I agree nice to see that many people sharing ; )

On my side I propose to name the mode of operation  'strict' instead of 
'paranoid'.

Regards,
Manuel



Envoyé de mon Galaxy S5 4G+ Orange


-------- Original message --------
From: Ryan Barnett <ryan.barn...@owasp.org>
Date: 16/02/2016 00:29 (GMT+01:00)
To: Christian Folini <christian.fol...@netnea.com>, Chaim Sanders 
<csand...@trustwave.com>
Cc: owasp-modsecurity-core-rule-set@lists.owasp.org
Subject: Re: [Owasp-modsecurity-core-rule-set] Paranoia Mode: Forgotten 
controversial candidate 900050 / 910100 (Client IP is from a HIGH Risk Country 
Location)

A couple comments -

  1.  I am ecstatic to see all of the community feedback and participation.  
This is how I always envisioned it working.  ModSecurity, and the OWASP CRS. 
Are community projects.  They will live/die by community involvement.
  2.  I regards to these settings – it is purely semantics but I would 
recommend s/paranoid/aggressive/g.   The former has a negative connotation to 
it while the later seems more even handed.   The point is that these rule can 
provide some level of value however it is at the expense of False Positives.

-Ryan

From: 
<owasp-modsecurity-core-rule-set-boun...@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org>>
 on behalf of Christian Folini 
<christian.fol...@netnea.com<mailto:christian.fol...@netnea.com>>
Date: Monday, February 15, 2016 at 3:17 PM
To: Chaim Sanders <csand...@trustwave.com<mailto:csand...@trustwave.com>>
Cc: 
"owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set@lists.owasp.org>"
 
<owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set@lists.owasp.org>>
Subject: Re: [Owasp-modsecurity-core-rule-set] Paranoia Mode: Forgotten 
controversial candidate 900050 / 910100 (Client IP is from a HIGH Risk Country 
Location)

Chaim,

I see you and Walter agreeing on the idea to keep the rule around
in standard mode. I would probably still comment out the default
country list - but that's a different question.

I've removed the rule from the list of paranoia candidates.

Btw: The country list involves China, but the documentation does not
name China (but all the other countried).

Cheers,

Christian


On Mon, Feb 15, 2016 at 04:19:44AM +0000, Chaim Sanders wrote:
In general I like to assume that if people are going to get caught by
something blocking unintentionally it will be a configuration from the
configuration file, as they are supposed to be reading those :-). I
honestly haven¹t heard many complaints about this feature and as a result
I¹d probably leave it enabled as it as sad as it is, is fairly effective.
On 2/13/16, 12:30 AM,
"owasp-modsecurity-core-rule-set-boun...@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org>
 on behalf of
Christian Folini" 
<owasp-modsecurity-core-rule-set-boun...@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org>
on behalf of christian.fol...@netnea.com<mailto:christian.fol...@netnea.com>> 
wrote:
>Hi there,
>
>It seems I overlooked this candidate, where Franziska said she is unsure
>whether we should blog certain countries in a default installation or
>not.
>
>The rule does:
>  SecRule GEO:COUNTRY_CODE "@pm %{tx.high_risk_country_codes}"
>
>With tx.high_risk_country_codes being set to
>"UA ID YU LT EG RO BG TR RU PK MY CN"
>in modsecurity_crs_10_setup.conf.example.
>
>Depending on your location, requests from the given set of
>countried may be desired and not potential attacks. So I think
>Franziska has a point.
>
>One resolution would be to leave the rule where it is, but comment
>out the definition of the variable in
>modsecurity_crs_10_setup.conf.example
>and provide multiple default variants in the comments.
>That could also be performed in combination with the move to
>the paranoia mode.
>
>Opinions?
>
>Christian
>
>
>--
>The problem is, if you're not a hacker,
>you can't tell who the good hackers are.
>--- Paul Graham
>_______________________________________________
>Owasp-modsecurity-core-rule-set mailing list
>Owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:Owasp-modsecurity-core-rule-set@lists.owasp.org>
>http://scanmail.trustwave.com/?c=4062&d=5sS-1i1jGNzLWl4_4Oku6bhM-zSgEVOp-i
>xlzEmHDg&s=5&u=https%3a%2f%2flists%2eowasp%2eorg%2fmailman%2flistinfo%2fow
>asp-modsecurity-core-rule-set
________________________________
This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
strictly prohibited. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.

--
mailto:christian.fol...@netnea.com
http://www.christian-folini.ch
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:Owasp-modsecurity-core-rule-set@lists.owasp.org>
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

________________________________
This message and any attachments are intended solely for the addressees and may 
contain confidential information. Any unauthorized use or disclosure, either 
whole or partial, is prohibited.
E-mails are susceptible to alteration. Our company shall not be liable for the 
message if altered, changed or falsified. If you are not the intended recipient 
of this message, please delete it and notify the sender.
Although all reasonable efforts have been made to keep this transmission free 
from viruses, the sender will not be liable for damages caused by a transmitted 
virus.
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to