Hi there,

It's been a few weeks, and I thought I'd do another status update.

The CRS3 release was six weeks ago. We were a bit afraid, that adoption
would lead to many reports of new false positives. That is clearly not
the case. Feeling better now. You can check the open issues with CRS
3.0.0 on github:
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22v3.0-dev+Development%22

There is a mini-tutorial at How-To-Forge on how to run CRS3 with
ISPConfig. We may look into integrating the documented rule exclusions
in a future CRS version.
https://www.howtoforge.com/community/threads/mini-howto-modsecurity-crs-3-0-on-debian-jessie.74898

Longtime Debian packager Alberto Gonzalez Iniesta has packaged CRS3 for
debian and published the new package. I worked with him on package
optimization (better paths, simpler includes, better description, etc.).
That work will be uploaded right before Debian Stretch (the next Debian
release) will be frozen. The Debian package is of course very important
as it will be picked up by many other distributions depending on Debian.
https://packages.debian.org/jessie-backports/modsecurity-crs

The tutorials about Apache/ModSecurity that I updated for CRS3 have been
translated to German. You can get them here:
https://www.netnea.com/cms/apache-tutorials-de/

While staying at a hotel in Germany during a ModSec course I ran, I
hacked together a Core Rule Set inventory. It gives you an overview
over all CRS3 rules and serves as link to the definition of the rule
on github. There are also options for easy access like typing
"crs 942100" in the address bar of the browser and being taken to
the right rule entry in the rule inventory immediately. So if you
face an alert, you can type the rule id in the browser and it
gives you all you need to know about the rule that triggered the alarm:
https://www.netnea.com/cms/core-rule-set-inventory

The next course will be in Zurich, Switzerland, near the end of
February. There is now a single early bird ticket left. And afterwards
a hand full of regular price tickets:
https://www.feistyduck.com/training/modsecurity-training-course

Chaim, Walter and I are planning to make an appearance at the
OWASP AppSecEurope conference in Belfast in May. We are planning various
talks and activities around the Core Rule Set. If you want to join
(or support and contribute!), you can follow our plans on the OWASP
wiki:
https://www.owasp.org/index.php/CRSAppSecEU2017

And finally, Linux Weekly News published an article on ModSecurity last
week: 
https://lwn.net/Articles/708673/ 
A second one about CRS3 came out yesterday. It is paywalled for seven
days, afterwards it will become freely available. If you are not a
subscriber, but you want instant access nevertheless, then let me know
and I can send you a subscriber's link.

That's all that springs to mind right now.

All the best!

Christian

-- 
CRS website: https://www.modsecurity.org/crs
CRS at OWASP: 
https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project
CRS tutorials: https://netnea.com/apache-tutorials
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to