Good morning Walter,

Thank you for your detailed info and the remarks on the wiki page. This
is exactly what we need to get a broader view on the problems to make
informed decisions.

It looks as if we agree in most cases. Where I am not sure if we really
agree, I plan to take the discussion here to come to a conclusion.

On Sat, Jan 30, 2016 at 05:13:06PM +0100, Walter Hop wrote:
> 3) Rules from subdirectories in v2 which are no longer in v3.0.0-rc1, but we 
> want to bring them back in paranoid mode because we think they do have worth. 
> Bringing these rules back does not affect security for normal mode users. 
> (experimental_rules, optional_rules, slr_rules)
>
> I have looked at these, but I would recommend that more people look at them 
> too. Most of them are uninteresting to me, so it's fine that they are 
> removed. The slr_rules look quite outdated in particular. It's worth looking 
> through experimental_rules and optional_rules though. I have added some 
> possible candidates for us here, although I have no experience with them in 
> production, so maybe Chaim can chime in if there are strong reasons for 
> keeping them removed: 
> https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode#Optional.2C_experimental.2C_slr_rules

Looking into these three separate subfolders is very useful. I was
willing to omit this work in order to push things ahead. It is very
good that at least you took a closer look. It would be even better if
somebody else would repeat this effort.


> Finally, I noticed that some candidates might be considered paranoid but are 
> currently already in the normal mode at notice_anomaly_score level (for 
> example, User-Agent, Accept, Host header existence checks). These rules do 
> not block in isolation, so we should keep in mind that the possible negative 
> impact of FP on them is limited. Maybe it would be a useful task to add the 
> scoring level as a column in the wiki.

As 90% of the rules are on critical, I think a remark in the remark
column would do.

I think some of these might be cloning-candidates:
In standard mode, they are anomaly level "notice". When in paranoid
mode, the same rule is repeated, but with anomaly level "warning".
That way you end up with up with "notice" + "warning" = "critical".

> In fact, we might even consider that any paranoid rules are possibly worth 
> keeping in the 'normal mode' as lower-scoring rules - and just have paranoid 
> mode bump up their score level, e.g. from 2 to 5. After all, if a normal user 
> would consider the occurrence of 3 harmless protocol violations as a valid 
> blocking heuristic, why not the occurrence of 3 paranoid rules? This last 
> situation might be probably more predictive of an attack.

This!

The other option I have in mind is repeating rules with stricter limits.
To give you an example:
960901/920270 does @validateByteRange 1-255.
In paranoid mode, the same rule could be repeated with @validateByteRange 
32-126.

Ahoj,

Christian



-- 
There has grown in the minds of certain groups in this country the idea 
that just because a man or corporation has made a profit out of the public 
for a number of years, the government and the courts are charged with 
guaranteeing such a profit in the future, even in the face of changing 
circumstances and contrary to public interest. This strange doctrine is 
supported by neither statute or common law. Neither corporations or 
individuals have the right to come into court and ask that the clock 
of history be stopped, or turned back.
--- Robert Heinlein, Life-Line, 1939
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to