Hello again,

On Tue, Feb 09, 2016 at 10:29:54PM +0100, Walter Hop wrote:
> Well, such a tuning was just one proposal to reduce FP for non-paranoid users 
> so it might tip the balance in favor of keeping the rule in base. (Moving it 
> to paranoid is just one possible way to change the FP / protection balance)

That makes a lot of sense. I was not aware of this reasoning behind your
previous message. Thanks for making this clear.

> I’m not 100% sure we should go very far with whitelistings in the default 
> set. But there is some precedent (excluding Google Analytics cookies, 
> formerly also Piwik I think). The CRS does carve little holes sometimes in 
> order to deal with reality of the current web and still be strict on the rest 
> (while commercial WAFs are necessarily much less strict on this, since it 
> causes them too many support calls).

Exactly.

> I would hate to see the rule totally disappear from base just on my one FP 
> note though. Maybe more people can check their audit logs for the rule since 
> it’s in CRSv2 too. It does rule out a lot of exploits on legacy / in house 
> PHP apps and attackers try it daily. So it’s a hard call...

Let's keep it in the base / on the default paranoia level then. Adding the 
whitelisting you 
proposed does little harm and is in line with the UUID whitelisting Noël has 
developed
for 981173 (lately moved to 
https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173)

Cheers,

Christian

-- 
mailto:christian.fol...@netnea.com
http://www.christian-folini.ch
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to