Hi everyone,

let me chime in on this.

From a newbie perspective, I’d argue, the 0-4 definition would make sense since 
it would be a logical choice.
You should be able to easily distinct between the paranoia rating and the 
anomaly rating through the latter’s variable-definition e.g. warning, critical, 
…

Nevertheless, Christian’s argument “If we leave some room between the numbers, 
we have room to fill them in the future.” favours 0-40.
At least for me, since I like the idea of planning way ahead.

So, from my point of view, a range of 0-40 would be the favourable choice. But, 
it’s arbitrary nature would require a well-curated documentation.

It’s good to see the community’s commitment on this and I hope to be of any 
help.

Cheers,
Noël

> On 08 Feb 2016, at 22:12, Christian Folini <christian.fol...@netnea.com> 
> wrote:
> 
> Thanks Chaim and Lukas!
> 
> I got positive feedback via private messages too.
> 
> The one question, where I am still unsure (and the
> feedback / criticism is also split) is the question
> of the good integer range for the paranoia level.
> 0-4 or rather 0-40.
> 
> Still not sure.
> 
> Thoughts on this question are thus very welcome.
> 
> Ahoj,
> 
> Christian
> 
> 
> On Mon, Feb 08, 2016 at 02:31:47PM +0000, Chaim Sanders wrote:
>> Good writeup Christian!
>> 
>> On 2/8/16, 2:59 AM,
>> "owasp-modsecurity-core-rule-set-boun...@lists.owasp.org on behalf of
>> Funk, Lukas" <owasp-modsecurity-core-rule-set-boun...@lists.owasp.org on
>> behalf of lukas.f...@united-security-providers.ch> wrote:
>> 
>>> Hi Christian and all,
>>> 
>>> I follow the discussion about the paranoia mode with great interest. I
>>> think it could be a good starting point for ModSecurity users which do
>>> not have the expert knowledge of the rules.
>>> 
>>> Looking at your proposed structure of the paranoia mode setup, I think
>>> it's on a good track. The structure is easy to understand!
>>> Unfortunately I can't comment the different rules, as I don't have much
>>> experience with them.
>>> 
>>> Thanks to all of you putting such great effort to the CRS and I'm really
>>> looking forward to version 3!
>>> 
>>> Cheers, Lukas
>>> 
>>> 
>>>>> Dear all,
>>>>> 
>>>>> With the progress we are making on the rules front, it is time to talk
>>>>> about
>>>>> the way it could be implemented.
>>>>> It's time for the show-me-the-code. He you go:
>>>>> 
>>>>> 
>>>>> http://scanmail.trustwave.com/?c=4062&d=tN-41hG4qCjBMKf0XEE90boFBx23NXMA
>>>>> 8kit7zcE9Q&s=5&u=https%3a%2f%2fwww%2enetnea%2ecom%2fcms%2f2016%2f02%2f04
>>>>> %2fowasp-modsecurity-core-rules-
>>>>> paranoia-mode-mechanics-proposal/
>>>>> 
>>>>> Feedback welcome!
>>>>> 
>>>>> Christian
>> 
>> 
>> ________________________________
>> 
>> This transmission may contain information that is privileged, confidential, 
>> and/or exempt from disclosure under applicable law. If you are not the 
>> intended recipient, you are hereby notified that any disclosure, copying, 
>> distribution, or use of the information contained herein (including any 
>> reliance thereon) is strictly prohibited. If you received this transmission 
>> in error, please immediately contact the sender and destroy the material in 
>> its entirety, whether in electronic or hard copy format.
>> _______________________________________________
>> Owasp-modsecurity-core-rule-set mailing list
>> Owasp-modsecurity-core-rule-set@lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
> 
> --
> mailto:christian.fol...@netnea.com
> http://www.christian-folini.ch
> twitter: @ChrFolini
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to