Hello Walter, Thank you for you heads up. You are probably right about the length of the message. I wanted to put as many arguments on the table as possible. But now I fear I have silenced the opposition.
Hopefully, Manuel and Chaim find time for a message sooner or later. Ahoj, Christian On Fri, Feb 19, 2016 at 08:30:27PM +0100, Walter Hop wrote: > Hi Christian, > > You make some very good points! Meanwhile there seems to be a correlation > between the length of a mailinglist post and the number of replies ;) I’m not > too bothered with the name, I originally offered “strict” but I can live > perfectly with paranoia! > > Cheers, > WH > > > On 18 Feb 2016, at 13:13, Christian Folini <christian.fol...@netnea.com> > > wrote: > > > > Hello, > > > > We have finished the list of rule candidates for our little > > pet project. I have a working implementation under > > https://github.com/dune73/owasp-modsecurity-crs/tree/paranoia-mode > > and I think it is time to sort out the naming question > > before submitting the first pull request with the basic mechanics. > > (-> see https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode > > for an explanation of the 4 pull requests planned) > > > > I started out this project with the idea of an "on/off" setting. > > Hence the idea of "mode". However, it became clear we are going > > to work with a "level" ranging from 0-4 instead. So the idea of > > "mode" no longer really applies. We need to find something better. > > > > But of course, the core question is, if this should be called > > paranoia, paranoid, strict or agressive or something else. > > > > I opted for paranoia from the start and I still think it is the > > right term. However, there has been opposition and we need to find > > a solution everybody can agree with. I also think this is an > > important discussion, as it is a non-technical discussion. So > > everybody can chime in without being an expert and without running > > lengthy tests in his lab. > > > > Let me open the discussion with my reasoning why "paranoia" is the > > right term. I will then continue to discuss the other options > > and then you can respond and tell me why I am wrong and why the > > other options are much better suited.... > > > > "Paranoia" is the new normal. The more the attacks evolve and the > > more servers we configure, the more we realise, there is no real > > security without being paranoid. So while paranoia used to be > > a negative term, it is getting a more and more positive connotation; > > especially in IT security. > > Google the terms > > paranoid information security > > and you will get 2M hits. One of the top ones is > > http://www.darkreading.com/operations/the-perfect-infosec-mindset-paranoia-+-skepticism/a/d-id/1297596 > > where the author says paranoia is the standard mindset now > > (hence paranoia mode) and that you need to pair this with > > skepticism (in other words: the tuning of your ruleset). > > > > Other hits include the following titles: > > 13 Security and Privacy Tips for the Truly Paranoid > > Security for the Paranoid - SecurityFocus > > I became paranoid with computer security issues, I always ... > > The paranoid CISO | CSO Online > > Computer-Security Paranoia > > openssl - How paranoid should the average user be about ... > > > > Looking through some of these hits, I get the felling that those > > who really care about security acknowledge that they are paranoid > > and that they think that is the right attitude. > > > > I also remember reading about paranoid security settings 10-20 years ago > > and I would skip them immediately. Now, when looking at a new software > > or product, the term paranoia immediately catches my eye and I read > > about the most paranoid options first and then decide if the product is > > any good. Without paranoia options, I think it must be a happy sunshine > > hippy thing. > > > > Additionally, the term "PARANOID_MODE" is already there, even if it has > > not been in wide use in the 2.2.X series of rules: > > > > 2.2.X> grep -r -i paranoi | wc -l > > 9 > > > > The Merriam-Wester dictionary has multiple definitions for paranoia. > > One of them is: > > "a tendency on the part of an individual or group toward excessive or > > irrational suspiciousness and distrustfulness of others" > > > > I think the adjectives "excessive", "irrational" "distrustful" > > characterise our new functionality very well: When raising the level, > > you are enabling additional rules, which will cause an excessive number > > of false positives due to a general distrustful attitude towards user > > submitted input. > > > > Ideally, two years down the line, ModSecurity (Core Rules) discussion > > will run like this: > > "Man, I should install ModSecurity and the Core Rules on my server, > > but I heard false positives are going to kill me." > > "No worries, as long as you keep the paranoia setting low, false > > positives are minimal." > > > > Two weeks ago, the register ran a story about > > Rob Joyce, head of NSA's Tailored Access Operations: > > http://www.theregister.co.uk/2016/01/28/nsas_top_hacking_boss_explains_how_to_protect_your_network_from_his_minions/ > > The article closed with the register quoting Joyce: > > "At the end of the day it all boils down to knowing your network, > > he said, and it’s vital that IT administrators pick up their game > > and get paranoid about attacks." > > > > Well said. And the core rules paranoia feature is going to help > > with this in a controlled way without killing you with > > false positives on the first day of the installation. > > > > But let's look at the alternatives: "Strict" has been named as > > a better term. I do not like strict. It implies that the standard > > installation is not strict. Or that the default rules were not > > strict. In fact they are very strict. Every single one of them. > > It's just that they are more focused on less delicate aspects > > of the requests. > > > > So I think the term does not work as it misleads the user into > > making the wrong assumptions. You could say that running > > the CRS in anomaly scoring mode and setting a threshold of >5 > > is un-strict. But the individual rules are all strict from my > > point of view. > > > > This is even more true, as we have Ryan Barnett's proposal to > > use "aggressive". I think aggressive trumps strict as it > > sounds more like a gradual setting in my ears (both terms > > exist in German as well, so maybe these are false friends > > for me and their meaning is a wee bit different in English). > > > > So this the new featureset would allow us to adjust how aggressive the > > core rule set is. That does not sound too bad. It reminds me of a "teeth > > metaphor" is use at times. A strong ruleset has strong teeth. By tuning > > false positives, you pull a few of the teeth while keeping most of them > > in place. The level of aggression adjusting with this new setting, would > > thus add more teeth and the ruleset would thus become more aggressive. I > > guess it's not overly wrong to think of piranhas in a pond. > > > > The root of the term comes with the idea of active defense. > > It lets me thing of a strike back. Look up the term > > aggressive on The Merriam Webster dictionary. All the > > definitions point in that direction: > > http://www.merriam-webster.com/dictionary/aggressive > > Aggressive always means that you not only defend, but you attack > > as well. > > > > (paranoia is entirely different in this regard. It does not > > imply any counter strike) > > > > So I think aggressive does not entirely meet the character of the new > > functionality, which is in line with the rest of the core rules set in > > being entirely defensive. It just block attacks. It absolutely does not > > attempt to shut down the client, inject malware into the response or > > launch a DoS attack against the source IP address (which would all be > > possible with the right set of rules). > > > > And what would be the complete term? Level of Aggression or > > Level of Aggressiveness, Aggressiveness Setting? That all springs > > to mind. And that just does not sounds very cool in my ears. > > Or outrightly negative ("Level of Aggression!"). > > > > So all in all, I think we should work with paranoia. It's the best > > I can think of right now. And I thought about this a lot. > > > > But now let me hear what you think about it! > > > > Please do not take too long. My first pull request is almost > > ready, so let's come to a resolution in the next few days. > > > > Best regards, > > > > Christian > > > > > > -- > > Any technology that does not appear magical is insufficiently > > advanced. > > -- Gregory Benford > > _______________________________________________ > > Owasp-modsecurity-core-rule-set mailing list > > Owasp-modsecurity-core-rule-set@lists.owasp.org > > https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set > > -- > Walter Hop | PGP key: https://lifeforms.nl/pgp > > _______________________________________________ > Owasp-modsecurity-core-rule-set mailing list > Owasp-modsecurity-core-rule-set@lists.owasp.org > https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set -- mailto:christian.fol...@netnea.com http://www.christian-folini.ch twitter: @ChrFolini _______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set