<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Brectanus</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Brectanus"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Brectanus"/>
		<updated>2026-04-23T23:09:36Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=59191</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=59191"/>
				<updated>2009-04-18T22:05:07Z</updated>
		
		<summary type="html">&lt;p&gt;Brectanus: Added a link to my account.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:ModSecuriity.JPG|200px|right]]&lt;br /&gt;
'''Overview'''&lt;br /&gt;
&lt;br /&gt;
[http://www.modsecurity.org/ ModSecurity] is an Apache web server module that provides a web application firewall engine.  The ModSecurity Rules Language engine is extrememly flexible and robust and has been referred to as the &amp;quot;Swiss Army Knife of web application firewalls.&amp;quot;  While this is certainly true, it doesn't do much implicitly on its own and requires rules to tell it what to do. In order to enable users to take full advantage of ModSecurity out of the box, we have developed the '''Core Rule Set (CRS)''' which provides critical protections against attacks across most every web architecture.&lt;br /&gt;
&lt;br /&gt;
Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, the CRS is based on generic rules which focus on attack payload identification in order to provide protection from zero day and unknown vulnerabilities often found in web applications, which are in most cases custom coded.&lt;br /&gt;
&lt;br /&gt;
'''Why The Core Rule Set?'''&lt;br /&gt;
&lt;br /&gt;
The focus of the core rule set is to be a &amp;quot;rule set&amp;quot; rather than a set of rules. What makes a rule set different than a set of rules? &lt;br /&gt;
&lt;br /&gt;
*Performance - The Core Rule Set is optimized for performance. The amount and content of the rules used predominantly determines the performance impact of ModSecurity, so the performance optimization of the rule set is very important. &lt;br /&gt;
*Quality - While there will always be false positives, a lot of effort is put into trying to make the Core Rule Set better. Some of the things done are: &lt;br /&gt;
**Regression tests - a regression test is used to ensure that every new version shipped does not break anything. Actually every report of a false positive, once solved, gets into the regression test. &lt;br /&gt;
**Real traffic testing – A large amount of real world capture files have been converted to tests and sent through ModSecurity to detect potential false positives. &lt;br /&gt;
*Generic Detection - The core rule set is tuned to detect generic attacks and does not include specific rules for known vulnerabilities. Due to this feature the core rule set has better performance, is more &amp;quot;plug and play&amp;quot; and requires less updates. &lt;br /&gt;
*Event Information - Each rule in the Core Rule Set has a unique ID and a textual message. In the future rules are also going to be classified using a new tag action in ModSecurity, as well as longer information regarding each rule using comments in the files themselves. &lt;br /&gt;
*Plug and Play – The Core Rule Set is designed to be as plug and play as possible. Since its performance is good and it employs generic detection, and since the number of false positives is getting lower all the time, the Core Rule Set can be installed as is with little twisting and tweaking. &lt;br /&gt;
&lt;br /&gt;
'''Content'''&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
*Protocol compliance:&lt;br /&gt;
**HTTP request validation - This first line of protection ensures that all abnormal HTTP requests are detected. This line of defense eliminates a large number of automated and non targeted attacks as well as protects the web server itself. &lt;br /&gt;
**HTTP protocol anomalies - Common HTTP usage patterns are indicative of attacks. &lt;br /&gt;
**Global constraints - Limiting the size and length of different HTTP protocol attributes, such as the number and length of parameters and the overall length of the request. Ensuring that these attributed are constrained can prevent many attacks including buffer overflow and parameter manipulation. &lt;br /&gt;
**HTTP Usage policy – validate requests against a predefined policy, setting limitations request properties such as methods, content types and extensions. &lt;br /&gt;
*Attack Detection:&lt;br /&gt;
**Malicious client software detection - Detect requests by malicious automated programs such as robots, crawlers and security scanners. Malicious automated programs collect information from a web site, consume bandwidth and might also search for vulnerabilities on the web site. Detecting malicious crawlers is especially useful against comments spam. &lt;br /&gt;
**Generic Attack Detection - Detect application level attacks such as described in the OWASP top 10. These rules employ context based patterns match over normalized fields. Detected attacks include: &lt;br /&gt;
***SQL injection and Blind SQL injection. &lt;br /&gt;
***Cross Site Scripting (XSS). &lt;br /&gt;
***OS Command Injection and remote command access. &lt;br /&gt;
***File name injection. &lt;br /&gt;
***ColdFusion, PHP and ASP injection. &lt;br /&gt;
***E-Mail Injection &lt;br /&gt;
***HTTP Response Splitting. &lt;br /&gt;
***Universal PDF XSS. &lt;br /&gt;
**Trojans &amp;amp; Backdoors Detection - Detection of attempts to access Trojans &amp;amp; backdoors already installed on the system. This feature is very important in a hosting environment when some of these backdoors may be uploaded in a legitimate way and used maliciously. &lt;br /&gt;
*Other:&lt;br /&gt;
**Error Detection - Prevent application error messages and code snippets from being sent to the user. This makes attacking the server much harder and is also a last line of defense if an attack passes through. &lt;br /&gt;
**XML Protection – The Core Rule Set can be set to examine XML payload for most signatures. &lt;br /&gt;
**Search Engine Monitoring - Log access by search engines crawlers to the web site. &lt;br /&gt;
&lt;br /&gt;
==== Installation ====&lt;br /&gt;
'''Quick Start'''&lt;br /&gt;
&lt;br /&gt;
The Core Rule Set is a set of apache configuration files that should be added to your Apache configuration. To install the Core Rule Set:&lt;br /&gt;
&lt;br /&gt;
*Extract the Core Rule Set content into a directory called modsecurity under your Apache configuration directory. &lt;br /&gt;
*Edit and customize modsecurity_crs_10_config.conf. This file contains comments which explain how to set up each directive. You may also want to edit modsecurity_crs_30_http_policy.conf which sets rules specific to your application. &lt;br /&gt;
*Add the directive Include conf/modsecurity/*.conf to your httpd.conf after the line where ModSecurity itself it loaded. &lt;br /&gt;
*Restart Apache. &lt;br /&gt;
*Check that the server works normally, and simulate an attack by browsing to the URL http://yourhost/cmd.exe. Instead of a “page not found” error, you should get a “Method Not Implemented” error. &lt;br /&gt;
&lt;br /&gt;
We strongly recommend that you start using the Core Rule Set in monitoring only mode by changing the directive SecRuleEngine in file modsecurity_crs_10_config.conf from On to DetectionOnly. After operating in this mode for a period of time, analyze the alerts recorded in your Apache error log. If there are alerts that you dim as false positives refer to the section about handling false positives later in this document.&lt;br /&gt;
Only after such a process it is safe to move back to blocking by setting SecRuleEngine in file modsecurity_crs_10_config.conf to On.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Documentation ====&lt;br /&gt;
&lt;br /&gt;
==== Presentations and Whitepapers ====&lt;br /&gt;
Ofer Shezaf's [http://www.owasp.org/images/2/21/OWASPAppSec2007Milan_ModSecurityCoreRuleSet.ppt presentation] and [https://www.owasp.org/images/0/07/OWASP6thAppSec_ModSecurityCoreRuleSet_OferShezaf.pdf whitepaper] on the Core Rule Set for the latest version of ModSecurity presented at 6th OWASP AppSec conference in Milan, Italy, in May 2007 &lt;br /&gt;
&lt;br /&gt;
==== Related Projects ====&lt;br /&gt;
[http://www.modsecurity.org/ ModSecurity-Open Source Web Application Firewall]&amp;lt;br&amp;gt;[[:Category:OWASP Securing WebGoat using ModSecurity Project|OWASP Securing WebGoat using ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Latest News and Mail List ====&lt;br /&gt;
'''Project Mail List'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set Subscribe here]&amp;lt;br&amp;gt;[mailto:owasp-modsecurity-core-rule-set@lists.owasp.org Use here] |&lt;br /&gt;
&lt;br /&gt;
==== Contributors, Users and Adopters ====&lt;br /&gt;
'''Project Leader'''&lt;br /&gt;
&lt;br /&gt;
[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
'''Project Contributors'''&lt;br /&gt;
&lt;br /&gt;
[[:User:Brectanus|Brian Rectanus]]&lt;br /&gt;
&lt;br /&gt;
'''The Core Rule Set (CRS) project is sponsored by:'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.breach.com/resources/breach-security-labs/index.html http://www.owasp.org/images/5/56/BreachSecurityLabs.jpg]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''The CRS is an open source rule set licensed under GPLv2. ModSecurity Core Rule Set works with ModSecurity 2.5 and above.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Key Project Information:OWASP ModSecurity Core Rule Set Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Document]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Document]]&lt;/div&gt;</summary>
		<author><name>Brectanus</name></author>	</entry>

	</feed>