Thank you about your reply. I know about the exclusion, but I don’t think this 
is the perfect solution, because if I exclude all the false positive rules 
there will be 2-3 maybe working rules at all :) Maybe they should be tunned? 
What is going on when the anomaly score is higher - this I couldn’t understand 
- users are not blocked or what? If I understand right I can start with high 
anomaly score for all rule with equal score until I tune them perfectly.

In the nginx I have ratelimits and I prefer to start with most common Wordpress 
/ Joomla hacks rule that can stop some part of the hacks, because this is the 
biggest problem

Best regards,
Georgi Georgiev
.
> On Aug 15, 2017, at 9:52 AM, Christian Folini <christian.fol...@netnea.com> 
> wrote:
> 
> Hello Georgi,
> 
> CRS3 comes with default rule exclusions for WP and Drupal that solve
> many of the base installations FPs. Collaborating with the project on
> a set of Joomla rule exclusions would be most helpful.
> 
> Starting with a higher anomaly threshold while you weed out the false
> positives is a method that I advocate in my documentation.
> 
> Making sure that you do not base your tuning efforts on attack traffic
> is an obvious problems. There are multiple approaches to this, and none
> of them is hard science. I usually try to start off with tuning based on
> known IP ranges.
> 
> This is all discussed in great detail in the series of ModSecurity
> tutorials at https://www.netnea.com/cms/apache-tutorials/
> 
> Besides, I am also running two public ModSec courses in October.
> 
> Good luck!
> 
> Christian
> 
> 
> On Mon, Aug 14, 2017 at 03:29:39PM +0300, Georgi Georgiev wrote:
>> Hello,
>> I am deploying mod security with nginx in shared hosting environment and 
>> most of the websites are Wordpress, Joomla and drupal. I don’t want to 
>> rewrite all the rules of owasp to minimize the false positives. Also, I 
>> searched for specific for Wordpress or Joomla ruleset but couldn’t find such 
>> thing (it would be very resourceful to research for every Wordpress and 
>> Joomla hack, even the most famouse one and to write rules about it, also to 
>> read how to write rules :)). Even, if I put mod security initially in a mode 
>> that does not block , only to log it would be very hard to see very queer if 
>> it’s false positive or whether it come from evil sources.
>> 
>> I read that right practice is to change the score of the anomaly but didn’t 
>> understand it at all.
>> 
>> So, I would like to ask you how you deal with this? I know that false 
>> positives will be there all the time, but how you minimize them? Write your 
>> own ruleset? Is there any paid ruleset that you can recommend (it think that 
>> I found only one paid and many people cry from it). Just I want to explain 
>> me the process you follow with the rules :)
>> 
>> Thank you in advance!
>> _______________________________________________
>> Owasp-modsecurity-core-rule-set mailing list
>> Owasp-modsecurity-core-rule-set@lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
> 
> -- 
> https://www.feistyduck.com/books/modsecurity-handbook/
> mailto:christian.fol...@netnea.com
> twitter: @ChrFolini

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to