> Just to make sure we are on the same boat: This
> rule triggers on any argument containing a URI
> which does not start with a FQDN identical with the
> host-header of the request. Am I right?

Yes :)

> 2) In the basic set, clone this rule, but ensure it doesn’t work on ARGS:url
> I understand your reasoning. But is not that too much fiddling?
> Or is ARGS:url that common? I have the same functionality on 
> ARGS:target
> ARGS:remote
> ARGS:back
> ...
> 
> Can't we leave that sort of tuning to the sysadmins? Why don't we simply move 
> the rule from standard to paranoia mode as it has too many false positives.

Well, such a tuning was just one proposal to reduce FP for non-paranoid users 
so it might tip the balance in favor of keeping the rule in base. (Moving it to 
paranoid is just one possible way to change the FP / protection balance)

I’m not 100% sure we should go very far with whitelistings in the default set. 
But there is some precedent (excluding Google Analytics cookies, formerly also 
Piwik I think). The CRS does carve little holes sometimes in order to deal with 
reality of the current web and still be strict on the rest (while commercial 
WAFs are necessarily much less strict on this, since it causes them too many 
support calls).

I would hate to see the rule totally disappear from base just on my one FP note 
though. Maybe more people can check their audit logs for the rule since it’s in 
CRSv2 too. It does rule out a lot of exploits on legacy / in house PHP apps and 
attackers try it daily. So it’s a hard call...

-- 
Walter Hop | PGP key: https://lifeforms.nl/pgp

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to