Hi Christian,

That was used back a few years ago to either do full inspection or just inspect 
a few things or tighten some settings like this one

SecRule TX:PARANOID_MODE "@eq 1" "chain,phase:2,rev:'2.1.2',block,msg:'Invalid 
character in 
request',id:'960018',tag:'PROTOCOL_VIOLATION/EVASION',tag:'WASCTC/WASC-28',tag:'OWASP_TOP_10/A1',tag:'OWASP_AppSensor/CIE3',tag:'PCI/6.5.2',severity:'4',t:none,t:urlDecodeUni,tag:'http://i-technica.com/whitestuff/asciichart.html'"
        SecRule 
REQUEST_URI|REQUEST_BODY|REQUEST_HEADERS_NAMES|REQUEST_HEADERS|!REQUEST_HEADERS:Referer|TX:HPP_DATA
 \
                "@validateByteRange 32-126" \

-----Original Message-----
From: owasp-modsecurity-core-rule-set-boun...@lists.owasp.org 
[mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org] On Behalf Of 
Christian Folini
Sent: mardi 9 février 2016 20:29
To: Funk, Lukas
Cc: Owasp-modsecurity-core-rule-set@lists.owasp.org
Subject: Re: [Owasp-modsecurity-core-rule-set] Paranoid vs. Paranoia Mode

Lukas,

On Tue, Feb 09, 2016 at 03:35:49PM +0000, Funk, Lukas wrote:
> I was just having another look into the AuditConsole and stumbled over
> this screenshot:
> https:/gith/jwall.org/web/audit/console/screenshots/event-view2.png
>
> What caught my eye was in the Rules Section "setvar:tx.paranoid_mode=0" and 
> it made me curious what that is.
> I could find anything in the latest CRS and also noting in older version in 
> the GitHub repo...

It is an artefact from an older version. It is so old, it is not even on github 
(core rules were maintained on a subversion server before) anymore.

There is a minimal trace of this functionality in 2.2.X in the file 
modsecurity_crs_20_protocol_violations.conf. Unfortunately, I do not remember 
if it was in use with a wider set of rules.

I seem to remember it being introduced by Ryan Barnett as a means to get 
tougher rules into the core ruleset. But I never saw anybody use the mode and 
AFAIK Ryan did not pursue this, so it disappeared at a given moment. I'd say 
the reason was lack of use.

It was not of much use in my eyes because the concept was developed far enough.

This time, the use concept is very clear and we are also providing 
documentation and a guide to decide if it is worth the effort.

Hope this helps!

Christian



--
If you shut your door to all errors truth will be shut out.
--- Rabindranath Tagore
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list 
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
________________________________
 This message and any attachments are intended solely for the addressees and 
may contain confidential information. Any unauthorized use or disclosure, 
either whole or partial, is prohibited.
E-mails are susceptible to alteration. Our company shall not be liable for the 
message if altered, changed or falsified. If you are not the intended recipient 
of this message, please delete it and notify the sender.
Although all reasonable efforts have been made to keep this transmission free 
from viruses, the sender will not be liable for damages caused by a transmitted 
virus.
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to