Glad seeing your openness towards this, Chaim.

In the end, to me, it seems to be a usability-functionality trade-off.
The degree of complexity added by some additional space should not amount for 
the potential functionality.

And, you never know what the future holds ;)

> On 09 Feb 2016, at 16:42, Chaim Sanders <csand...@trustwave.com> wrote:
> 
> Well it seems like everyone likes this out of 40 scale and honestly I’m
> not opposed :).
> 
> On 2/9/16, 3:58 AM,
> "owasp-modsecurity-core-rule-set-boun...@lists.owasp.org 
> <mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org> on behalf of
> Franziska Buehler"
> <owasp-modsecurity-core-rule-set-boun...@lists.owasp.org 
> <mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org> on behalf of
> franziska.buehler.schmoc...@gmail.com 
> <mailto:franziska.buehler.schmoc...@gmail.com>> wrote:
> 
>> Dear Christian,
>> Dear all,
>> 
>> Very clear and reasoned writing!
>> I see a benefit to choose the numbering of the paranoia level between 0
>> and 40.
>> It’s distinguishable from the anomaly scoring and does not lead to
>> misunderstanding.
>> Default set to 10 sounds good for me.
>> But I also see Chaim’s point not to leave that space.
>> 
>> Another question:
>> If we clone rules to stricter siblings, we’ll produce a lot of log
>> entries.
>> Requests with more than 5 special characters and a paranoia level of
>> 40 will create three distinct log-entries in turn.
>> Is that the behavior that we want?
>> Maybe we have to write the siblings in a way that only one rule
>> matches, even at a high paranoia level?
>> Example: SecRule ARGS_NAMES|ARGS|XML:/*
>> "([\~\!\@\#\$\%\^\&\*\(\)\-\+\=\{\}\[\]\|\:\;\"\'\´\’\‘\`\<\>].*?){3,4}"
>> \
>> 
>> Regards,
>> Franziska
>> 
>> 2016-02-09 5:53 GMT+01:00 Chaim Sanders <csand...@trustwave.com>:
>>> Thanks Noel!
>>> I will say @Christian that every time we leave space we never end up
>>> using
>>> the space we leave I¹d vote for just 0-4, but it is just one mans
>>> opinion.
>>> 
>>> On 2/8/16, 11:20 PM,
>>> "owasp-modsecurity-core-rule-set-boun...@lists.owasp.org on behalf of
>>> Noël
>>> Zindel" <owasp-modsecurity-core-rule-set-boun...@lists.owasp.org on
>>> behalf
>>> of m...@noelzindel.org> wrote:
>>> 
>>>> Hi everyone,
>>>> 
>>>> let me chime in on this.
>>>> 
>>>> From a newbie perspective, I¹d argue, the 0-4 definition would make
>>> sense
>>>> since it would be a logical choice.
>>>> You should be able to easily distinct between the paranoia rating and
>>>> the
>>>> anomaly rating through the latter¹s variable-definition e.g. warning,
>>>> critical, Š
>>>> 
>>>> Nevertheless, Christian¹s argument ³If we leave some room between the
>>>> numbers, we have room to fill them in the future.² favours 0-40.
>>>> At least for me, since I like the idea of planning way ahead.
>>>> 
>>>> So, from my point of view, a range of 0-40 would be the favourable
>>>> choice. But, it¹s arbitrary nature would require a well-curated
>>>> documentation.
>>>> 
>>>> It¹s good to see the community¹s commitment on this and I hope to be of
>>>> any help.
>>>> 
>>>> Cheers,
>>>> Noël
>>>> 
>>>>> On 08 Feb 2016, at 22:12, Christian Folini
>>>>> <christian.fol...@netnea.com> wrote:
>>>>> 
>>>>> Thanks Chaim and Lukas!
>>>>> 
>>>>> I got positive feedback via private messages too.
>>>>> 
>>>>> The one question, where I am still unsure (and the
>>>>> feedback / criticism is also split) is the question
>>>>> of the good integer range for the paranoia level.
>>>>> 0-4 or rather 0-40.
>>>>> 
>>>>> Still not sure.
>>>>> 
>>>>> Thoughts on this question are thus very welcome.
>>>>> 
>>>>> Ahoj,
>>>>> 
>>>>> Christian
>>>>> 
>>>>> 
>>>>> On Mon, Feb 08, 2016 at 02:31:47PM +0000, Chaim Sanders wrote:
>>>>>> Good writeup Christian!
>>>>>> 
>>>>>> On 2/8/16, 2:59 AM,
>>>>>> "owasp-modsecurity-core-rule-set-boun...@lists.owasp.org on behalf of
>>>>>> Funk, Lukas" <owasp-modsecurity-core-rule-set-boun...@lists.owasp.org
>>>>>> on
>>>>>> behalf of lukas.f...@united-security-providers.ch> wrote:
>>>>>> 
>>>>>>> Hi Christian and all,
>>>>>>> 
>>>>>>> I follow the discussion about the paranoia mode with great
>>>>>>> interest. I
>>>>>>> think it could be a good starting point for ModSecurity users which
>>>>>>> do
>>>>>>> not have the expert knowledge of the rules.
>>>>>>> 
>>>>>>> Looking at your proposed structure of the paranoia mode setup, I
>>>>>>> think
>>>>>>> it's on a good track. The structure is easy to understand!
>>>>>>> Unfortunately I can't comment the different rules, as I don't have
>>>>>>> much
>>>>>>> experience with them.
>>>>>>> 
>>>>>>> Thanks to all of you putting such great effort to the CRS and I'm
>>>>>>> really
>>>>>>> looking forward to version 3!
>>>>>>> 
>>>>>>> Cheers, Lukas
>>>>>>> 
>>>>>>> 
>>>>>>>>> Dear all,
>>>>>>>>> 
>>>>>>>>> With the progress we are making on the rules front, it is time to
>>>>>>>>> talk
>>>>>>>>> about
>>>>>>>>> the way it could be implemented.
>>>>>>>>> It's time for the show-me-the-code. He you go:
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> http://scanmail.trustwave.com/?c=4062&d=tN-41hG4qCjBMKf0XEE90boFBx2
>>>>>>>>> 3N
>>>>>>>>> XMA
>>>>>>>>> 
>>>>>>>>> 8kit7zcE9Q&s=5&u=https%3a%2f%2fwww%2enetnea%2ecom%2fcms%2f2016%2f02
>>>>>>>>> %2
>>>>>>>>> f04
>>>>>>>>> %2fowasp-modsecurity-core-rules-
>>>>>>>>> paranoia-mode-mechanics-proposal/
>>>>>>>>> 
>>>>>>>>> Feedback welcome!
>>>>>>>>> 
>>>>>>>>> Christian
>>>>>> 
>>>>>> 
>>>>>> ________________________________
>>>>>> 
>>>>>> This transmission may contain information that is privileged,
>>>>>> confidential, and/or exempt from disclosure under applicable law. If
>>>>>> you are not the intended recipient, you are hereby notified that any
>>>>>> disclosure, copying, distribution, or use of the information contained
>>>>>> herein (including any reliance thereon) is strictly prohibited. If you
>>>>>> received this transmission in error, please immediately contact the
>>>>>> sender and destroy the material in its entirety, whether in electronic
>>>>>> or hard copy format.
>>>>>> _______________________________________________
>>>>>> Owasp-modsecurity-core-rule-set mailing list
>>>>>> Owasp-modsecurity-core-rule-set@lists.owasp.org
>>>>>> 
>>>>>> http://scanmail.trustwave.com/?c=4062&d=kvC51uiCoFG6D9Z7NWTJ-HkiUDGrZP
>>>>>> Vd
>>>>>> MSLLMAERYA&s=5&u=https%3a%2f%2flists%2eowasp%2eorg%2fmailman%2flistinf
>>>>>> o%
>>>>>> 2fowasp-modsecurity-core-rule-set
>>>>> 
>>>>> --
>>>>> mailto:christian.fol...@netnea.com
>>>>> 
>>>>> http://scanmail.trustwave.com/?c=4062&d=kvC51uiCoFG6D9Z7NWTJ-HkiUDGrZPV
>>>>> dM
>>>>> SeebAdKbQ&s=5&u=http%3a%2f%2fwww%2echristian-folini%2ech
>>>>> twitter: @ChrFolini
>>>>> _______________________________________________
>>>>> Owasp-modsecurity-core-rule-set mailing list
>>>>> Owasp-modsecurity-core-rule-set@lists.owasp.org
>>>>> 
>>>>> http://scanmail.trustwave.com/?c=4062&d=kvC51uiCoFG6D9Z7NWTJ-HkiUDGrZPV
>>>>> dM
>>>>> SLLMAERYA&s=5&u=https%3a%2f%2flists%2eowasp%2eorg%2fmailman%2flistinfo%
>>>>> 2f
>>>>> owasp-modsecurity-core-rule-set
>>>> 
>>> 
>>> 
>>> ________________________________
>>> 
>>> This transmission may contain information that is privileged,
>>> confidential, and/or exempt from disclosure under applicable law. If you
>>> are not the intended recipient, you are hereby notified that any
>>> disclosure, copying, distribution, or use of the information contained
>>> herein (including any reliance thereon) is strictly prohibited. If you
>>> received this transmission in error, please immediately contact the
>>> sender and destroy the material in its entirety, whether in electronic
>>> or hard copy format.
>>> _______________________________________________
>>> Owasp-modsecurity-core-rule-set mailing list
>>> Owasp-modsecurity-core-rule-set@lists.owasp.org
>>> 
>>> http://scanmail.trustwave.com/?c=4062&d=qrC51mJ-5yUuJU_THDo8E9rr9Bk2G9RKB 
>>> <http://scanmail.trustwave.com/?c=4062&d=qrC51mJ-5yUuJU_THDo8E9rr9Bk2G9RKB>
>>> N9PIoKQJw&s=5&u=https%3a%2f%2flists%2eowasp%2eorg%2fmailman%2flistinfo%2f
>>> owasp-modsecurity-core-rule-set
>> _______________________________________________
>> Owasp-modsecurity-core-rule-set mailing list
>> Owasp-modsecurity-core-rule-set@lists.owasp.org 
>> <mailto:Owasp-modsecurity-core-rule-set@lists.owasp.org>
>> http://scanmail.trustwave.com/?c=4062&d=qrC51mJ-5yUuJU_THDo8E9rr9Bk2G9RKBN 
>> <http://scanmail.trustwave.com/?c=4062&d=qrC51mJ-5yUuJU_THDo8E9rr9Bk2G9RKBN>
>> 9PIoKQJw&s=5&u=https%3a%2f%2flists%2eowasp%2eorg%2fmailman%2flistinfo%2fow
>> asp-modsecurity-core-rule-set
> 
> 
> ________________________________
> 
> This transmission may contain information that is privileged, confidential, 
> and/or exempt from disclosure under applicable law. If you are not the 
> intended recipient, you are hereby notified that any disclosure, copying, 
> distribution, or use of the information contained herein (including any 
> reliance thereon) is strictly prohibited. If you received this transmission 
> in error, please immediately contact the sender and destroy the material in 
> its entirety, whether in electronic or hard copy format.
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org 
> <mailto:Owasp-modsecurity-core-rule-set@lists.owasp.org>
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set 
> <https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set>

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to