feel free to ping me via mail or twitter.

Christian Folini, @ChrFolini


--
Seek simplicity, and distrust it.
-- Alfred North Whitehead
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list 
Owasp-modsecurity-core-rule-set@lists.owasp.org
http://scanmail.trustwave.com/?c=4062&d=2JX31uvfAV09c2P0_qCM5MP7s2dUhDPQ0uDTycuMvw&s=5&u=https%3a%2f%2flists%2eowasp%2eorg%2fmailman%2flistinfo%2fowasp-modsecurity-core-rule-set

________________________________

This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
strictly prohibited. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to