Walter,

Thanks for the further testing.

On Sat, Feb 13, 2016 at 08:54:23PM +0100, Walter Hop wrote:
> To try to get some test data, I enabled the rule again on some staging & 
> internal sites to make it critical again. The experience was pretty horrible. 
> There was a lot of breakage, colleagues complaining that I am wasting their 
> time with 403 errors, and now I remember why I had edited this rule... :) As 
> I could have expected, apps that broke were basically anything where a URL is 
> passed.

Really interesting. Our environments are so different. I really
see very few FPs here. But it's not the same type of software
running on the servers.

> This is just from a few days of people getting 403s. So after this 
> experiment, I’m tending towards saying, this is the type of rule that makes 
> the CRS scary to use, even if the rule is effective against RFI.
> 
> Of course if the default paranoia level is nonzero and it stays at that 
> level, we have sorta CRSv2 parity and still a good way to get out of these FP.

I am not sure I understand your last sentence correctly.

If we have most rules at paranoia level 1 and default is
paranoia level 1. Should this rule be a 1 with additional
whitelisting of FPs, or should we assign it a paranoia
level of 2?

I'm OK with both options.

Ahoj,

Christian



-- 
The reasonable man adapts himself to the world; the unreasonable man 
persists in trying to adapt the world to himself. Therefore, all 
progress depends on the unreasonable man.
-- George Bernard Shaw
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to