Dear all,

We had the first major bug report for CRS3-RC1 today.
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/542

The maximum line length of Apache 2.2 is too short for two of the
new Remote Command Execution rules which come in at over 10K bytes.

Expect a fix on github in the next few days; certainly for RC2.

Meanwhile Apache 2.4 is doing great and github user @emphazer who
discovered this bug reports of over 100 production machines running
CRS3-RC1.

But the list here has remained silent over the release. I see several
possible reasons:
- Nobody gives a shit
- It fails so miserably on your server you removed it immediately and
  you do not want to talk about CRS anymore
- It worked like a charm without any false positives, so you forgot
  about its existence instantly.

Either way, some feedback would be nice. This is an opensource project.
Chaim and Walter worked day and night for this, and if not even the
project mailinglist has some positive or negative feedback, then I
wonder why anybody is doing this at all.

Best,

Christian Folini


-- 
https://www.feistyduck.com/training/modsecurity-training-course
mailto:christian.fol...@netnea.com
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to