Thank you for this Barry. We actually have attacks going on on the server
and so far mod_sec has blocked it with the CRS. Our server with wordpress
is being brute forced by a xmlrpc.php attack and our joomla server is being
flooded by a torrent request when we don't have any torrents running. I may
need to do both in parallel. Do the anomaly scoring to allow facebook
scraping the content and probably setup another server and do your
recommendation to better tweak the WAF and then apply to the production.

On Tue, May 17, 2016 at 3:05 PM, Barry Pollard <barry_poll...@hotmail.com>
wrote:

> I would say first thing is to turn blocking off and run in DetectionOnly
> mode to help you fine tune your rules. To do that update your SecRuleEngine
> config like so:
>
> SecRuleEngine DetectionOnly
>
> This will of course mean you are not protected but us a necessary step to
> getting your set up right. Now leave it run for a while and then check the
> logs for every rule that fired (but did not block this time) and categories
> them into:
>
> 1) False positive - this request looks to be the sort of request our
> application expects and ModSecurity should not be alerting on it.
> 2) Bad request - this request shouldn't be made and ModSecurity was right
> to block it. This will include bots and scripts that scan websites even if
> they don't cause any trouble.
>
> For all the 1s (and there will be a lot at the beginning) you need to
> decide how to tweak the rules to not alert for False positives. This
> involves either turning the rule off completely (using the likes of
> SecRuleRemoveById), turning it off for particular parameters (using the
> likes of SecRuleUpdateActionById) or turning it off for particular URLs
> (this is more complicated aged and can require building a new rule to do
> this).
>
> Tuning rules is necessary and, as long as you have a good understanding of
> what the rules intention is, why it blocked, why that was incorrect thing
> for it to do then you should tweak and turn them off for certain scenarios.
> Does that reduce the effectiveness of ModSecurity? Potentially but then if
> it blocks all sorts of real visitors incorrectly then that's not much use
> is it! The OWASP CRS is very generic and all the rules will not be
> appropriate for all websites. By default it blocks too much. There is some
> work going on to make the default more lenient so you can start off with
> some protection and ramp up as you see fit rather than current situation
> where you start with too much protection and have to ramp down.
>
> Anyway after you see no more false positives for a while you can turn 
> SecRuleEngine
> back to on.
>
> This can take some time. See my story here to prepare you:
> http://stackoverflow.com/questions/35149264/how-long-do-you-fine-tune-false-positives-with-mod-security-and-owasp-rules/35162976#35162976.
> A WAF like ModSecurity is, unfortunately, not just a turn it on and it
> works and you can forget about it solution. It takes a lot of set up to be
> useful, and then a bit if minding afterwards. Personally I think it's worth
> it but you also see people online saying WAFs are too much effort for this
> reason.
>
> Anomaly scoring mode is an interesting one. It basically let's all the
> rules run and then only blocks if a certain threshold applies. This means a
> number of unimportant rules can fire. e.g. most browsers send a user agent
> so no user agent, while it likely won't cause a problem is a flag that this
> is probably a bad request. If a few of these flags fire on same request
> then this is highly likely to be a bad request and should be blocked. Some
> rules (like missing user agent) might have low threshold and so won't block
> on their own and some will block with just one rule firing if it's obvious
> this request should not processed.
>
> While anomaly scoring is undoubtedly helpful to reduce the number of
> incorrect blocks, and lots of people use it and recommend it, I'm not a
> particular fan. I find it makes the log files noisy and confusing to see
> rules firing and not know if they caused a block or not. I prefer to turn
> off the low value rules completely and using the original block at first
> bad attempt mode despite the fact this takes extra work to set up initially
> and can allow more spam and bad bots through. But each to their own. Will
> leave Christian to explain how best to set it up if that's the way you want
> to go.
>
> Here's some other posts that might help:
>
> http://stackoverflow.com/questions/33676348/extra-sensitive-mod-security-rules-giving-403-forbidden-error
>
> http://stackoverflow.com/questions/34478019/keep-modsecurity-enabled-with-symfony-installation-w-cpanel-whm/34484463#34484463
>
> http://stackoverflow.com/questions/33989273/modsecurity-excessive-false-positives/34027786#34027786
> Note this mailing list is awesome and you will get help here but I have
> also been answering ModSecurity questions on StackOverflow/ServerFault as
> feel they are better to reference again for common questions like yours.
> Been meaning to write a friendly, short, beginners containing a lot of the
> detail here but have a problem keeping my posts short :-)
>
> Hope that helps and feel free to ask any questions here. We're a friendly
> bunch.
>
> Thanks,
> Barry
>



-- 
*T. Kenneth S. Lojo*
Specialist-Online Media Design
[image: IRRI] <http://irri.org/> +63 2 580 5600 ext. 2703/2744
+63 928 209 1191 (mobile)
t.l...@irri.org <g.lav...@irri.org>
www.irri.org
[image: Facebook] <http://www.facebook.com/IRRI.ricenews> [image: Twitter]
<http://twitter.com/RiceResearch> [image: Flickr]
<http://www.flickr.com/photos/ricephotos/collections/> [image: Youtube]
<http://www.youtube.com/user/irrivideo/featured> [image: Scribd]
<http://www.scribd.com/IRRI_resources> [image: Linkedin]
<http://www.linkedin.com/company/international-rice-research-institute> [image:
Soundcloud] <https://soundcloud.com/irri-radio> [image: Google+]
<https://plus.google.com/103972671963502739315>

The International Rice Research Institute <http://irri.org> is a member of
the CGIAR <http://www.cgiar.org/>

-- 
The International Rice Research Institute <http://irri.org> is a member of 
the CGIAR <http://cgiar.org> consortium
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to