Christian, Where do I set the anomaly limit?
On Wed, May 18, 2016 at 6:51 AM, Chaim Sanders <csand...@trustwave.com> wrote: > In addition to Barry’s fantastic links I’ll direct you to this post > written by Ryan Barnett that details how to add exceptions in an effective > method. There is some tuning required as mentioned before but after about a > week these tend to go away pretty quickly and just rarely rear their head. > Check it out > https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--(Updated)-Exception-Handling/. > If you need additional help please do reach out J > > > > *Chaim Sanders * > > Security Researcher > > *Trustwave* | SMART SECURITY ON DEMAND > > www.trustwave.com > > > > *From:* owasp-modsecurity-core-rule-set-boun...@lists.owasp.org [mailto: > owasp-modsecurity-core-rule-set-boun...@lists.owasp.org] *On Behalf Of *T. > Kenneth Lojo (IRRI) > *Sent:* Tuesday, May 17, 2016 3:51 AM > *To:* Barry Pollard <barry_poll...@hotmail.com> > *Cc:* owasp-modsecurity-core-rule-set@lists.owasp.org > *Subject:* Re: [Owasp-modsecurity-core-rule-set] Facebook scrape problem > > > > Thank you for this Barry. We actually have attacks going on on the server > and so far mod_sec has blocked it with the CRS. Our server with wordpress > is being brute forced by a xmlrpc.php attack and our joomla server is being > flooded by a torrent request when we don't have any torrents running. I may > need to do both in parallel. Do the anomaly scoring to allow facebook > scraping the content and probably setup another server and do your > recommendation to better tweak the WAF and then apply to the production. > > > > On Tue, May 17, 2016 at 3:05 PM, Barry Pollard <barry_poll...@hotmail.com> > wrote: > > I would say first thing is to turn blocking off and run in DetectionOnly > mode to help you fine tune your rules. To do that update your SecRuleEngine > config like so: > > > > SecRuleEngine DetectionOnly > > This will of course mean you are not protected but us a necessary step to > getting your set up right. Now leave it run for a while and then check the > logs for every rule that fired (but did not block this time) and categories > them into: > > > > 1) False positive - this request looks to be the sort of request our > application expects and ModSecurity should not be alerting on it. > > 2) Bad request - this request shouldn't be made and ModSecurity was right > to block it. This will include bots and scripts that scan websites even if > they don't cause any trouble. > > > > For all the 1s (and there will be a lot at the beginning) you need to > decide how to tweak the rules to not alert for False positives. This > involves either turning the rule off completely (using the likes of > SecRuleRemoveById), turning it off for particular parameters (using the > likes of SecRuleUpdateActionById) or turning it off for particular URLs > (this is more complicated aged and can require building a new rule to do > this). > > > > Tuning rules is necessary and, as long as you have a good understanding of > what the rules intention is, why it blocked, why that was incorrect thing > for it to do then you should tweak and turn them off for certain scenarios. > Does that reduce the effectiveness of ModSecurity? Potentially but then if > it blocks all sorts of real visitors incorrectly then that's not much use > is it! The OWASP CRS is very generic and all the rules will not be > appropriate for all websites. By default it blocks too much. There is some > work going on to make the default more lenient so you can start off with > some protection and ramp up as you see fit rather than current situation > where you start with too much protection and have to ramp down. > > > > Anyway after you see no more false positives for a while you can > turn SecRuleEngine back to on. > > > > This can take some time. See my story here to prepare you: > http://stackoverflow.com/questions/35149264/how-long-do-you-fine-tune-false-positives-with-mod-security-and-owasp-rules/35162976#35162976 > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jfp1DhFSw&s=5&u=http%3a%2f%2fstackoverflow%2ecom%2fquestions%2f35149264%2fhow-long-do-you-fine-tune-false-positives-with-mod-security-and-owasp-rules%2f35162976%2335162976>. > A WAF like ModSecurity is, unfortunately, not just a turn it on and it > works and you can forget about it solution. It takes a lot of set up to be > useful, and then a bit if minding afterwards. Personally I think it's worth > it but you also see people online saying WAFs are too much effort for this > reason. > > > > Anomaly scoring mode is an interesting one. It basically let's all the > rules run and then only blocks if a certain threshold applies. This means a > number of unimportant rules can fire. e.g. most browsers send a user agent > so no user agent, while it likely won't cause a problem is a flag that this > is probably a bad request. If a few of these flags fire on same request > then this is highly likely to be a bad request and should be blocked. Some > rules (like missing user agent) might have low threshold and so won't block > on their own and some will block with just one rule firing if it's obvious > this request should not processed. > > > > While anomaly scoring is undoubtedly helpful to reduce the number of > incorrect blocks, and lots of people use it and recommend it, I'm not a > particular fan. I find it makes the log files noisy and confusing to see > rules firing and not know if they caused a block or not. I prefer to turn > off the low value rules completely and using the original block at first > bad attempt mode despite the fact this takes extra work to set up initially > and can allow more spam and bad bots through. But each to their own. Will > leave Christian to explain how best to set it up if that's the way you want > to go. > > > > Here's some other posts that might help: > > > http://stackoverflow.com/questions/33676348/extra-sensitive-mod-security-rules-giving-403-forbidden-error > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44mTj0m1ERQ&s=5&u=http%3a%2f%2fstackoverflow%2ecom%2fquestions%2f33676348%2fextra-sensitive-mod-security-rules-giving-403-forbidden-error> > > > http://stackoverflow.com/questions/34478019/keep-modsecurity-enabled-with-symfony-installation-w-cpanel-whm/34484463#34484463 > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44j6x0GVFTg&s=5&u=http%3a%2f%2fstackoverflow%2ecom%2fquestions%2f34478019%2fkeep-modsecurity-enabled-with-symfony-installation-w-cpanel-whm%2f34484463%2334484463> > > > http://stackoverflow.com/questions/33989273/modsecurity-excessive-false-positives/34027786#34027786 > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jGz12xDTw&s=5&u=http%3a%2f%2fstackoverflow%2ecom%2fquestions%2f33989273%2fmodsecurity-excessive-false-positives%2f34027786%2334027786> > > Note this mailing list is awesome and you will get help here but I have > also been answering ModSecurity questions on StackOverflow/ServerFault as > feel they are better to reference again for common questions like yours. > Been meaning to write a friendly, short, beginners containing a lot of the > detail here but have a problem keeping my posts short :-) > > > > Hope that helps and feel free to ask any questions here. We're a friendly > bunch. > > > > Thanks, > > Barry > > > > > > -- > > *T. Kenneth S. Lojo* > Specialist-Online Media Design > > [image: Image removed by sender. IRRI] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jay1mwTSg&s=5&u=http%3a%2f%2firri%2eorg%2f> > > +63 2 580 5600 ext. 2703/2744 > +63 928 209 1191 (mobile) > t.l...@irri.org <g.lav...@irri.org> > www.irri.org > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jPnhj0STA&s=5&u=http%3a%2f%2fwww%2eirri%2eorg> > > [image: Image removed by sender. Facebook] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44mTggTpFSg&s=5&u=http%3a%2f%2fwww%2efacebook%2ecom%2fIRRI%2ericenews> > [image: Image removed by sender. Twitter] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44mC2hjoRGQ&s=5&u=http%3a%2f%2ftwitter%2ecom%2fRiceResearch> > [image: Image removed by sender. Flickr] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jLn3D4WHA&s=5&u=http%3a%2f%2fwww%2eflickr%2ecom%2fphotos%2fricephotos%2fcollections%2f> > [image: Image removed by sender. Youtube] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jC2gD0TRA&s=5&u=http%3a%2f%2fwww%2eyoutube%2ecom%2fuser%2firrivideo%2ffeatured> > [image: Image removed by sender. Scribd] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44mLig21AGA&s=5&u=http%3a%2f%2fwww%2escribd%2ecom%2fIRRI%5fresources> > [image: Image removed by sender. Linkedin] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44j_p1GQQSQ&s=5&u=http%3a%2f%2fwww%2elinkedin%2ecom%2fcompany%2finternational-rice-research-institute> > [image: Image removed by sender. Soundcloud] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jPmhmwSHw&s=5&u=https%3a%2f%2fsoundcloud%2ecom%2firri-radio> > [image: Image removed by sender. Google+] > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jLo1TkWGQ&s=5&u=https%3a%2f%2fplus%2egoogle%2ecom%2f103972671963502739315> > > The International Rice Research Institute > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jXghm0XGA&s=5&u=http%3a%2f%2firri%2eorg> > is > a member of the CGIAR > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44j_j1m4UGQ&s=5&u=http%3a%2f%2fwww%2ecgiar%2eorg%2f> > > > The International Rice Research Institute > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44jXghm0XGA&s=5&u=http%3a%2f%2firri%2eorg> > is > a member of the CGIAR > <http://scanmail.trustwave.com/?c=4062&d=otS611Q20SL86MvZAP2-57BForsTwwP44mOxgW4WSQ&s=5&u=http%3a%2f%2fcgiar%2eorg> > consortium > > ------------------------------ > > This transmission may contain information that is privileged, > confidential, and/or exempt from disclosure under applicable law. If you > are not the intended recipient, you are hereby notified that any > disclosure, copying, distribution, or use of the information contained > herein (including any reliance thereon) is strictly prohibited. If you > received this transmission in error, please immediately contact the sender > and destroy the material in its entirety, whether in electronic or hard > copy format. > -- *T. Kenneth S. Lojo* Specialist-Online Media Design [image: IRRI] <http://irri.org/> +63 2 580 5600 ext. 2703/2744 +63 928 209 1191 (mobile) t.l...@irri.org <g.lav...@irri.org> www.irri.org [image: Facebook] <http://www.facebook.com/IRRI.ricenews> [image: Twitter] <http://twitter.com/RiceResearch> [image: Flickr] <http://www.flickr.com/photos/ricephotos/collections/> [image: Youtube] <http://www.youtube.com/user/irrivideo/featured> [image: Scribd] <http://www.scribd.com/IRRI_resources> [image: Linkedin] <http://www.linkedin.com/company/international-rice-research-institute> [image: Soundcloud] <https://soundcloud.com/irri-radio> [image: Google+] <https://plus.google.com/103972671963502739315> The International Rice Research Institute <http://irri.org> is a member of the CGIAR <http://www.cgiar.org/> -- The International Rice Research Institute <http://irri.org> is a member of the CGIAR <http://cgiar.org> consortium
_______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set