<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dune73</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dune73"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Dune73"/>
		<updated>2026-04-21T15:52:56Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235622</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235622"/>
				<updated>2017-11-19T16:31:26Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://modsecurity.org ModSecurity] or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts. The CRS provides protection against many common attack categories, including SQL Injection, Cross Site Scripting, Locale File Inclusion, etc.&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-full_size-512x257.png|512px|link=https://coreruleset.org]]&lt;br /&gt;
&lt;br /&gt;
'''The offical website of the project can be found at [https://coreruleset.org https://coreruleset.org].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at the official website at [https://coreruleset.org https://coreruleset.org] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Website ==&lt;br /&gt;
&lt;br /&gt;
* [https://coreruleset.org https://coreruleset.org]&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
* [[:user:Dune73|Christian Folini]]&lt;br /&gt;
* [[:User:lifeforms|Walter Hop]]&lt;br /&gt;
Contributors:&lt;br /&gt;
* Christoph Hansen&lt;br /&gt;
* Felipe 'Zimmerle' Costa&lt;br /&gt;
* Franziska Bühler&lt;br /&gt;
* Victor Hora&lt;br /&gt;
* Federico Schwindt&lt;br /&gt;
* Felipe Zipitría&lt;br /&gt;
* Manuel Spartan&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* The installation page has the link to the latest release: [https://coreruleset.org/installation/ https://coreruleset.org/installation/]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* We publish a monthly newsletter on the official website at [https://coreruleset.org/ https://coreruleset.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
* There is a project mailinglist at [https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CRS-logo-full_size-512x257.png&amp;diff=235621</id>
		<title>File:CRS-logo-full size-512x257.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CRS-logo-full_size-512x257.png&amp;diff=235621"/>
				<updated>2017-11-19T16:29:34Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235620</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235620"/>
				<updated>2017-11-19T16:25:56Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://modsecurity.org ModSecurity] or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts. The CRS provides protection against many common attack categories, including SQL Injection, Cross Site Scripting, Locale File Inclusion, etc.&lt;br /&gt;
&lt;br /&gt;
'''The offical website of the project can be found at [https://coreruleset.org https://coreruleset.org].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at the official website at [https://coreruleset.org https://coreruleset.org] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Website ==&lt;br /&gt;
&lt;br /&gt;
* [https://coreruleset.org https://coreruleset.org]&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
* [[:user:Dune73|Christian Folini]]&lt;br /&gt;
* [[:User:lifeforms|Walter Hop]]&lt;br /&gt;
Contributors:&lt;br /&gt;
* Christoph Hansen&lt;br /&gt;
* Felipe 'Zimmerle' Costa&lt;br /&gt;
* Franziska Bühler&lt;br /&gt;
* Victor Hora&lt;br /&gt;
* Federico Schwindt&lt;br /&gt;
* Felipe Zipitría&lt;br /&gt;
* Manuel Spartan&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* The installation page has the link to the latest release: [https://coreruleset.org/installation/ https://coreruleset.org/installation/]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* We publish a monthly newsletter on the official website at [https://coreruleset.org/ https://coreruleset.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
* There is a project mailinglist at [https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235619</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235619"/>
				<updated>2017-11-19T16:24:47Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://modsecurity.org ModSecurity] or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts. The CRS provides protection against many common attack categories, including SQL Injection, Cross Site Scripting, Locale File Inclusion, etc.&lt;br /&gt;
&lt;br /&gt;
'''The offical website of the project can be found at [https://coreruleset.org https://coreruleset.org].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at the official website at [https://coreruleset.org https://coreruleset.org] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
* [[:user:Dune73|Christian Folini]]&lt;br /&gt;
* [[:User:lifeforms|Walter Hop]]&lt;br /&gt;
Contributors:&lt;br /&gt;
* Christoph Hansen&lt;br /&gt;
* Felipe 'Zimmerle' Costa&lt;br /&gt;
* Franziska Bühler&lt;br /&gt;
* Victor Hora&lt;br /&gt;
* Federico Schwindt&lt;br /&gt;
* Felipe Zipitría&lt;br /&gt;
* Manuel Spartan&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* The installation page has the link to the latest release: [https://coreruleset.org/installation/ https://coreruleset.org/installation/]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* We publish a monthly newsletter on the official website at [https://coreruleset.org/ https://coreruleset.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
* There is a project mailinglist at [https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235618</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235618"/>
				<updated>2017-11-19T16:16:21Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: Simplifying Core Rule Set page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://modsecurity.org ModSecurity] or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts. The CRS provides protection against many common attack categories, including SQL Injection, Cross Site Scripting, Locale File Inclusion, etc.&lt;br /&gt;
&lt;br /&gt;
'''The offical website of the project can be found at [https://coreruleset.org https://coreruleset.org].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
* [[:user:Dune73|Christian Folini]]&lt;br /&gt;
* [[:User:lifeforms|Walter Hop]]&lt;br /&gt;
Contributors:&lt;br /&gt;
* Christoph Hansen&lt;br /&gt;
* Felipe 'Zimmerle' Costa&lt;br /&gt;
* Franziska Bühler&lt;br /&gt;
* Victor Hora&lt;br /&gt;
* Federico Schwindt&lt;br /&gt;
* Felipe Zipitría&lt;br /&gt;
* Manuel Spartan&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code''' : https://github.com/SpiderLabs/owasp-modsecurity-crs &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Issues''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Feature Requests''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues (interleaved the issues, look for the right tag, currently ''candidate issue'')&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of GitHub Shortcuts / Bookmarks ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/v3.0-dev%20Development Open Issues 3.0.x] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/False%20Positive False Positives]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22False+Negative+-+Evasion%22 False Negatives] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22v3.1.0-rc1+Candidate+Issue%22 Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+-label%3A%22v3.1.0-rc1+Candidate+Issue%22 All Issues but not Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/Published%20Research Published research affecting project]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20no%3Alabel Open Issues without a label / tag]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20label%20no%3Aassignee Open Issues with a label, but without assignee]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2015-01-01 Open Issues before 2015]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-01-01 Open Issues before 2016] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-11-10 Open Issues before CRS3 was released (2016-11-10)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2017-01-01 Open Issues before 2017]&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235581</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=235581"/>
				<updated>2017-11-18T20:48:52Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Project Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
* [[:user:Dune73|Christian Folini]]&lt;br /&gt;
* [[:User:lifeforms|Walter Hop]]&lt;br /&gt;
Contributors:&lt;br /&gt;
* Christoph Hansen&lt;br /&gt;
* Felipe 'Zimmerle' Costa&lt;br /&gt;
* Franziska Bühler&lt;br /&gt;
* Victor Hora&lt;br /&gt;
* Federico Schwindt&lt;br /&gt;
* Felipe Zipitría&lt;br /&gt;
* Manuel Spartan&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code''' : https://github.com/SpiderLabs/owasp-modsecurity-crs &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Issues''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Feature Requests''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues (interleaved the issues, look for the right tag, currently ''candidate issue'')&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of GitHub Shortcuts / Bookmarks ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/v3.0-dev%20Development Open Issues 3.0.x] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/False%20Positive False Positives]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22False+Negative+-+Evasion%22 False Negatives] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22v3.1.0-rc1+Candidate+Issue%22 Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+-label%3A%22v3.1.0-rc1+Candidate+Issue%22 All Issues but not Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/Published%20Research Published research affecting project]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20no%3Alabel Open Issues without a label / tag]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20label%20no%3Aassignee Open Issues with a label, but without assignee]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2015-01-01 Open Issues before 2015]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-01-01 Open Issues before 2016] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-11-10 Open Issues before CRS3 was released (2016-11-10)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2017-01-01 Open Issues before 2017]&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232325</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232325"/>
				<updated>2017-08-15T10:00:27Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|[[File:CRS-logo-naked_size-512x512.png|256px|thumb|left|naked logo]]&lt;br /&gt;
|-&lt;br /&gt;
|[[File:CRS-logo-full-CRS_size-512x338.png|512px|thumb|left|full logo with CRS]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
A full range of ready-made files are prepared in the zip file below:&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
Contents of the README file included with the zip file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
This is the logo of the CRS project created by Hugo Costa (hugo.costa@owasp.org).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;source&amp;quot; contains the logo as provided by Hugo in PDF format.&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; contains derived versions in xcf (gimp) and png format (+ 1 ico file).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; has the following subfolders:&lt;br /&gt;
* naked         Naked logo without any text&lt;br /&gt;
* CRS           Logo with large CRS beneath&lt;br /&gt;
* CRS-claim     Logo with large CRS beneath and the claim&lt;br /&gt;
* full          Logo with the full project title to the right&lt;br /&gt;
* full-CRS      Logo with the full project title to the right and a large CRS&lt;br /&gt;
&lt;br /&gt;
The pngs are all coming with transparent background. All have some whitespace around&lt;br /&gt;
with the exception of the versions in the naked folder.&lt;br /&gt;
&lt;br /&gt;
The png files are prepared in various sizes. Down to a size where the text is still readable.&lt;br /&gt;
There is an ico file in the naked folder.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, we do not yet have a vectorized svg version. I tried to vectorize myself, but&lt;br /&gt;
the colour gradient misbehaves. Hugo promised to deliver this too. Will probably take some time.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232324</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232324"/>
				<updated>2017-08-15T10:00:09Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|[[File:CRS-logo-naked_size-512x512.png|256px|thumb|top|naked logo]]&lt;br /&gt;
|-&lt;br /&gt;
|[[File:CRS-logo-full-CRS_size-512x338.png|512px|thumb|top|full logo with CRS]]&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A full range of ready-made files are prepared in the zip file below:&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
Contents of the README file included with the zip file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
This is the logo of the CRS project created by Hugo Costa (hugo.costa@owasp.org).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;source&amp;quot; contains the logo as provided by Hugo in PDF format.&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; contains derived versions in xcf (gimp) and png format (+ 1 ico file).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; has the following subfolders:&lt;br /&gt;
* naked         Naked logo without any text&lt;br /&gt;
* CRS           Logo with large CRS beneath&lt;br /&gt;
* CRS-claim     Logo with large CRS beneath and the claim&lt;br /&gt;
* full          Logo with the full project title to the right&lt;br /&gt;
* full-CRS      Logo with the full project title to the right and a large CRS&lt;br /&gt;
&lt;br /&gt;
The pngs are all coming with transparent background. All have some whitespace around&lt;br /&gt;
with the exception of the versions in the naked folder.&lt;br /&gt;
&lt;br /&gt;
The png files are prepared in various sizes. Down to a size where the text is still readable.&lt;br /&gt;
There is an ico file in the naked folder.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, we do not yet have a vectorized svg version. I tried to vectorize myself, but&lt;br /&gt;
the colour gradient misbehaves. Hugo promised to deliver this too. Will probably take some time.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232323</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232323"/>
				<updated>2017-08-15T09:58:43Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-naked_size-512x512.png|256px|thumb|top|naked logo]]&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!1&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
[[File:CRS-logo-full-CRS_size-512x338.png|512px|thumb|top|full logo with CRS]]&lt;br /&gt;
&lt;br /&gt;
A full range of ready-made files are prepared in the zip file below:&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
Contents of the README file included with the zip file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
This is the logo of the CRS project created by Hugo Costa (hugo.costa@owasp.org).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;source&amp;quot; contains the logo as provided by Hugo in PDF format.&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; contains derived versions in xcf (gimp) and png format (+ 1 ico file).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; has the following subfolders:&lt;br /&gt;
* naked         Naked logo without any text&lt;br /&gt;
* CRS           Logo with large CRS beneath&lt;br /&gt;
* CRS-claim     Logo with large CRS beneath and the claim&lt;br /&gt;
* full          Logo with the full project title to the right&lt;br /&gt;
* full-CRS      Logo with the full project title to the right and a large CRS&lt;br /&gt;
&lt;br /&gt;
The pngs are all coming with transparent background. All have some whitespace around&lt;br /&gt;
with the exception of the versions in the naked folder.&lt;br /&gt;
&lt;br /&gt;
The png files are prepared in various sizes. Down to a size where the text is still readable.&lt;br /&gt;
There is an ico file in the naked folder.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, we do not yet have a vectorized svg version. I tried to vectorize myself, but&lt;br /&gt;
the colour gradient misbehaves. Hugo promised to deliver this too. Will probably take some time.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232322</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232322"/>
				<updated>2017-08-15T09:57:36Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-naked_size-512x512.png|256px|thumb|top|naked logo]]&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-full-CRS_size-512x338.png|512px|thumb|top|full logo with CRS]]&lt;br /&gt;
&lt;br /&gt;
A full range of ready-made files are prepared in the zip file below:&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
Contents of the README file included with the zip file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
This is the logo of the CRS project created by Hugo Costa (hugo.costa@owasp.org).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;source&amp;quot; contains the logo as provided by Hugo in PDF format.&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; contains derived versions in xcf (gimp) and png format (+ 1 ico file).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; has the following subfolders:&lt;br /&gt;
* naked         Naked logo without any text&lt;br /&gt;
* CRS           Logo with large CRS beneath&lt;br /&gt;
* CRS-claim     Logo with large CRS beneath and the claim&lt;br /&gt;
* full          Logo with the full project title to the right&lt;br /&gt;
* full-CRS      Logo with the full project title to the right and a large CRS&lt;br /&gt;
&lt;br /&gt;
The pngs are all coming with transparent background. All have some whitespace around&lt;br /&gt;
with the exception of the versions in the naked folder.&lt;br /&gt;
&lt;br /&gt;
The png files are prepared in various sizes. Down to a size where the text is still readable.&lt;br /&gt;
There is an ico file in the naked folder.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, we do not yet have a vectorized svg version. I tried to vectorize myself, but&lt;br /&gt;
the colour gradient misbehaves. Hugo promised to deliver this too. Will probably take some time.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232321</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232321"/>
				<updated>2017-08-15T09:57:14Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-naked_size-512x512.png|256px|thumb|naked logo]]&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-full-CRS_size-512x338.png|512px|thumb|full logo with CRS]]&lt;br /&gt;
&lt;br /&gt;
A full range of ready-made files are prepared in the zip file below:&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
Contents of the README file included with the zip file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
This is the logo of the CRS project created by Hugo Costa (hugo.costa@owasp.org).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;source&amp;quot; contains the logo as provided by Hugo in PDF format.&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; contains derived versions in xcf (gimp) and png format (+ 1 ico file).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; has the following subfolders:&lt;br /&gt;
* naked         Naked logo without any text&lt;br /&gt;
* CRS           Logo with large CRS beneath&lt;br /&gt;
* CRS-claim     Logo with large CRS beneath and the claim&lt;br /&gt;
* full          Logo with the full project title to the right&lt;br /&gt;
* full-CRS      Logo with the full project title to the right and a large CRS&lt;br /&gt;
&lt;br /&gt;
The pngs are all coming with transparent background. All have some whitespace around&lt;br /&gt;
with the exception of the versions in the naked folder.&lt;br /&gt;
&lt;br /&gt;
The png files are prepared in various sizes. Down to a size where the text is still readable.&lt;br /&gt;
There is an ico file in the naked folder.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, we do not yet have a vectorized svg version. I tried to vectorize myself, but&lt;br /&gt;
the colour gradient misbehaves. Hugo promised to deliver this too. Will probably take some time.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232320</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232320"/>
				<updated>2017-08-15T09:56:51Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-naked_size-512x512.png|256px|thumb|left|naked logo]]&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-full-CRS_size-512x338.png|512px|thumb|left|full logo with CRS]]&lt;br /&gt;
&lt;br /&gt;
A full range of ready-made files are prepared in the zip file below:&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
Contents of the README file included with the zip file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
This is the logo of the CRS project created by Hugo Costa (hugo.costa@owasp.org).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;source&amp;quot; contains the logo as provided by Hugo in PDF format.&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; contains derived versions in xcf (gimp) and png format (+ 1 ico file).&lt;br /&gt;
&lt;br /&gt;
The folder &amp;quot;uses&amp;quot; has the following subfolders:&lt;br /&gt;
* naked         Naked logo without any text&lt;br /&gt;
* CRS           Logo with large CRS beneath&lt;br /&gt;
* CRS-claim     Logo with large CRS beneath and the claim&lt;br /&gt;
* full          Logo with the full project title to the right&lt;br /&gt;
* full-CRS      Logo with the full project title to the right and a large CRS&lt;br /&gt;
&lt;br /&gt;
The pngs are all coming with transparent background. All have some whitespace around&lt;br /&gt;
with the exception of the versions in the naked folder.&lt;br /&gt;
&lt;br /&gt;
The png files are prepared in various sizes. Down to a size where the text is still readable.&lt;br /&gt;
There is an ico file in the naked folder.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, we do not yet have a vectorized svg version. I tried to vectorize myself, but&lt;br /&gt;
the colour gradient misbehaves. Hugo promised to deliver this too. Will probably take some time.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232319</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232319"/>
				<updated>2017-08-15T09:55:18Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-naked_size-512x512.png|512px|thumb|left|naked logo]]&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-full-CRS_size-512x338.png|512px|thumb|left|full logo with CRS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CRS-logo-full-CRS_size-512x338.png&amp;diff=232318</id>
		<title>File:CRS-logo-full-CRS size-512x338.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CRS-logo-full-CRS_size-512x338.png&amp;diff=232318"/>
				<updated>2017-08-15T09:54:20Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CRS-logo-naked_size-512x512.png&amp;diff=232317</id>
		<title>File:CRS-logo-naked size-512x512.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CRS-logo-naked_size-512x512.png&amp;diff=232317"/>
				<updated>2017-08-15T09:53:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232316</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232316"/>
				<updated>2017-08-15T09:52:33Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
[[File:CRS-logo-naked_size-512x512.png|512px|thumb|left|naked logo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232315</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232315"/>
				<updated>2017-08-15T09:50:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232313</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232313"/>
				<updated>2017-08-15T09:47:38Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== OWASP ModSecurity Core Rule Set: The project Logo ===&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232312</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232312"/>
				<updated>2017-08-15T09:46:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP ModSecurity Core Rule Set: The project Logo&lt;br /&gt;
&lt;br /&gt;
[[Media:CRS-logo-2017-08.zip|CRS-logo-2017-08.zip]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CRS-logo-2017-08.zip&amp;diff=232310</id>
		<title>File:CRS-logo-2017-08.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CRS-logo-2017-08.zip&amp;diff=232310"/>
				<updated>2017-08-15T09:43:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: Various versions of the logo.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Various versions of the logo.&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232309</id>
		<title>ModSecurity CRS Logo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_Logo&amp;diff=232309"/>
				<updated>2017-08-15T09:39:48Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: Creation of page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP ModSecurity Core Rule Set: The project Logo&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231513</id>
		<title>User:Dune73</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231513"/>
				<updated>2017-07-10T16:06:26Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Christian Folini (dune73) ===&lt;br /&gt;
&lt;br /&gt;
[[File:portrait_christian_folini_3_smaller.jpeg|400px|thumb|left|Christian Folini in his garden at home]]&lt;br /&gt;
&lt;br /&gt;
Christian Folini is a committer to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set project]. A long time ModSecurity user, he joined the project when Chaim Sanders and Walter Hop revived it in 2016. He developed the Paranoia Mode within the rule set and works in a role resembling that of a moderator and community contact. As such he is the go to place with questions regarding CRS or ModSecurity in general. He also managed to recruit several other people to join the growing CRS development community.&lt;br /&gt;
&lt;br /&gt;
The 2nd edition of the [https://www.feistyduck.com/books/modsecurity-handbook/ ModSecurity Handbook] was written by Christian and he also teaches Apache / ModSecurity courses regularly.&lt;br /&gt;
&lt;br /&gt;
Christian holds a PhD in medieval history and enjoys defending castles across Europe. Unfortunately, defending medieval castles is no big business anymore and Christian turned to defending web servers which he thinks equally challenging. With his background in humanities, Christian is able to bridge the gap between techies and non-techies. He brings more than ten years experience in this role, specialising in Apache / ModSecurity configuration, DDoS defense and threat modeling.&lt;br /&gt;
&lt;br /&gt;
Christian is a speaker at various conferences, including OWASP AppSecEU. He also works as program chair for the Swiss Cyber Storm conference and sits in a variety of other boards.&lt;br /&gt;
&lt;br /&gt;
Here are some links:&lt;br /&gt;
&lt;br /&gt;
* Email: [mailto:christian.folini@netnea.com christian.folini@netnea.com] &lt;br /&gt;
* Twitter: [https://twitter.com/ChrFolini @ChrFolini]&lt;br /&gt;
* His company's website: [https://www.netnea.com www.netnea.com]&lt;br /&gt;
* Private website: [https://www.christian-folini.ch www.christian-folini.ch]&lt;br /&gt;
* Blog: [https://www.netnea.com/cms/category/security/ blog]&lt;br /&gt;
* Teaching: [https://www.feistyduck.com/training/modsecurity-training-course FeistyDuck]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231512</id>
		<title>User:Dune73</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231512"/>
				<updated>2017-07-10T16:05:28Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Christian Folini (dune73) ===&lt;br /&gt;
&lt;br /&gt;
Christian Folini is a committer to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set project]. A long time ModSecurity user, he joined the project when Chaim Sanders and Walter Hop revived it in 2016. He developed the Paranoia Mode within the rule set and works in a role resembling that of a moderator and community contact. As such he is the go to place with questions regarding CRS or ModSecurity in general. He also managed to recruit several other people to join the growing CRS development community.&lt;br /&gt;
&lt;br /&gt;
[[File:portrait_christian_folini_3_smaller.jpeg|400px|thumb|left|Christian Folini in his garden at home]]&lt;br /&gt;
&lt;br /&gt;
The 2nd edition of the [https://www.feistyduck.com/books/modsecurity-handbook/ ModSecurity Handbook] was written by Christian and he also teaches Apache / ModSecurity courses regularly.&lt;br /&gt;
&lt;br /&gt;
Christian holds a PhD in medieval history and enjoys defending castles across Europe. Unfortunately, defending medieval castles is no big business anymore and Christian turned to defending web servers which he thinks equally challenging. With his background in humanities, Christian is able to bridge the gap between techies and non-techies. He brings more than ten years experience in this role, specialising in Apache / ModSecurity configuration, DDoS defense and threat modeling.&lt;br /&gt;
&lt;br /&gt;
Christian is a speaker at various conferences, including OWASP AppSecEU. He also works as program chair for the Swiss Cyber Storm conference and sits in a variety of other boards.&lt;br /&gt;
&lt;br /&gt;
Here are some links:&lt;br /&gt;
&lt;br /&gt;
* Email: [mailto:christian.folini@netnea.com christian.folini@netnea.com] &lt;br /&gt;
* Twitter: [https://twitter.com/ChrFolini @ChrFolini]&lt;br /&gt;
* His company's website: [https://www.netnea.com www.netnea.com]&lt;br /&gt;
* Private website: [https://www.christian-folini.ch www.christian-folini.ch]&lt;br /&gt;
* Blog: [https://www.netnea.com/cms/category/security/ blog]&lt;br /&gt;
* Teaching: [https://www.feistyduck.com/training/modsecurity-training-course FeistyDuck]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231511</id>
		<title>User:Dune73</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231511"/>
				<updated>2017-07-10T16:04:52Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Christian Folini (dune73) ===&lt;br /&gt;
&lt;br /&gt;
Christian Folini is a committer to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set project]. A long time ModSecurity user, he joined the project when Chaim Sanders and Walter Hop revived it in 2016. He developed the Paranoia Mode within the rule set and works in a role resembling that of a moderator and community contact. As such he is the go to place with questions regarding CRS or ModSecurity in general. He also managed to recruit several other people to join the growing CRS development community.&lt;br /&gt;
&lt;br /&gt;
[[File:portrait_christian_folini_3_smaller.jpeg|400px|thumb|left|Portrai Christian Folini]]&lt;br /&gt;
&lt;br /&gt;
The 2nd edition of the [https://www.feistyduck.com/books/modsecurity-handbook/ ModSecurity Handbook] was written by Christian and he also teaches Apache / ModSecurity courses regularly.&lt;br /&gt;
&lt;br /&gt;
Christian holds a PhD in medieval history and enjoys defending castles across Europe. Unfortunately, defending medieval castles is no big business anymore and Christian turned to defending web servers which he thinks equally challenging. With his background in humanities, Christian is able to bridge the gap between techies and non-techies. He brings more than ten years experience in this role, specialising in Apache / ModSecurity configuration, DDoS defense and threat modeling.&lt;br /&gt;
&lt;br /&gt;
Christian is a speaker at various conferences, including OWASP AppSecEU. He also works as program chair for the Swiss Cyber Storm conference and sits in a variety of other boards.&lt;br /&gt;
&lt;br /&gt;
Here are some links:&lt;br /&gt;
&lt;br /&gt;
* Email: [mailto:christian.folini@netnea.com christian.folini@netnea.com] &lt;br /&gt;
* Twitter: [https://twitter.com/ChrFolini @ChrFolini]&lt;br /&gt;
* His company's website: [https://www.netnea.com www.netnea.com]&lt;br /&gt;
* Private website: [https://www.christian-folini.ch www.christian-folini.ch]&lt;br /&gt;
* Blog: [https://www.netnea.com/cms/category/security/ blog]&lt;br /&gt;
* Teaching: [https://www.feistyduck.com/training/modsecurity-training-course FeistyDuck]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Portrait_christian_folini_3_smaller.jpeg&amp;diff=231510</id>
		<title>File:Portrait christian folini 3 smaller.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Portrait_christian_folini_3_smaller.jpeg&amp;diff=231510"/>
				<updated>2017-07-10T16:03:12Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Portrait_christian_folini_3.jpeg&amp;diff=231509</id>
		<title>File:Portrait christian folini 3.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Portrait_christian_folini_3.jpeg&amp;diff=231509"/>
				<updated>2017-07-10T15:59:26Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: Portrait Christian Folini&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Portrait Christian Folini&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231508</id>
		<title>WASPY Awards 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231508"/>
				<updated>2017-07-10T15:57:48Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* And the Nominees Are... */ Adding link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2017 Banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Purpose of the Awards==&lt;br /&gt;
&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission. Some of these individuals are well known to the community while others are not. &lt;br /&gt;
&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;. These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.''' &lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
Call for Nominees Opens June 7, 2017  &lt;br /&gt;
&lt;br /&gt;
Call for Nominees Closes June 30, 2017 - CLOSED &lt;br /&gt;
&lt;br /&gt;
Announcement of Nominees per Category July 5, 2017 - DONE &lt;br /&gt;
&lt;br /&gt;
Deadline for Nominee Profile Picture and Bio to be created and added to the Nominees section July 10, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Opens July 17, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Closes July 24, 2017  &lt;br /&gt;
&lt;br /&gt;
Winners are Notified July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Announcement of Winners to the Community July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Award Ceremony at AppSecUSA 2017 in Orlando, FL September 21-22, 2017 &lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
The WASPYs celebrate the actors in our community who grow OWASP and drive innovation to the safety and security of the world’s software. This year we are excited to offer three categories.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Community Supporter''' - The WASPY for COMMUNITY honors members who create dynamic INTERACTION and LEARNING opportunities for the OWASP Community.  Nominees to the Community WASPY Award create collaborative and inclusive environments and grow the OWASP Community.  WASPYs focus on the unsung heros of the OWASP community.  Chapter Leaders and Community Members should especially consider leaders and volunteers who bring something extra to the environment, help the chapter reach out to new attendees, or carry out the tedious and repetitive tasks that make growing an OWASP Chapter possible.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Mission Outreach'''  - The WASPY for Mission Outreach honors community members who help the community GROW.  Growth can happen inside the larger OWASP community or outside it in the broader AppSec and development communities.   Leaders and Members should especially consider volunteers who pushed the boundaries of the audience and reach of OWASP to provide new exposure for OWASP’s projects and chapters.  New leaders and volunteers who help bring more people to your chapter, project, or actively represent OWASP at non-OWASP events, gatherings, and activities to build an active OWASP community are ideal candidates for the Mission Outreach WASPY award.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Innovator'''  - The WASPY for Innovation is given to a community member who has contributed to the TECHNICAL advancement of OWASP in the past year.  This advancement is usually through an [[:Category:OWASP Project|OWASP Project]] and can be in the form of code, an application, or anything that materially makes the AppSec community better in a unique way.  WASPYs focus on the unsung heros of the OWASP community who quietly go about making the world a bit better for their work.  Project Leaders and Community Members should especially consider nominating new projects, projects that have recently graduated, and project contributors for this WASPY.&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.''' &lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated &lt;br /&gt;
&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated &lt;br /&gt;
&lt;br /&gt;
3. All nominees will remain anonymous until July 3, 2017&lt;br /&gt;
&lt;br /&gt;
4. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category &lt;br /&gt;
&lt;br /&gt;
5. You may only nominate one person per category &lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Name&lt;br /&gt;
! width=&amp;quot;800&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Aatral Arasu&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Sean has not only worked as a volunteer in the local chapter building community, his code projects are useful to the mission and his outreach efforts have included funding requests for OWASP Foundation to grow its mission. Sean is a great example of a community member.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Nicole Becher&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Nicole has been an amazing chapter leader. She brings knowledge and experience teaching cybersecurity to the Mentor Initiative, WIA Committee, and projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Ken Belva&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Ken is a long time chapter leader of the NYC chapter and a former chapter leader of the Brooklyn Chapter. Ken is always willing to step in and volunteer to help with OWASP initiatives and is a frequent participant in OWASP events as both a volunteer and speaker. Ken has spoken at AppSec USA on XSS techniques (&amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=G539NwvpL3I&amp;lt;/nowiki&amp;gt;) and is the project lead for the Basic Expression and Lexicon Variation Algorithms project (&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project)&amp;lt;/nowiki&amp;gt;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tony has selflessly brought the OWASP dublin chapter to great nights. He has nurtured the chapter to be inclusive and open whilst growing the average attendee count to hundreds. He has spread the word across both security industry and developer industry and has also managed to get various organisations to work together such as ISACA, IISF, ISSA and ISC2. He is a great leader and despite detractors has built the chapter and awareness of software security issues in a strong vendor neutral manner to a great place. Tony is a great example of OWASP and industry leadership.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dinis Cruz&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Diniz is a fantastic innovator and motivator. As the mastermind and organizer behind the OWASP Summit he has managed to re-energize the OWASP community - many interesting projects would not have happened (or at least, not been that successful) without his passionate work. Besides organizing the event, he also consistently supported project leaders with his experience and ideas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' Dinis put ridiculous effort (&amp;lt;nowiki&amp;gt;https://github.com/OWASP/owasp-summit-2017/commits?author=DinisCruz&amp;lt;/nowiki&amp;gt;) into the OWASP Summit 2017 and didn't tire promoting this event!&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Dune73|Christian Folini]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Christian Folini is very active in the Core Rule Set project community. He responds to a ton of questions submitted by newcomers when they are stuck and he answers expert level questions with stunning detail. He joined Chaim and Walter when they revived the project in 2016 and I heard he had the idea for the famous CRS3 release poster &amp;lt;nowiki&amp;gt;https://modsecurity.org/crs/poster&amp;lt;/nowiki&amp;gt; that was shared all over the net.  I think it's people like him that give OWASP a human face.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;In 2015, Joaquin took it upon himself to revive the OWASP Phoenix Chapter. He created a meet-up group to gain broader visibility. Since 2015, the meeting attendance has grown from an average of 15 attendees to over 60! Joaquin dedicates a lot of time and effort into scheduling an impressive variety of presentation topics including safe hacking, vulnerability scanner deep dives, hands on web exploitation CTF, video game hacking and more. I learn something new and cool at every event.&lt;br /&gt;
&lt;br /&gt;
More importantly, Joaquin works hard to foster a friendly, inclusive environment. During our hands-on web exploitation session, Joaquin recruited co-works to assist participants with the Security Shephard challenges so no one felt overwhelmed or impossibly stuck. He always takes the time meet and welcome new members. For example, my 17-year-old son attends meetings with me. He looks up to Joaquin as a mentor for a future information security career because Joaquin encourages his learning and offers career guidance.&lt;br /&gt;
&lt;br /&gt;
I highly recommend Joaquin for a WASPY award!! He is a kind, soft spoken person with a passion for sharing information security and helping others!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;He resurrected the Phoenix chapter and has kept it going with great content.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation:''' &amp;quot;Put simply, due to the efforts of Joaquin Fuentes, the Phoenix chapter has risen from the ashes (some pun intended). Before Joaquin took over the chapter there were consistently between 5-10 persons in attendance, Joaquin himself being one of them, and the chapter only met about every 3 months or so. Since Joaquin took over the chapter, we have had fantastic presenters each month, paid for dinners, along with a collaborative, comfortable, and engaging environment to meet in. Even more impressive the attendance has grown to 60+ consistently. Joaquin isn't even done yet! He is more great ideas and plans for the chapter that will undoubtedly contribute to the continued growth and over all quality of this once fallen chapter. When he speaks of where this chapter has come from and his plans for the future, it is undeniable to all that he does so with the passion that a leader must possess to accomplish that which Joaquin has.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''5th Citation:''' &amp;quot;I am sure someone else will write in with Joaquin's email, but I felt the need to second his name on the list. The events he puts together are top notch, have excellent speakers, always have things to eat, and are generally excellent. I almost never miss them. He is actually so gracious about the entire chapter that I am sure he does not get the credit he deserves... the whole show is put on by just him, I think. Yay Joaquin!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''6th Citation:''' &amp;quot;A few years ago, the Phoenix (AZ) OWASP group was basically defunct. As the leader of the Phoenix OWASP group, not only has Joaquin helped to resurrect the group, but we've had great presentations on reverse engineering, secure coding, a hands-on CTF contest with Security Shepherd, etc. Joaquin is a very visible member of the security community being an employee at Early Warning, which not only hosts the OWASP meetings, but also is a sponsor and makes a strong showing at CactusCon every year, the biggest security conference in Arizona.&lt;br /&gt;
&lt;br /&gt;
Our local OWASP group is not strong, going from being non-existent a few years ago to now getting a regular attendance of 40-80 people. I've gotten to know Joaquin through OWASP meetings and other security events in the area I have crossed paths with him, and he is a fine representative and evangelist for the OWASP organization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''7th Citation:''' &amp;quot;Joaquin is the Phoenix OWASP Chapter leader and regularly plans amazing talks with great speakers for the Phoenix Community. Frequently, the Phoenix OWASP talks will have over 50 attendees which Joaquin manages without a problem! Joaquin also pushes for candidates he is interviewing to be familiar with OWASP before their interview.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''8th Citation:''' &amp;quot;Joaquin is the leader for the Phoenix OWASP, and it is clear that through his leadership the Phoenix OWASP thrives. Joaquin organizes all the meetings, and is constantly working with folks to create an excellent sense of community in the Phoenix area.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''9th Citation:''' &amp;quot;Joaquin has taken the Phoenix OWASP chapter that had not been managed for years and brought it back to life. We consistently see 50+ members coming to our Meetups to talk about AppSec related topics. Joaquin is well connected to the InfoSec groups and has had great success in pulling in new speakers, we have already had a few speakers who are prepping their BlackHat and DefCon talks by giving their presentations to our local chapter. Finally Joaquin does a great job by reaching out to the local colleges and supporting CTF activities to garner interest in pen-testing and the OWASP community. He is a true community supporter and fully deserves a WASPY for his efforts...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''10th Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''11th Citation:''' &amp;quot;As a leader of Phoenix OWASP chapter, Joaquin strives to organize talks and trainings to make people in the valley learn InfoSec and AppSec from experienced individuals. He has always gone a step ahead to conduct OWASP meetings that are informative and hands on. Right from giving Arizona State University (ASU) students an overview of basic InfoSec and career opportunities to organizing a hands on hacking workshop for people in the community, Joaquin has always demonstrated passion and determination to take Phoenix to a better place in the field of Cyber Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''12th Citation:''' &amp;quot;I've attended and participated in three OWASP meetings lead by Joaquin. They are always well organized, offer a great learning experience and considerably contribute to the community. His continuous interest and dedication to the Phoenix chapter do not go unnoticed and are appreciated by all who attend.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''13th Citation:''' &amp;quot;Joaquin restarted the OWASP chapter in Phoenix/Scottsdale. Chapter meetings have grown significantly to where there were about 65 attendees at the most recent meeting with hundreds more on the mailing list (I was at the meeting, but I've only heard about the mailing list). As someone who works with him, I know how dedicated he is to the work of IT security and he's been able to attract top-notch speakers for OWASP meetings.'&lt;br /&gt;
&lt;br /&gt;
'''14th Citation:''' &amp;quot;Joaquin had successfully revived the Phoenix OWASP Chapter. Since, the chapter has excelled from zero to filled audience bringing security talent from all around to speak and educate to security professionals on the many facets of security domains.&lt;br /&gt;
&lt;br /&gt;
Additionally, this has provided a great forum to network with the many security professionals around the community and share their knowledge and strengthen the security community. &lt;br /&gt;
&lt;br /&gt;
Joaquin has provided his unselfish time as an OWASP Chapter leader, and has breathed new life into the Chapter.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''15th Citation:''' &amp;quot;Joaquin does a bang up job of running the Phoenix OWASP chapter. He does a great job of raising awareness and bringing folks from the infosec community into the fold.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''16th Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''17th Citation:''' No citation was submitted&lt;br /&gt;
|-&lt;br /&gt;
|Brendan Gormley&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Throughout the Brendan has not only assisted in making the dublin chapter events happen but taken a lead role. Brendan has organised venues and speakers for these events often going above and beyond to ensure success. Brendan has also been involved in some of the outreach programs the Dublin chapter had been involved in. No task is too big or too small for Brendan and without him I don't believe the Dublin chapter would be what it is.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Jeremy is a dedicated security engineer who contributes to the community as a developer, mentor, contributor and leader. He's one of the smartest people I know - and one of the few who has patience with &amp;quot;the rest of us&amp;quot;. He is generous with his time and knowledge, helping not only to contribute apps and resources, but to build up the community itself.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Makash|Akash Mahajan]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Akash has been backbone of OWASP bangalore chapter he has done lot of work for evangelizing OWASP. For more than 7 years now he has been working with the chapter and mentored lot of folks. No wonder he is called &amp;quot;the web app security guy&amp;quot;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Dhiraj Mishra - has been contributed and volunteered to, OWASP Mumbai Student chapter and Mumbai local chapter.&lt;br /&gt;
&lt;br /&gt;
He has endorse students to be part of multiple open community, however been an Sudent Chapter leader for OWASP he has discussed and shared multiple Information Security topics start from the scratch and spreading the idea's and awareness via chapter Meets, he has taken multiple session in NULL as well which runs with OWASP local chapter Mumbai, recently he invited Mozilla Club Mumbai to student chapter so that students can go to their area of interest, he always pushup/boost women in infosec. Apart from this he has taken various sessions in different colleges and have shared knowledge about Cyber Security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Denise Murtagh-Dunne&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Denise has been a hugely active member of the Dublin chapter and has been involved in all chapter meeting throughout the year and is ever keen to role up her sleeves and get stuck into work that others shy away from. This includes everything from setting up the meeting tools, organising venues, working with sponsors, getting speakers and assisting speakers in the run up and during events. She's been a very positively influence on the community and chapter and has encouraged other people to get involved. She's constantly updating and posting content on our social media accounts and making sure our members get relevant and interesting content. While in full time employment, Denise gives up family time to contribute to the chapter and ensure OWASP Dublin remains a vibrant and relevant group that engages the developer and security community locally.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Owen Pendlebury has been a key local OWASP volunteer over the last number of years. From being on the local Dublin chapter board to leading the Dublin chapter he regularly hosted and spoke at numerous collaborative and insightful security meetups.&lt;br /&gt;
&lt;br /&gt;
He has also been involved in organising AppSec EU in Rome and more recently co-organised the Belfast conference which was the biggest ever EU conference. As part of organising the conference in Belfast he negotiated that all chapters within Ireland would benefit financially getting a percentage of the conference profits to allow the chapters to bring bigger, better and more collaborative meetings to the Irish OWASP community and grow the communities across the country. &lt;br /&gt;
&lt;br /&gt;
I don’t know where he has found the time but has also been part of the Women in AppSec committee mentoring a number of individuals throughout the year. He took part in the Women in AppSec events in Belfast giving some insightful opinions into how improve attendees career. Owen is an asset that helps to improve Ireland's security community’s capabilities with a real can-do attitude.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mick Ryan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Mick always assists with chapter meetings and works to ensure we give the community good quality sessions. Mick assists will all areas including reaching out to potential speakers, getting info and bios from them, arranging dates and venues, posting on social media and the logistics of the meetings and ensuring speakers have the right cables, meetings run to time, that speakers are happy with everything, taking photos to promote the chapter on social media, encouraging people to speak, printing the chapter and getting people to events! Thanks Mick for your contribution in 2017!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;[https://www.owasp.org/index.php/Sriram Sriram] has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone. Sriram has been tremendously supporting the OWASP Chapter by giving trainings to various college student,  corporates and various chapters..&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Michelle Simpson&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Michelle has done an amazing job with the Belfast chapter and works tirelessly to improve the OWASP community and advocate strong app sec practices. This is very evident from the people attending the chapter events, organisations participating and the very successful AppSecEU conference that was held in Belfast in 2017. Michelle put a huge amount of work and effort into planning and preparation for AppSecEU to ensure the conference was of a high calibre. This was a sustained commitment over the majority of 2017 on top of local chapter commitments. I'd like to nominate Michelle for all the hard work and effort she puts into the chapter. Thanks Michelle!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Steve has been a tremendous supporter of the OWASP dependency-check project and leader on the related dependency-track platform. He is quick to respond to community question, answering with insightful and accurate responses assisting the community in their use of the dependency-check suite of tools.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/John_Vargas John Vargas]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the last 9 years John, together with a very small group of volunteers, has been making efforts to keep the chapter of Lima, Peru. Performing activities such as monthly meetings, internal trainings and participating actively in the OWASP Latam Tour. For the chapters in Latin America to keep afloat these activities with few resources is something very complicated and deserves recognition.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tara Williams&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tara cares about integrity, inclusion and transparency, she is passionate about making OWASP a better place for all members of the community. With her talents in communications, she is getting the word out about OWASP's benefits to community members and attracting new members to chapter meetings, especially identifying successful pathways to transition meetup members to full members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
'''&amp;quot;'''A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sean mentors, is a speaker, leads projects, is an active chapter leader and chapter Treasurer, participating in meetup events and a great representative at global, regional and external events.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tony has grown the chapter over the last year to a point where hundreds of people are attending meetings. The meetings are organised in advance now and have a theme. There were some really interesting people speaking at the chapter meetings including Simon Singh, James Lyne, Brian Honan and Jane Franklin. He has also engaged support from local companies with a lot more attending and sponsoring the chapter. There is a real buzz at chapter meetings and they're not just death by PowerPoint which they had been in the past.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;'''Christopher Frenz should be nominated for the Best Mission Outreach WASPY for his work as the Project Lead for the OWASP Anti-Ransomware Guide Project and the OWASP Secure Medical Device Deployment Standard Project. In the wake of WannaCry, anti-ransomware guidance has become more pertinent than ever and the project is regularly updated to keep abreast of the latest ransomware adaptations. Chris regularly shares his anti-ransomware knowledge with the security and healthcare communities and is an advocate for organizations conducting mock ransomware incidents. Chris has shared his knowledge of ransomware protections and of pertinent OWASP resources in numerous venues including articles (&amp;lt;nowiki&amp;gt;https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/&amp;lt;/nowiki&amp;gt;) and conference presentations at both the local and international level (&amp;lt;nowiki&amp;gt;https://iapp.org/conference/iapp-canada-privacy-symposium/sessions/?id=a191a000000zrqPAAQ&amp;lt;/nowiki&amp;gt;). A Spanish version of the guidance is also available. In addition, he has worked to call attention to the need for healthcare facilities to improve the security of their medical device implementations and is responsible for authoring version 1 of the OWASP Secure Medical Device Deployment Standard. The project has really worked to raise awareness of these issues and has been covered by CSO magazine (&amp;lt;nowiki&amp;gt;http://www.csoonline.com/article/3188230/security/how-to-securely-deploy-medical-devices.html&amp;lt;/nowiki&amp;gt;) and other news sources. Chris has given interviews on medical device security for the Cloud Security Alliance and others and will be speaking on medical device security at the Defcon BioHacking Village. Chris is always willing to share his knowledge with all who ask and is an active member of the NYC and Brooklyn OWASP chapters.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation''': &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation''': &amp;quot;My job takes me to many different OWASP Chapters, along with ISSA, CSA, ISACA, etc.&lt;br /&gt;
The Phoenix OWASP Chapter was DEAD before Joaquin volunteered to lead the Chapter a few years ago.&lt;br /&gt;
It is now consistently one of the BEST ITSec community gatherings, and I go out of my way to be in Phoenix for their meetings.&lt;br /&gt;
To put it a different way, at my first Phoenix OWASP meeting there were less than 12 attendees, including myself and the speaker. Last week it was standing room only (75+) *and* there would have been more if Interstate 17 hadn't been closed in both directions at the start of rush-hour.&lt;br /&gt;
Part of the reason Joaquin deserves this award is that he is EXTREMELY knowledgeable about AppSec and many other aspects of data security and he is ALWAYS friendly and willing to share. His day-job is no picnic, but he finds the time to put together great meetings and do it in a way that everybody has a good time.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tanya has been instrumental in outreach in the Ottawa Ontario Canada region building membership and participation in the local OWASP chapter, as well as building bridges with other local organizations (Python user group, Ruby Rails user group, WIA, etc.). Tanya has also been a driver in getting a mentoring program setup via the Ottawa chapter. She has also encouraged participation in local CTF events, presented at local conferences (BSides, etc). Tanya's enthusiasm, support, and interaction is often contagious (in a good way :) ). Lastly, Tanya is a strong advocate or evangelist for OWASP projects, promoting such as appropriate per audience/presentation (including, but not limited to: ZAP, Top 10, SKF).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Tanya Janca is an excellent ambassador for OWASP. Since her entry into the lead team of the OWASP Ottawa chapter, she has doubled the size of the chapter and developed the chapter into a meeting place for dozens of women interested in Application Security.&lt;br /&gt;
Tanya Janca is an energetic speaker who held a fantastic presentation at AppSecEU in Belfast. &amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=mPTmuaC2lOI&amp;lt;/nowiki&amp;gt; She was subsequently invited to the Swiss Cyberstorm Conference where her addition to the rooster was explained in an admiring blogpost &amp;lt;nowiki&amp;gt;https://swisscyberstorm.com/2017/05/23/Introducing_Tany_Janca.html&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Tanya Janca has the ability to talk security to techies and management alike. She is pushing for the adoption of OWASP practices and project by the government of Canada her employer. Having received the Government of Canada’s CIO Award for “Excellent in Security” in 2016 she refused to move into the private sector, but continues to support the security community inside the public sector, where her excellent know-how is very important.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Kitisak Jirawannakool&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Web security is notoriously bad in Thailand, so an actives security community is sorely needed. Kitisak is a central figure in that community. He has worked on establishing the OWASP Bangkok chapter for the past six years, organizing meetups, community outreach and engaging with security experts internationally. His work has played a pivotal role in creating IT security awareness in the fast-growing South-East-Asian country.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|James Manico&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Jim's influence on OWASP materials (and therefore on application security) is amazing - he's cited on nearly every cheat sheet on OWASP Top 10 document. His name is synonymous with application security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation: &amp;quot;'''While Jim may not be the &amp;quot;unsung hero&amp;quot; - he is the first and foremost cheerleader/champion of OWASP. His efforts and contributions are innumerable. As anyone who knows Jim - he is not a reserved individual when touting the resources available via OWASP. He has likely done more then anyone else working with OWASP to bring together, motivate, and get individuals to contribute to OWASP. From the immensely popular checklists to motivating individuals to contribute. OWASP would not be nearly as successful as it has been without Jim.&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|Mateo Martinez&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Mateo is one of the leaders in Latin America more recognized, during the last years his efforts to join the chapters chapter along with other leaders of Latam made that the community grew and that today the Latam Tour 2017 has more than 15 participating countries. He also managed to spread the spirit of owasp and help establish new chapters in the region.&lt;br /&gt;
The effort to maintain more communication between OWASP GLobal and local communities is reflected in each activity that encourages other leaders to ensure that they strive every day to spread Owasp projects and to grow the community.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Miller&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The OWASP Podcast is a effort that is in line with the mission of OWASP raising visability for software security. This is a VERY powerful voice in the community globally and Mark Miller should be applauded for his efforts on this&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Podcast&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj was nominated for WASPY 2016, his contribution to the community is from past one 'n half year in various areas, start from the projects, local volunteering and what not, he was also listed in OWASP Hall Of Fame.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Owen is an active participator in OWASP meetings and has been a great inspiration to me.&lt;br /&gt;
He has shown himself to be a great leader and OWASP advocate.&lt;br /&gt;
Owen has recommended other AppSec communities in which I have become involved in since moving to Dublin. He is an evangelist for women in technology and I have witnessed this first hand.&lt;br /&gt;
I don't hesitate to recommend Owen for this award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Owen has introduced me to the OWASP Community in Ireland and EU. Help me to get involve with Women in AppSec and participate in the AppSec EU event in Belfast. He is a great leader, who enjoys talking about OWASP and the great community behind it.&lt;br /&gt;
I've moved to Ireland a couple of months ago, and getting to know Owen and the OWASP community has completely changed my life, both professionally and personally. &lt;br /&gt;
So, yes, I would like to nominate Owen Pendlebury because he the proof that Women in AppSec is not just a women matter. :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram Shyam]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sriram has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Noreen Whysell&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Noreen is helping each day to improve OWASP members' experiences bringing her expertise and knowledge as a mentor and projects as a Chapter Leader, one member at a time. She understands what members want, how to improve member benefits and is applying that knowledge to improving local and global member experiences from the ground up. Her efforts are multiplied by her sharing of knowledge and grassroots approach creating a membership groundswell.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Sean leads the BLT Project and is a Team Leader for the Learning Gateway project. He has helped improve the quality of web experiences, including OWASP.org .&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Glenn &amp;amp; Riccardo ten Cate&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;I am hereby nominating the brothers Glenn &amp;amp; Riccardo ten Cate from the Netherlands for the WASPY award in this category. They are known for their work on the open-source project SKF (Security Knowledge Framework). These are two guys who are dedicated to spreading security knowledge trough the means OWASP has to offer. You might have encountered them talking at seminars, promoting their project and OWASP, or different companies where they teach development teams how to integrate the OWASP core principles in their workflow using their project. Not only professional development teams but also students of security can only be amazed at the sheer knowledge they gathered and contribute to the global OWASP community trough open source. The sheer effort they put in this project teaches, guides, structures and shows by example how to test and write secure applications by design. There is no other software out there that does this. And that is why they deserve this nomination for best innovator 2017.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Deenihan&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Mark for his constant devotion and work on the OWASP security shepherd project and continuing to develop it and teach people globally about app sec.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Seba Deleersnyder&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;One of the main projects to date is SAMM. Seba with the support of project colliders has made this a flagship project of OWASP. The level of maturity and the number of improvements obtained indicates that this project is one of the most mature and a great projection to the future.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Chris' projects are opening doors for OWASP in the standards development and getting the word out about important IoT with his Medical Device Deployment Standard: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Secure_Medical_Device_Deployment_Standard&amp;lt;/nowiki&amp;gt; which already has a Turkish translation and attracted attention from the Turkish public health department. He has delivered presentations at meetups, and presenting to the IDESG, www.idesg.org in July. He has a &amp;quot;soup label&amp;quot; tool that gives simple guidance for the implementation of the OSMDDS. This is not Chris' first project but it is surely one of the best OWASP innovations of the year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Brianglas Brian Glas]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Brian has been paramount in 2 very strategic initiatives for OWASP. He is not only a Project Leader for the OWASP SAMM project but he has been instrumental in revamping the call for data and reorganizing the flagship OWASP Top Ten. Brian continues to support and speak about the benefits of supporting OWASP especially projects and participating in the Summit. Please consider Brian Glas as the Best Community Supporter for this year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Evin Hernandez&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Evins focus on the core of the information security platform with Virtual Village has provided the global community with a place to experiment and leverage for testing... &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Virtual_Village_Project&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Considering how often projects have a great start and plateau, we should recognize the ongoing effort and dedication given to one of the Flagship projects in our community.&lt;br /&gt;
Jeremy Long has continued to not only maintain the Dependency Check project but develop and improve it each year.&lt;br /&gt;
This year he added Improvements in the core dependency-check platform in terms of code quality, achieved 100% for the CII Best Practices for dependency-check, continued to develop the ODC community with several contributors submitting PRs, and over the last several months he's been working on platform maturity and will be releasing 2.0.0 in the first half of July 2017.&lt;br /&gt;
After 2.0 is released he has planned work on Python support and expanding the tool by integrating additional data-sources such as Artifactory, Redhat Victim's, OSS-Index, etc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Jeremy has been an avid contributor/leader for the OWASP dependency-check project. Under his leadership the project has garnered substantial community support in terms of pull requests, improved code quality via Sonarcloud, Coverity, Codacy, and CII Best Practices. While the last six months have been primarily around code quality and bug fixes; these improvements are setting the dependency-check project up for major enhancements over the coming months!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Daniel Miessler&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Daniel seems to be everywhere at once - despite have a full-time job, he is leading or co-leading several OWASP projects, has created ideas for groups out of thin air, and has performed work in much needed areas.&lt;br /&gt;
This year, Daniel has lead or co-lead the Internet of Things security project, completed an IoT: Medical Devices attack surface overview, and created the Game Security project.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj is one of the top contributor in OWASP Cheat Sheet Project, which have security guidance in an easy read format, his contribution for SQL Injection WAF Bypass and XSS Evasion - OWASP, was mostly recommended and used by Cyber Security professional, dhiraj has contributed to Benchmark project by contributing SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring and many such projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Bernhard Mueller&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;During the last 18 months Bernhard has been spearheading the OWASP Mobile Testing Guide Project. He has invested several man-months of writing, editing, reviewing, rallying authors, and pushing the project into new directions. This also resulted in the novel agile book writing process and book production pipeline which enables OWASP to produce a professional tech book. The project has produced a security standard and early-release ebook, and is on track become one of OWASP's main flagship projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Steve's work on dependency-track is fantastic - he's moved forward to address the next round of issues, with an innovative solution all companies can leverage.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|thc202&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Simon Bennets &amp;quot;wingman&amp;quot; in the ZAP project, by now even the top committer in the project! (&amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/graphs/contributors&amp;lt;/nowiki&amp;gt;) So &amp;quot;unsung of&amp;quot; that I do not even know his real name!&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Coming July 25, 2017&lt;br /&gt;
&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
Sponsorships coming soon!&lt;br /&gt;
&lt;br /&gt;
==Communication==&lt;br /&gt;
# June 7, 2017 Email to the Leaders &amp;amp; Community list. Posted to the OWASP [https://owasp.blogspot.com/2017/06/nominations-are-now-being-accepted-for.html Blog]&lt;br /&gt;
# June 30, 2017 Email to the Leaders &amp;amp; Community list.&lt;br /&gt;
# July 5, 2017 Email to the Nominees&lt;br /&gt;
# July 5, 2017 Email to the Leaders &amp;amp; Community list, and Blog post announcing the nominees have been announced.&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2016 2016]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231505</id>
		<title>User:Dune73</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231505"/>
				<updated>2017-07-10T15:20:58Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Christian Folini (dune73) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Christian Folini (dune73) ===&lt;br /&gt;
&lt;br /&gt;
Christian Folini is a committer to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set project]. A long time ModSecurity user, he joined the project when Chaim Sanders and Walter Hop revived it in 2016. He developed the Paranoia Mode within the rule set and works in a role resembling that of a moderator and community contact. As such he is the go to place with questions regarding CRS or ModSecurity in general. He also managed to recruit several other people to join the growing CRS development community.&lt;br /&gt;
&lt;br /&gt;
The 2nd edition of the [https://www.feistyduck.com/books/modsecurity-handbook/ ModSecurity Handbook] was written by Christian and he also teaches Apache / ModSecurity courses regularly.&lt;br /&gt;
&lt;br /&gt;
Christian holds a PhD in medieval history and enjoys defending castles across Europe. Unfortunately, defending medieval castles is no big business anymore and Christian turned to defending web servers which he thinks equally challenging. With his background in humanities, Christian is able to bridge the gap between techies and non-techies. He brings more than ten years experience in this role, specialising in Apache / ModSecurity configuration, DDoS defense and threat modeling.&lt;br /&gt;
&lt;br /&gt;
Christian is a speaker at various conferences, including OWASP AppSecEU. He also works as program chair for the Swiss Cyber Storm conference and sits in a variety of other boards.&lt;br /&gt;
&lt;br /&gt;
Here are some links:&lt;br /&gt;
&lt;br /&gt;
* Email: [mailto:christian.folini@netnea.com christian.folini@netnea.com] &lt;br /&gt;
* Twitter: [https://twitter.com/ChrFolini @ChrFolini]&lt;br /&gt;
* His company's website: [https://www.netnea.com www.netnea.com]&lt;br /&gt;
* Private website: [https://www.christian-folini.ch www.christian-folini.ch]&lt;br /&gt;
* Blog: [https://www.netnea.com/cms/category/security/ blog]&lt;br /&gt;
* Teaching: [https://www.feistyduck.com/training/modsecurity-training-course FeistyDuck]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231502</id>
		<title>User:Dune73</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Dune73&amp;diff=231502"/>
				<updated>2017-07-10T15:13:28Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Christian Folini (dune73) ===&lt;br /&gt;
&lt;br /&gt;
This is Christian Folini, a Swiss webserver fortification engineer and advisor in the art of defense, OWASP ModSecurity Core Ruel Set Committer and ModSecurity teacher.&lt;br /&gt;
&lt;br /&gt;
Here are some links:&lt;br /&gt;
&lt;br /&gt;
* Email: [mailto:christian.folini@netnea.com christian.folini@netnea.com] &lt;br /&gt;
* Twitter: [https://twitter.com/ChrFolini @ChrFolini]&lt;br /&gt;
* Company website: [https://www.netnea.com www.netnea.com]&lt;br /&gt;
* Private website: [https://www.christian-folini.ch www.christian-folini.ch]&lt;br /&gt;
* Blog: [https://www.netnea.com/cms/category/security/ blog]&lt;br /&gt;
* Teaching: [https://www.feistyduck.com/training/modsecurity-training-course FeistyDuck]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=231009</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=231009"/>
				<updated>2017-06-27T06:27:34Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: added a link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
* [[:user:Dune73|Christian Folini]]&lt;br /&gt;
* [[:User:lifeforms|Walter Hop]]&lt;br /&gt;
Contributors:&lt;br /&gt;
* Christoph Hansen&lt;br /&gt;
* Felipe 'Zimmerle' Costa&lt;br /&gt;
* Franziska Bühler&lt;br /&gt;
* Victor Hora&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code''' : https://github.com/SpiderLabs/owasp-modsecurity-crs &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Issues''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Feature Requests''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues (interleaved the issues, look for the right tag, currently ''candidate issue'')&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of GitHub Shortcuts / Bookmarks ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/v3.0-dev%20Development Open Issues 3.0.x] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/False%20Positive False Positives]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22False+Negative+-+Evasion%22 False Negatives] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22v3.1.0-rc1+Candidate+Issue%22 Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+-label%3A%22v3.1.0-rc1+Candidate+Issue%22 All Issues but not Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/Published%20Research Published research affecting project]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20no%3Alabel Open Issues without a label / tag]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20label%20no%3Aassignee Open Issues with a label, but without assignee]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2015-01-01 Open Issues before 2015]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-01-01 Open Issues before 2016] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-11-10 Open Issues before CRS3 was released (2016-11-10)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2017-01-01 Open Issues before 2017]&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=230770</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=230770"/>
				<updated>2017-06-19T04:26:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Project Members */ Taking out Ryan, adding new contributors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
* [[:user:Dune73|Christian Folini]]&lt;br /&gt;
* [[:User:lifeforms|Walter Hop]]&lt;br /&gt;
Contributors:&lt;br /&gt;
* Christoph Hansen&lt;br /&gt;
* Felipe 'Zimmerle' Costa&lt;br /&gt;
* Franziska Bühler&lt;br /&gt;
* Victor Hora&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code''' : https://github.com/SpiderLabs/owasp-modsecurity-crs &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Issues''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Feature Requests''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues (interleaved the issues, look for the right tag, currently ''candidate issue'')&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of GitHub Shortcuts / Bookmarks ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/v3.0-dev%20Development Open Issues 3.0.x] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/False%20Positive False Positives]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22False+Negative+-+Evasion%22 False Negatives] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22v3.1.0-rc1+Candidate+Issue%22 Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/Published%20Research Published research affecting project]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20no%3Alabel Open Issues without a label / tag]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20label%20no%3Aassignee Open Issues with a label, but without assignee]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2015-01-01 Open Issues before 2015]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-01-01 Open Issues before 2016] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-11-10 Open Issues before CRS3 was released (2016-11-10)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2017-01-01 Open Issues before 2017]&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=229338</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=229338"/>
				<updated>2017-05-02T15:56:30Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: Added link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
* [[:user:Dune73|Christian Folini]]&lt;br /&gt;
* [[:User:lifeforms|Walter Hop]]&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code''' : https://github.com/SpiderLabs/owasp-modsecurity-crs &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Issues''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Feature Requests''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues (interleaved the issues, look for the right tag, currently ''candidate issue'')&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of GitHub Shortcuts / Bookmarks ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/v3.0-dev%20Development Open Issues 3.0.x] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/False%20Positive False Positives]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22False+Negative+-+Evasion%22 False Negatives] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22v3.1.0-rc1+Candidate+Issue%22 Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/Published%20Research Published research affecting project]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20no%3Alabel Open Issues without a label / tag]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20label%20no%3Aassignee Open Issues with a label, but without assignee]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2015-01-01 Open Issues before 2015]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-01-01 Open Issues before 2016] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-11-10 Open Issues before CRS3 was released (2016-11-10)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2017-01-01 Open Issues before 2017]&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=225047</id>
		<title>OWASP ModSec CRS Paranoia Mode</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ModSec_CRS_Paranoia_Mode&amp;diff=225047"/>
				<updated>2017-01-13T20:52:16Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Sub-Project Infos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Abstract==&lt;br /&gt;
&lt;br /&gt;
This is a page about the development of a paranoia mode aka bringing back the rules that used to yield a high number of false positives. This little project is aimed at inclusion into the 3.0.0 release of the OWASP ModSecurity Core Rules, where some rules have been removed in order to reduce the number of false positives with vanilla installations.&lt;br /&gt;
&lt;br /&gt;
FIXME: Detailed description&lt;br /&gt;
&lt;br /&gt;
''Back to the [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rules Set].''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sub-Project Infos==&lt;br /&gt;
&lt;br /&gt;
* '''Status''': active (January 2016)&lt;br /&gt;
* '''Schedule''': '''DONE''' (we're all done and Paranoia Mode made it into the CRS3 release.&lt;br /&gt;
* '''Who''': Christian Folini (dune73), Noël Zindel (zino), Franziska Bühler (franziskabuehler), Manuel Leos (Spartan), Walter Hop (lifeforms)&lt;br /&gt;
* '''Documentation''': Here on the [https://www.owasp.org/index.php/OWASP_ModSec_CRS_Paranoia_Mode OWASP Wiki] / [https://www.netnea.com/cms/2016/02/04/owasp-modsecurity-core-rules-paranoia-mode-mechanics-proposal/ Mechanics Proposal]&lt;br /&gt;
* '''Discussion / Archive''': &amp;lt;tt&amp;gt;owasp-modsecurity-core-rule-set@lists.owasp.org&amp;lt;/tt&amp;gt; / archive: http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/&lt;br /&gt;
* '''Github Link v3.0.0-rc1 (our base)''': https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1&lt;br /&gt;
* '''Github Link paranoia-mode''': https://github.com/dune73/owasp-modsecurity-crs/tree/paranoia-mode&lt;br /&gt;
* '''Final Pull Request #1: Add paranoia mode mechanics''': https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/292 MERGED&lt;br /&gt;
* '''Final Pull Request #2: Move first rules to paranoia mode''': https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/300 MERGED&lt;br /&gt;
* '''Final Pull Request #3: Add 2.2.X rules to paranoia mode''': https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/308 MERGED&lt;br /&gt;
* '''Final Pull Request #4: Add stricter siblings''': FIXME&lt;br /&gt;
&lt;br /&gt;
==Tasks==&lt;br /&gt;
&lt;br /&gt;
===Open Tasks===&lt;br /&gt;
&lt;br /&gt;
Please define state as follows: ''new'', ''assigned'', ''waiting'', ''closed''. When a task is closed, it is moved to the seperate closed tasks table below.&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Write pull request number 4&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Submit pull request number 4&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Draw flowchart&lt;br /&gt;
  | n.n.&lt;br /&gt;
  | new&lt;br /&gt;
|-&lt;br /&gt;
  | Write documentation&lt;br /&gt;
  | Christian&lt;br /&gt;
  | new&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Closed Tasks===&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''Task'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Who'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of rules, which triggered false positives in 2.2.X frequently&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.x rules, which have disappeared from 3.0.0-rc1&lt;br /&gt;
  | Spartan&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be accompanied with&amp;lt;br /&amp;gt;stricter siblings in paranoia mode&amp;lt;br /&amp;gt;(same idea of the rule, but harder limit etc.)&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 3.0.0-rc1 rules, which could be moved to the paranoia mode&lt;br /&gt;
  | Franziska&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of disappeared / missing 2.2.X base_rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Assemble list of 2.2.X optional and experimental rules, which should be brought back&lt;br /&gt;
  | group&lt;br /&gt;
  | closed (could be repeated more throughly)&lt;br /&gt;
|-&lt;br /&gt;
  | Nail down final list of rules which should be moved / recreated into the paranoia mode&lt;br /&gt;
  | group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out mechanics of the paranoia mode&lt;br /&gt;
  | Christian&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Write new stricter siblings for existing rules&lt;br /&gt;
  | Noël&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Define ID-space for strict siblings&lt;br /&gt;
  | Fraziska, group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Define exact syntax of paranoia mode setup&lt;br /&gt;
  | Christian, group&lt;br /&gt;
  | closed&lt;br /&gt;
|-&lt;br /&gt;
  | Sort out name: Is &amp;quot;Paranoia Mode&amp;quot; really the right term?&lt;br /&gt;
  | Christian, group&lt;br /&gt;
  | closed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
&lt;br /&gt;
===Paranoia Mode Candidates===&lt;br /&gt;
&lt;br /&gt;
The 3.0.0-rc1 has all rules renumbered. Existing numbering was fairly crazy and the new numbering follows the numbering scheme of the rules files (-&amp;gt; 9&amp;lt;2-digit-rulefile&amp;gt;&amp;lt;3-digit-id&amp;gt;)&lt;br /&gt;
A mapping table exists [[https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.0.0-rc1/id_renumbering/IdNumbering.csv IdNumbering.csv]]&lt;br /&gt;
We need to make sure, we do not mess things up, so let's add both IDs to the table, the old one and the new one.&lt;br /&gt;
&lt;br /&gt;
Please set status as follows : ''confirmed'',''candidate'', ''cloning-confirmed'',''cloning-candidate'', ''unsure'', ''dropped''. &lt;br /&gt;
* 'cloning-confirmed', 'cloning-candidates' are rules, that could be cloned into an even stricter variant with a stricter limit in a higher paranoia setting.&lt;br /&gt;
* If dropped, please provide reasoning in the remarks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''RuleID 2.2.x'''&lt;br /&gt;
  |'''RuleID 3.0.0-rc1'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Status'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''Remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950001&lt;br /&gt;
  | 942150&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: @pmf file with very short function names, could match frequently.&lt;br /&gt;
|-&lt;br /&gt;
  | 950109&lt;br /&gt;
  | 920230&lt;br /&gt;
  | Multiple URL Encoding Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 950120&lt;br /&gt;
  | 931130&lt;br /&gt;
  | Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Walter's 2.2.X candidate: many FP; Chrstian: hardly any FPs; &amp;lt;br/&amp;gt;discussion concluded, that rule should end up in paranoia mode, possibly with additional conditions to reduce FPs (scope outside of this paranoia mode project)&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001885.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 960335&lt;br /&gt;
  | 920380&lt;br /&gt;
  | Too many arguments in request&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Walter's 2.2.X candidate: some FP (phpMyAdmin, large forms), alternatively would recommend raising &amp;lt;code&amp;gt;tx.max_num_args&amp;lt;/code&amp;gt; to 1000&lt;br /&gt;
|-&lt;br /&gt;
  | 950901&lt;br /&gt;
  | 942130&lt;br /&gt;
  | SQL Injection Attack: SQL Tautology Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: legitimate sentences could match. Walter's 2.2.x experience: many FP in natural text however the rule seems to have merit&lt;br /&gt;
|-&lt;br /&gt;
  | 950916&lt;br /&gt;
  | 921170&lt;br /&gt;
  | HTTP Header Injection Attack via payload (CR/LF detected)&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: change action from pass to block and move to paranoia mode.&lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | gone -&amp;gt; 942380  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | gone -&amp;gt; 942390 &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | gone -&amp;gt; 942400  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | gone -&amp;gt; 942410  &lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960015&lt;br /&gt;
  | 920300&lt;br /&gt;
  | Request Missing an Accept Header&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: many FP (PHP SoapClient)&amp;lt;br/&amp;gt;Discussion concluded it's moved to paranoia mode.&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001888.html Link to discussion]&amp;lt;br/&amp;gt;Spartan: Many mobile devices do not send this header, very high FP.&lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | gone -&amp;gt; 942460 &lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 960035&lt;br /&gt;
  | 920440&lt;br /&gt;
  | URL file extension is restricted by policy&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives&lt;br /&gt;
|-&lt;br /&gt;
  | 970901&lt;br /&gt;
  | 950100&lt;br /&gt;
  | The Application Returned a 500-Level Status Code&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: too strict, too generic, no data leakage happened so far. Walter: it's useful however to prevent attacker from distinguishing between a failed SQLi attempt (403 blocked by ModSec) or a query error due to vulnerable app (500 from application); &amp;lt;br/&amp;gt;Discussion resolved with move to paranoia mode. 403 will cloak a backend error, which is hard for an inexperienced admin and thus complicates things in standard installations&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001889.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | gone -&amp;gt; 941320 &lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | gone -&amp;gt; 941330 &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | gone -&amp;gt; 941340 &lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | gone -&amp;gt; 942420 &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | gone -&amp;gt; 942430 &lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: very high FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | gone -&amp;gt; 942440 &lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP but rule seems useful&lt;br /&gt;
|-&lt;br /&gt;
  | 981240&lt;br /&gt;
  | 942300&lt;br /&gt;
  | Detects MySQL comments, conditions and ch(a)r injections&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981242&lt;br /&gt;
  | 942330&lt;br /&gt;
  | Detects classic SQL injection probings 1/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: one quote character already matches?? Walter: low FP, but seen in cookies injected by some US ISPs; &lt;br /&gt;
|-&lt;br /&gt;
  | 981243&lt;br /&gt;
  | 942370&lt;br /&gt;
  | Detects classic SQL injection probings 2/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981244&lt;br /&gt;
  | 942180&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 1/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP; &amp;lt;br/&amp;gt; discussion did not bring up additional arguments. Moving to paranoia mode&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001890.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 981245&lt;br /&gt;
  | 942260&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 2/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981246&lt;br /&gt;
  | 942340&lt;br /&gt;
  | Detects basic SQL authentication bypass attempts 3/3&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981248&lt;br /&gt;
  | 942210&lt;br /&gt;
  | Detects chained SQL injection attempts 1/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: low FP, &amp;lt;br/&amp;gt; discussion did not bring up any additional arguments. Moving to paranoia mode&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001890.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 981249&lt;br /&gt;
  | 942310&lt;br /&gt;
  | Detects chained SQL injection attempts 2/2&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: low FP but seen in very specific situations&lt;br /&gt;
|-&lt;br /&gt;
  | 981257&lt;br /&gt;
  | 942200&lt;br /&gt;
  | Detects MySQL comment-/space-obfuscated injections and backtick termination&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | gone -&amp;gt; 942450 &lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Walter: high FP in long random strings&lt;br /&gt;
|-&lt;br /&gt;
  | 981318&lt;br /&gt;
  | 942110&lt;br /&gt;
  | SQL Injection Attack: Common Injection Testing Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Franziska's candidate: one quote character at the beginning/end really not legitimate? Walter 2.2.X candidate: frequent FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981319&lt;br /&gt;
  | 942120&lt;br /&gt;
  | SQL Injection Attack: SQL Operator Detected&lt;br /&gt;
  | confirmed&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: very short operators or strings already match. Walter: some FP (WooCommerce)&lt;br /&gt;
|-&lt;br /&gt;
  | 981049&lt;br /&gt;
  | 912100&lt;br /&gt;
  | Potential Denial of Service (DoS) Attack from ... - # of Request Bursts: ...	   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | limit currently at 2; could be set to 1; now, the attacker has to exceed dos_counter_threshold twice. With full reset of counter after first hit. Source: 2.2.X-&amp;gt;experimental rules&lt;br /&gt;
|-&lt;br /&gt;
  | 960901          &lt;br /&gt;
  | 920270			&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | @validateByteRange 1-255; there was a conditional rule with stricter byterange 32-126 in 2.2.X as well&lt;br /&gt;
|-&lt;br /&gt;
  | 970003          &lt;br /&gt;
  | 951100			&lt;br /&gt;
  | none					   					   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | rule is only setting tx.sql_error_match. Could also trigger score directly&lt;br /&gt;
|-&lt;br /&gt;
  | 950907          &lt;br /&gt;
  | 932100			&lt;br /&gt;
  | Remote Command Execution (RCE) Attempt					   	   &lt;br /&gt;
  | cloning-confirmed	&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958977          &lt;br /&gt;
  | 933110			&lt;br /&gt;
  | PHP Injection Attack: Function Name Found					    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 958979          &lt;br /&gt;
  | 933120			&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found				    &lt;br /&gt;
  | cloning-candidate&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950001          &lt;br /&gt;
  | 942150			&lt;br /&gt;
  | SQL Injection Attack					   			    &lt;br /&gt;
  | cloning-confirmed&lt;br /&gt;
  | rule is only triggering in combination with chained rule. Could trigger on its on&lt;br /&gt;
|-&lt;br /&gt;
  | 950907&lt;br /&gt;
  | 932100&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Christian's 2.2.X experience: frequently false positives. Also Franziska's candidate: false positives possible because of @pmf, file with short cmds. Discussion evolved about splitting the file, which everybody thinks is a good idea. But that would be outside the scope of the introduction of the paranoia mode. So the rule stays in the standard set of rules for the time being and will be split in the future [http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001886.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 900050&lt;br /&gt;
  | 910100&lt;br /&gt;
  | Client IP is from a HIGH Risk Country Location.&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: Do we want to exlude countries? But then easy to configure. Discussion pointed out this as an effective rule. We leave it in the standard rules, but provide an empty country list by default [http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001951.html Link to discussion]. [https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/284 Separate pull request]&lt;br /&gt;
|-&lt;br /&gt;
  | 960017&lt;br /&gt;
  | 920350&lt;br /&gt;
  | Host header is a numeric IP address&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Christian's 2.2.X experience: very frequently false positives. Also Franziska's candidate: Not every legitimate client behaves correctly. Walter's experience: low FP (almost all are mass scans); &amp;lt;br/&amp;gt; Discussion concluded that legitimate use of numeric IP addresses is rare. This is really mostly mass scanners. Rule will be kept in standard set of rules&amp;lt;br/&amp;gt;[http://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-February/001888.html Link to discussion]&lt;br /&gt;
|-&lt;br /&gt;
  | 958977&lt;br /&gt;
  | 933110&lt;br /&gt;
  | PHP Injection Attack: Function Name Found&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short function names. Maybe we should split the data file. The discussion revealed that splitting the data file in a clean way is very difficult. Walter Hop volunteered to rework the php rules completely. Chaim might join that effort.&lt;br /&gt;
|-&lt;br /&gt;
  | 958979&lt;br /&gt;
  | 933120&lt;br /&gt;
  | PHP Injection Attack: Configuration Directive Found&lt;br /&gt;
  | dropped&lt;br /&gt;
  | Franziska's candidate: false positives possible because of @pmf, file with short configuration directives. Splitting file?  The discussion revealed that splitting the data file in a clean way is very difficult. Walter Hop volunteered to rework the php rules completely. Chaim might join that effort.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Rules from 2.2.X, missing in 3.0.0-rc1===&lt;br /&gt;
&lt;br /&gt;
It looks as if only the base_rules made it into 3.0.0. In fact there are a few rule ids know from the optional and experimental rule folders in 2.2.X, but it is more likely, these are new 3.0.0 rules reusing old rule ids as the rules (regexes and msg) do not match at all.&lt;br /&gt;
&lt;br /&gt;
When trying to generate the list below, be aware that the rule ids have been renumbered between 3.0.0-dev and 3.0.0-rc1. IdNumbering.csv in your friend.&lt;br /&gt;
&lt;br /&gt;
====Base rules====&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
  |'''2.2.X rule id'''&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''msg'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
  | &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;'''remarks'''&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
  | 950002&lt;br /&gt;
  | System Command Access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950006&lt;br /&gt;
  | System Command Injection&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950007&lt;br /&gt;
  | Blind SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950008&lt;br /&gt;
  | Injection of Undocumented ColdFusion Tags&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950010&lt;br /&gt;
  | LDAP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950011&lt;br /&gt;
  | SSI injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950018&lt;br /&gt;
  | Universal PDF XSS URL Detected.&lt;br /&gt;
  | Walter: medium FP (foo.pdf#javascript)&lt;br /&gt;
|-&lt;br /&gt;
  | 950019&lt;br /&gt;
  | Email Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950908&lt;br /&gt;
  | SQL Injection Attack.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950921&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 950922&lt;br /&gt;
  | Backdoor access&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958000&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958001&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958002&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958003&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958004&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958005&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958006&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958007&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958008&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958009&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958010&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958011&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958012&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958013&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958016&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958017&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958018&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958019&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958020&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958022&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958023&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958024&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958025&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958026&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958027&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958028&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958030&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958031&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958032&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958033&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958034&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958036&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958037&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958038&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958039&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958040&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958041&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958045&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958046&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958047&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958049&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958051&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958052&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958054&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958056&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958057&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958059&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958291&lt;br /&gt;
  | Range: field exists and begins with 0.&lt;br /&gt;
  | Walter: high FP (Chrome PDF viewer) and not useful.&lt;br /&gt;
|-&lt;br /&gt;
  | 958404&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958405&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958406&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958407&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958408&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958409&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958410&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958411&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958412&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958413&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958414&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958415&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958416&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958417&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958418&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958419&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958420&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958421&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958422&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958423&lt;br /&gt;
  | Cross-site Scripting (XSS) Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 958976&lt;br /&gt;
  | PHP Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959070&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959071&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959072&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 959073&lt;br /&gt;
  | SQL Injection Attack&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960014&lt;br /&gt;
  | Proxy access attempt&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960018&lt;br /&gt;
  | Invalid character in request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960020&lt;br /&gt;
  | Pragma Header requires Cache-Control Header for HTTP/1.1 requests.&lt;br /&gt;
  | Walter: some FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960024&lt;br /&gt;
  | Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 960902&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 960913&lt;br /&gt;
  | Invalid request&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970007&lt;br /&gt;
  | Zope Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970008&lt;br /&gt;
  | Cold Fusion Information Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970010&lt;br /&gt;
  | ISA server existence revealed&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970011&lt;br /&gt;
  | File or Directory Names Leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970012&lt;br /&gt;
  | Microsoft Office document properties leakage&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970016&lt;br /&gt;
  | Cold Fusion source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 970018&lt;br /&gt;
  | IIS installed in default location&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970021&lt;br /&gt;
  | WebLogic information disclosure&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 970903&lt;br /&gt;
  | ASP/JSP source code leakage&lt;br /&gt;
  | Walter: some FP but not using this language&lt;br /&gt;
|-&lt;br /&gt;
  | 973300&lt;br /&gt;
  | Possible XSS Attack Detected - HTML Tag Handler&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973301&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973302&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973303&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973304&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973305&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973306&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973307&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973308&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973309&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973310&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973311&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973312&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973313&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973314&lt;br /&gt;
  | XSS Attack Detected&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973316&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973325&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973327&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973328&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973329&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973330&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973331&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973332&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973333&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 973334&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973335&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | Walter: many FP in text&lt;br /&gt;
|-&lt;br /&gt;
  | 973347&lt;br /&gt;
  | IE XSS Filters - Attack Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981000&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981001&lt;br /&gt;
  | Possibly malicious iframe tag in output&lt;br /&gt;
  | Walter: medium FP (iframes with display:none)&lt;br /&gt;
|-&lt;br /&gt;
  | 981003&lt;br /&gt;
  | Malicious iframe+javascript tag in output&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981004&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Excessive fromCharCode&lt;br /&gt;
  | Walter: many FP (Wordpress 4.4 inlined emoji javascripts); folinic: Problem solved in WP: https://core.trac.wordpress.org/ticket/35412&lt;br /&gt;
|-&lt;br /&gt;
  | 981005&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Eval+Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981006&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Unescape&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981007&lt;br /&gt;
  | Potential Obfuscated Javascript in Output - Heap Spray&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981018&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981022&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981133&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981134&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981136&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981172&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981173&lt;br /&gt;
  | Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded&lt;br /&gt;
  | Walter: many FP&lt;br /&gt;
|-&lt;br /&gt;
  | 981177&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981178&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981231&lt;br /&gt;
  | SQL Comment Sequence Detected.&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981260&lt;br /&gt;
  | SQL Hex Encoding Identified&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981300&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981301&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981302&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981303&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981304&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981305&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981306&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981307&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981308&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981309&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981310&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981311&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981312&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981313&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981314&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981315&lt;br /&gt;
  | UNKNOWN&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981316&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 981317&lt;br /&gt;
  | SQL SELECT Statement Anomaly Detection Alert&lt;br /&gt;
  | &lt;br /&gt;
|-&lt;br /&gt;
  | 990012&lt;br /&gt;
  | Rogue web site crawler&lt;br /&gt;
  | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Optional, experimental, slr rules====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|- class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
 | 900048&lt;br /&gt;
 | Identifies Reflected XSS (optional_rules)&lt;br /&gt;
 | Walter: could be very interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 920021, 920022, 920023&lt;br /&gt;
 | Possible Credit Card Track 1 Data Leakage. (experimental_rules)&lt;br /&gt;
 | Walter: could be interesting candidates but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 981080, 920020, 920006&lt;br /&gt;
 | Detect CC# in output and block transaction (optional_rules)&lt;br /&gt;
 | Walter: could be interesting candidate but have not used it in production&lt;br /&gt;
|-&lt;br /&gt;
 | 900047, 900048, 981180, 981182&lt;br /&gt;
 | Identifies Stored XSS (optional_rules)&lt;br /&gt;
 | Walter: could be somewhat interesting candidate but have not used it in production&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Stricter siblings for existing rules ===&lt;br /&gt;
&lt;br /&gt;
Stricter Siblings are rules that are present in the CRS but could be accompanied by a stricter clone in Paranoia Mode. Adjustments can differ from rule to rule but include higher anomaly ratings or stricter triggers (e.g. regex counters). To prevent masses of false positives, rules can come with additional filters (chained rules) for common use-cases. These can either be included into Paranoia Mode or simply serve as a recommendation.&lt;br /&gt;
&lt;br /&gt;
Note: To avoid a cluttered project main-page, rule proposals are documented in their respective sub-page. When adding new proposals, make sure adding the rules original (2.2.x) ID, a quick description of what changes were made, and, if applicable, which additional filters were added. For every proposed rule change, we will create a [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues Github issue]; after discussion a pull request will be created. For brainstorming about CRS rules, see our [[OWASP ModSecurity rule evaluation framework]].&lt;br /&gt;
&lt;br /&gt;
'''Possible siblings:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981173|981173 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981172|981172 : SQL Injection Character Anomaly Usage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_981049|981049 : Potential Denial of Service (DoS)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_970003|970003 : SQL Error Leakage]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_960901|960901 : Invalid character in request]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958980|958980 : PHP Injection Attack: Variables Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958979|958979 : PHP Injection Attack: Configuration Directive Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_958977|958977 : PHP Injection Attack: Function Name Found]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950907|950907 : Remote Command Execution (RCE) Attempt]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP_ModSec_CRS_Paranoia_Mode_Sibling_950001|950001 : SQL Injection Attack]]&lt;br /&gt;
&lt;br /&gt;
==Project Status==&lt;br /&gt;
&lt;br /&gt;
===Project Status January 30, 2016===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Hello everybody,&lt;br /&gt;
&lt;br /&gt;
It's time to do a status report of our little core rules project.&lt;br /&gt;
&lt;br /&gt;
I am including Franziska Bühler and Walter Hop in this status mail.&lt;br /&gt;
Both are experienced ModSec sysadmins. Franziska contributed to this&lt;br /&gt;
first stage, Walter told me he does not have much time, but he&lt;br /&gt;
was interested in participating at least in the discussions about&lt;br /&gt;
the rules.&lt;br /&gt;
&lt;br /&gt;
All in all, this is taking more time than anticipated. But we&lt;br /&gt;
have also done things very throughly than I thought. Which is&lt;br /&gt;
generally a good thing.&lt;br /&gt;
&lt;br /&gt;
Done so far:&lt;br /&gt;
* Manuel has provided us with a list of rules removed between 2.2.x and 3.0.0rc1&lt;br /&gt;
* I have assembled a list of rules known to trigger false positives frequently in the 2.2.x ruleset, they are thus candidates for the paranoia mode&lt;br /&gt;
* Franziska has looked through the 3.0.0rc1 rules and identified a set of rules which look like good candidates.&lt;br /&gt;
* Noël has sharpened his skills by re-writing 981173 in a way that ignores innocent UUIDs. In my eyes, he found a very elegant solution.&lt;br /&gt;
* With the development of 3.0.0-dev, Chaim unfortunately reused rule ids formerly used with optional and experimental rules. Now this has all been renumbered. I have pointed this out in the mailinglist and had private contact with Chaim where he confirmed the fact - and promised to resolve the issue.&lt;br /&gt;
&lt;br /&gt;
We have not really looked at the disappeared rules and identified those&lt;br /&gt;
who should be brought back and have not been picked so far. This&lt;br /&gt;
includes the 2.2.X base_rules, but also the optional, experimental,&lt;br /&gt;
and huge stock of slr rules. Of these three groups, only the&lt;br /&gt;
anti-ddos rules have made it into 3.0.0. There are probably more&lt;br /&gt;
interesting candidates.&lt;br /&gt;
&lt;br /&gt;
If somebody among you wants to look into these, then that would be&lt;br /&gt;
welcome, but I do not want to have these tasks delay us any further.&lt;br /&gt;
After all, Old rules can also be brought back in subsequent releases&lt;br /&gt;
if we see a benefit.&lt;br /&gt;
&lt;br /&gt;
So the next real tasks are:&lt;br /&gt;
* Looking through the list of candidates and cloning-candidates (the latter are those rules we might accompany with a clone with stricter limits in paranoia mode).&lt;br /&gt;
* Defining the exact working of the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
Please sit down and look through the rule lists in the wiki and add&lt;br /&gt;
remarks with regards to the candidate rules. If you think a rule&lt;br /&gt;
should be included, if you think an individual rule should not be&lt;br /&gt;
included etc.&lt;br /&gt;
&lt;br /&gt;
I am also going to invite the people on the mailinglist to take look at&lt;br /&gt;
the rules as well and add their remarks in the wiki (or respond via mail).&lt;br /&gt;
This should allow us to nail down the list of rules which will&lt;br /&gt;
actually be included in the paranoia mode.&lt;br /&gt;
&lt;br /&gt;
As for defining the exact working of the paranoia mode, I guess I&lt;br /&gt;
need to write down the idea I have in mind and see if it makes sense to&lt;br /&gt;
you.&lt;br /&gt;
&lt;br /&gt;
Thank you for contributing so far! It is a lot of fun to work in a team!&lt;br /&gt;
&lt;br /&gt;
Christian&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Git help==&lt;br /&gt;
&lt;br /&gt;
====How to Perform Pull Request to CRS v3.0.0-rc1====&lt;br /&gt;
&lt;br /&gt;
'''By Walter Hop'''&lt;br /&gt;
&lt;br /&gt;
This example assumes that the Github username is 'lifeforms', replace with your own username.&lt;br /&gt;
&lt;br /&gt;
'''Step 1. Create a Github fork of the original repository'''&lt;br /&gt;
* a. Browse to CRS: https://github.com/SpiderLabs/owasp-modsecurity-crs&lt;br /&gt;
* b. Click &amp;quot;Fork&amp;quot; button in the top right&lt;br /&gt;
&lt;br /&gt;
'''Step 2. Download your Github fork, and checkout the correct branch '''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git clone git@github.com:lifeforms/owasp-modsecurity-crs.git &amp;lt;br/&amp;gt;&lt;br /&gt;
cd owasp-modsecurity-crs &amp;lt;br/&amp;gt;&lt;br /&gt;
git checkout v3.0.0-rc1 &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 3. Add the original repository as upstream, to integrate new changes easily'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
	git remote add upstream git@github.com:SpiderLabs/owasp-modsecurity-crs.git&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 4. Make sure your forked repo is up to date with changes in the original repository'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You need to re-do these steps if somebody else made changes to upstream in the meantime!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git checkout v3.0.0-rc1 &amp;lt;br/&amp;gt;&lt;br /&gt;
git fetch upstream &amp;lt;br/&amp;gt;&lt;br /&gt;
git merge --ff upstream/v3.0.0-rc1 &amp;lt;br/&amp;gt;&lt;br /&gt;
git push &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 5. Create a branch for every separate issue you'd like to fix.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git checkout -b myfeature v3.0.0-rc1&amp;lt;br/&amp;gt;&lt;br /&gt;
git push --set-upstream origin myfeature&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 6. Make local changes and commit them'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git add ...&amp;lt;br/&amp;gt;&lt;br /&gt;
git commit&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 7. Push your local changes to your fork at Github'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git push&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 8. Create the pull request'''&lt;br /&gt;
* a. Browse to your own fork: https://github.com/lifeforms/owasp-modsecurity-crs&lt;br /&gt;
* b. Click &amp;quot;New pull request&amp;quot; button&lt;br /&gt;
* c. In the &amp;quot;base fork&amp;quot;, ensure that the correct branch is selected: v3.0.0-rc1&lt;br /&gt;
* d. In the &amp;quot;head fork&amp;quot;, pick &amp;quot;myfeature&amp;quot; (if you used branches) or v3.0.0-rc1 (if you didn't)&lt;br /&gt;
* e. Review the content of the pull request (should only contain your commits)&lt;br /&gt;
* f. Press &amp;quot;Create pull request&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
'''Optional: Updating your pull request'''&lt;br /&gt;
&lt;br /&gt;
After opening the pull request, people will review it, and probably will make some suggestions for changes before the PR can be accepted. You can keep pushing to your branch, and it will be reflected in the PR.&lt;br /&gt;
&lt;br /&gt;
If in the meantime the code in upstream has drifted, you should re-do step 4 above.&lt;br /&gt;
&lt;br /&gt;
Then, just change some files, commit and push.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
git add ...&amp;lt;br/&amp;gt;&lt;br /&gt;
git commit&amp;lt;br/&amp;gt;&lt;br /&gt;
git push&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
See also:&lt;br /&gt;
&lt;br /&gt;
* https://help.github.com/articles/fork-a-repo/&lt;br /&gt;
* https://help.github.com/articles/syncing-a-fork/&lt;br /&gt;
* https://help.github.com/articles/using-pull-requests/&lt;br /&gt;
&lt;br /&gt;
====Testing someone else's pull request====&lt;br /&gt;
To test a PR locally, use the following commands to create a branch for it.&lt;br /&gt;
&lt;br /&gt;
In this example we check out PR #427, creating a branch &amp;lt;tt&amp;gt;chaim-headers&amp;lt;/tt&amp;gt; locally (you can use any name):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
git fetch upstream pull/427/head:chaim-headers&lt;br /&gt;
git checkout chaim-headers&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Pushing to someone else's pull request====&lt;br /&gt;
In an editable PR, the PR will say something like:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Add more commits by pushing to the ExceptionSupport branch on csanders-git/owasp-modsecurity-crs.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To add to branch &amp;lt;tt&amp;gt;ExceptionSupport&amp;lt;/tt&amp;gt; of user &amp;lt;tt&amp;gt;csanders-git&amp;lt;/tt&amp;gt;, do:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
git remote add chaim git@github.com:csanders-git/owasp-modsecurity-crs.git&lt;br /&gt;
git fetch chaim&lt;br /&gt;
git co ExceptionSupport &lt;br /&gt;
git add ...&lt;br /&gt;
git push&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Purging a file completely from Git====&lt;br /&gt;
Delete the file from the repo:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
git rm file&lt;br /&gt;
git commit&lt;br /&gt;
git push&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download [https://rtyley.github.io/bfg-repo-cleaner/ BFG Repo-Cleaner]&lt;br /&gt;
&lt;br /&gt;
Make a NEW mirror:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
git clone --mirror git@github.com:SpiderLabs/owasp-modsecurity-crs.git&lt;br /&gt;
cd owasp-modsecurity-crs.git&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Purge the file:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
java -jar ~/Downloads/bfg-*.jar --delete-files example.png&lt;br /&gt;
git reflog expire --expire=now --all &amp;amp;&amp;amp; git gc --prune=now --aggressive&lt;br /&gt;
git push -f&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E-mail all users to REMOVE their copies of the repositories, and do a FRESH CLONE of the repo. If a user pulls again, the divergent histories will be merged, and there is a big risk that the dirty history (containing the purged file) will return again when they push later.&lt;br /&gt;
&lt;br /&gt;
See also: [https://rtyley.github.io/bfg-repo-cleaner/ BFG Repo-Cleaner]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224908</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224908"/>
				<updated>2017-01-11T08:05:48Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* CRS Installation Party */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Conference website: https://2017.appsec.eu/&lt;br /&gt;
* Training dates: 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference dates: 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: Chaim - Always willing to help :)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Status: Has been submitted on January 2: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3078201&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: Introducing the OWASP ModSecurity Core Rule Set 3.0&lt;br /&gt;
** Presenter: Christian Folini (Chaim can help if needed)&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3088094&lt;br /&gt;
* Paper #2: Testing FTW! A Modern, Open Source Approach to testing WAFs &lt;br /&gt;
** Presenter: Chaim Sanders, Zach Allen and Christian Peron&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?submission=3086175;a=13576385&lt;br /&gt;
* Paper #3: On the use of client side WAFs - it’s no WAFing matter &lt;br /&gt;
** Presenter: Chaim Sanders&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?submission=3086166;a=13576385 &lt;br /&gt;
* Paper #4: A Core Rule Set War Report&lt;br /&gt;
** Presenter: Christian Folini&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3088131&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: Christian&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10.&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: Christian&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party: Chaim&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== Hack CRS ====&lt;br /&gt;
&lt;br /&gt;
Offer a prize to break execute an attack against a website protected with CRS throughout the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Development: Chaim&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224906</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224906"/>
				<updated>2017-01-10T22:10:44Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Conference website: https://2017.appsec.eu/&lt;br /&gt;
* Training dates: 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference dates: 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: Chaim - Always willing to help :)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Status: Has been submitted on January 2: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3078201&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: Introducing the OWASP ModSecurity Core Rule Set 3.0&lt;br /&gt;
** Presenter: Christian Folini (Chaim can help if needed)&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3088094&lt;br /&gt;
* Paper #2: Testing FTW! A Modern, Open Source Approach to testing WAFs &lt;br /&gt;
** Presenter: Chaim Sanders, Zach Allen and Christian Peron&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?submission=3086175;a=13576385&lt;br /&gt;
* Paper #3: On the use of client side WAFs - it’s no WAFing matter &lt;br /&gt;
** Presenter: Chaim Sanders&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?submission=3086166;a=13576385 &lt;br /&gt;
* Paper #4: A Core Rule Set War Report&lt;br /&gt;
** Presenter: Christian Folini&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3088131&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: Christian&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10.&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: Christian&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party: chaim&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== Hack CRS ====&lt;br /&gt;
&lt;br /&gt;
Offer a prize to break execute an attack against a website protected with CRS throughout the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Development: Chaim&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224898</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224898"/>
				<updated>2017-01-10T21:19:20Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Conference website: https://2017.appsec.eu/&lt;br /&gt;
* Training dates: 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference dates: 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: Chaim - Always willing to help :)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Status: Has been submitted on January 2: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3078201&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: Introducing the OWASP ModSecurity Core Rule Set 3.0&lt;br /&gt;
** Presenter: Christian Folini (Chaim can help if needed)&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3088094&lt;br /&gt;
* Paper #2: Testing FTW! A Modern, Open Source Approach to testing WAFs &lt;br /&gt;
** Presenter: Chaim Sanders, Zach Allen and Christian Peron&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?submission=3086175;a=13576385&lt;br /&gt;
* Paper #3: On the use of client side WAFs - it’s no WAFing matter &lt;br /&gt;
** Presenter: Chaim Sanders&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?submission=3086166;a=13576385 &lt;br /&gt;
* Paper #4: A Core Rule Set War Report&lt;br /&gt;
** Presenter: Christian Folini&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3088131&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: Christian&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10.&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== Hack CRS ====&lt;br /&gt;
&lt;br /&gt;
Offer a prize to break execute an attack against a website protected with CRS throughout the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Development: Chaim&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224879</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224879"/>
				<updated>2017-01-10T13:37:23Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Summary of GitHub Shortcuts / Bookmarks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code''' : https://github.com/SpiderLabs/owasp-modsecurity-crs &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Issues''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Feature Requests''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues (interleaved the issues, look for the right tag, currently ''candidate issue'')&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of GitHub Shortcuts / Bookmarks ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/v3.0-dev%20Development Open Issues 3.0.x] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/False%20Positive False Positives]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22False+Negative+-+Evasion%22 False Negatives] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22v3.1.0-rc1+Candidate+Issue%22 Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/Published%20Research Published research affecting project]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20no%3Alabel Open Issues without a label / tag]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20label%20no%3Aassignee Open Issues with a label, but without assignee]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2015-01-01 Open Issues before 2015]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-01-01 Open Issues before 2016] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2017-01-01 Open Issues before 2017]&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224878</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224878"/>
				<updated>2017-01-10T13:34:34Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: Adding links to github (shortcuts to issues)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code''' : https://github.com/SpiderLabs/owasp-modsecurity-crs &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Issues''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues &amp;lt;br /&amp;gt;&lt;br /&gt;
'''Feature Requests''' : https://github.com/SpiderLabs/owasp-modsecurity-crs/issues (interleaved the issues, look for the right tag, currently ''candidate issue'')&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of GitHub Shortcuts / Bookmarks ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/v3.0-dev%20Development Open Issues 3.0.x] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/False%20Positive False Positives]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22False+Negative+-+Evasion%22 False Negatives] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?q=is%3Aissue+is%3Aopen+label%3A%22v3.1.0-rc1+Candidate+Issue%22 Feature Requests for 3.1]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/labels/Published%20Research Published research affecting project]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20no%3Alabel Open Issues without a label / tag]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20no%3Alabel%20no%3Aassignee Open Issues with a label, but without assignee]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2015-01-01 Open Issues before 2015]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2016-01-01 Open Issues before 2016] &lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/issues?utf8=%E2%9C%93&amp;amp;q=type%3Aissue%20is%3Aopen%20created%3A%3C2017-01-01 Open Issues before 2017]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224839</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224839"/>
				<updated>2017-01-09T21:42:48Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Conference website: https://2017.appsec.eu/&lt;br /&gt;
* Training dates: 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference dates: 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: Chaim - Always willing to help :)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Status: Has been submitted on January 2: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3078201&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: Introducing the OWASP ModSecurity Core Rule Set 3.0&lt;br /&gt;
** Presenter: Christian Folini (Chaim can help if needed)&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3088094&lt;br /&gt;
* Paper #2: Testing FTW! A Modern, Open Source Approach to testing WAFs&lt;br /&gt;
** Presenter: Chaim Sanders, Zach Allen and Christian Peron&lt;br /&gt;
** Status: Submitted January 8th&lt;br /&gt;
* Paper #3: On the use of client side WAFs - it’s no WAFing matter&lt;br /&gt;
** Presenter: Chaim Sanders&lt;br /&gt;
** Status: Submitted January 8th&lt;br /&gt;
* Paper #4: A Core Rule Set War Report&lt;br /&gt;
** Presenter: Christian Folini&lt;br /&gt;
** Status: Submitted January 8th: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3088131&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== Hack CRS ====&lt;br /&gt;
&lt;br /&gt;
Offer a prize to break execute an attack against a website protected with CRS throughout the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Development: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224837</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224837"/>
				<updated>2017-01-09T21:40:03Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Conference Papers / Presentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Conference website: https://2017.appsec.eu/&lt;br /&gt;
* Training dates: 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference dates: 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: Chaim - Always willing to help :)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Status: Has been submitted on January 2: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3078201&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: CRS3: Introduction to CRS3 and the new Features&lt;br /&gt;
** Presenter: Christian (Chaim can help if needed)&lt;br /&gt;
** Status: Submitted January 8th&lt;br /&gt;
* Paper #2: Testing FTW! A Modern, Open Source Approach to testing WAFs&lt;br /&gt;
** Presenter: Chaim Sanders, Zach Allen and Christian Peron&lt;br /&gt;
** Status: Submitted January 8th&lt;br /&gt;
* Paper #3: On the use of client side WAFs - it’s no WAFing matter&lt;br /&gt;
** Presenter: Chaim Sanders&lt;br /&gt;
** Status: Submitted January 8th&lt;br /&gt;
* Paper #4: A Core Rule Set War Report&lt;br /&gt;
** Presenter: Christian Folini&lt;br /&gt;
** Status: Submitted January 8th&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== Hack CRS ====&lt;br /&gt;
&lt;br /&gt;
Offer a prize to break execute an attack against a website protected with CRS throughout the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Development: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224646</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224646"/>
				<updated>2017-01-02T16:56:45Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Conference website: https://2017.appsec.eu/&lt;br /&gt;
* Training dates: 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference dates: 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: FIXME (above 8 students, I need a sidekick)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Status: Has been submitted on January 2: https://easychair.org/conferences/submission.cgi?a=13528833;submission=3078201&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: CRS3: Introduction to CRS3 and the new Features&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #2: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #3: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #4: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224645</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224645"/>
				<updated>2017-01-02T16:48:18Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Conference website: https://2017.appsec.eu/&lt;br /&gt;
* Training dates: 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference dates: 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: FIXME (above 8 students, I need a sidekick)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Status: Has been submitted on January 2.&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: CRS3: Introduction to CRS3 and the new Features&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #2: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #3: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #4: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224274</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224274"/>
				<updated>2016-12-20T19:25:03Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Getting Started / Tutorials */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
FIXME&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224273</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224273"/>
				<updated>2016-12-20T19:24:42Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Getting Started / Tutorials */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information about the rule set at [https://modsecurity.org/crs https://modsecurity.org/crs] and a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
FIXME&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224272</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224272"/>
				<updated>2016-12-20T19:24:02Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Getting Started / Tutorials */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&amp;lt;br/&amp;gt;&lt;br /&gt;
You can find a full list of all the rules in the Core Rule Set at [https://netnea.com/crs https://netnea.com/crs]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
FIXME&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224271</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224271"/>
				<updated>2016-12-20T19:23:40Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Getting Started / Tutorials */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&amp;lt;br/&amp;gt;&lt;br /&gt;
You can find a full list of all the rules in the Core Rule Set at [https://netnea.com/crs]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
FIXME&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224177</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224177"/>
				<updated>2016-12-15T10:04:04Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Conference website: https://2017.appsec.eu/&lt;br /&gt;
* Training dates: 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference dates: 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: FIXME (above 8 students, I need a sidekick)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Deadline: '''January 2, 2017'''&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: CRS3: Introduction to CRS3 and the new Features&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #2: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #3: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #4: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224176</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224176"/>
				<updated>2016-12-15T09:59:57Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a work in progress page about our plans for the CRS at AppSecEU 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
https://2017.appsec.eu/&lt;br /&gt;
* Training 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: FIXME (above 8 students, I need a sidekick)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Deadline: '''January 2, 2017'''&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: CRS3: Introduction to CRS3 and the new Features, &lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #2: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #3: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #4: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224175</id>
		<title>CRSAppSecEU2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRSAppSecEU2017&amp;diff=224175"/>
				<updated>2016-12-15T09:57:57Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: Created page with &amp;quot;= Plans for AppsSecEU 2017 in Belfast =  https://2017.appsec.eu/ * Training 8th, 9th &amp;amp; 10th of May 2017 * Conference 11th &amp;amp; 12th of May 2017  === Training ===  We offer a free...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plans for AppsSecEU 2017 in Belfast =&lt;br /&gt;
&lt;br /&gt;
https://2017.appsec.eu/&lt;br /&gt;
* Training 8th, 9th &amp;amp; 10th of May 2017&lt;br /&gt;
* Conference 11th &amp;amp; 12th of May 2017&lt;br /&gt;
&lt;br /&gt;
=== Training ===&lt;br /&gt;
&lt;br /&gt;
We offer a free Apache / ModSecurity / CRS training course based on Christian's course material at https://netnea.com/cms/apache-tutorials&lt;br /&gt;
&lt;br /&gt;
* CFT Application: Christian&lt;br /&gt;
* Teacher: Christian&lt;br /&gt;
* Support: FIXME (above 8 students, I need a sidekick)&lt;br /&gt;
* Call for Trainings: https://2017.appsec.eu/program/call-for-trainings&lt;br /&gt;
* Deadline: '''January 2, 2017'''&lt;br /&gt;
&lt;br /&gt;
=== Conference Papers / Presentation ===&lt;br /&gt;
&lt;br /&gt;
* Call for Papers: https://2017.appsec.eu/program/call-for-papers&lt;br /&gt;
* Deadline: '''January 9, 2017'''&lt;br /&gt;
&lt;br /&gt;
* Paper #1: CRS3: Introduction to CRS3 and the new Features, &lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #2: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #3: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
* Paper #4: FIXME&lt;br /&gt;
** Presenter: FIXME&lt;br /&gt;
&lt;br /&gt;
=== Conference Activities ===&lt;br /&gt;
&lt;br /&gt;
* Call for Activities: https://2017.appsec.eu/program/call-for-activities&lt;br /&gt;
* Deadline: none&lt;br /&gt;
&lt;br /&gt;
==== CRS Summit ====&lt;br /&gt;
&lt;br /&gt;
Inviting the Community and all Commercial Suppliers using / interested in CRS rules, maybe evening of May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Summit: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Hackathon ====&lt;br /&gt;
&lt;br /&gt;
Hacking away together for a day. Maybe May 10&lt;br /&gt;
&lt;br /&gt;
* Head of CRS Hackathon: FIXME&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;br /&gt;
&lt;br /&gt;
==== CRS Installation Party ====&lt;br /&gt;
&lt;br /&gt;
Helping people get started with the CRS, probably 1/2 day during the conference&lt;br /&gt;
&lt;br /&gt;
* Head of Installation Party&lt;br /&gt;
* Status: FIXME&lt;br /&gt;
* Date / Time / Location: FIXME&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224174</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=224174"/>
				<updated>2016-12-15T09:57:32Z</updated>
		
		<summary type="html">&lt;p&gt;Dune73: /* Plans for AppSecEU 2017 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
'''The 1st Line of Defense Against Web Application Attacks''' &lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.&lt;br /&gt;
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with [https://www.modsecurity.org ModSecurity] or compatible web application firewalls. &lt;br /&gt;
The CRS aims to protect web applications from a wide range of attacks, including the [[Top10|OWASP Top Ten]], with a minimum of false alerts.&lt;br /&gt;
&lt;br /&gt;
More information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; &lt;br /&gt;
| style=&amp;quot;vertical-align:top;&amp;quot; | The OWASP ModSecurity CRS provides protections in the following attack/threat categories:&lt;br /&gt;
* SQL Injection (SQLi)&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Local File Inclusion (LFI)&lt;br /&gt;
* Remote File Inclusion (RFI)&lt;br /&gt;
* Remote Code Execution (RCE)&lt;br /&gt;
* PHP Code Injection&lt;br /&gt;
* HTTP Protocol Violations&lt;br /&gt;
* Shellshock&lt;br /&gt;
* Session Fixation&lt;br /&gt;
* Scanner Detection&lt;br /&gt;
* Metadata/Error Leakages&lt;br /&gt;
* Project Honey Pot Blacklist&lt;br /&gt;
* GeoIP Country Blocking &lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;text-align:right;&amp;quot; | [[File:CRS3-movie-poster-thumb.jpeg|300px|link=https://coreruleset.org/poster]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Getting Started / Tutorials==&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Members ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.tar.gz Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/archive/v3.0.0.zip Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Nov 2016] - [https://lists.owasp.org/pipermail/owasp-modsecurity-core-rule-set/2016-November/002265.html CRS3 Released]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Getting Started=&lt;br /&gt;
&lt;br /&gt;
The following tutorials will get you started with ModSecurity and the CRS v3.&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-6_embedding-modsecurity/ Installing ModSecurity]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-7_including-modsecurity-core-rules/ Including the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
* [https://www.netnea.com/cms/apache-tutorial-8_handling-false-positives-modsecurity-core-rule-set/ Handling False Positives with the OWASP ModSecurity Core Rule Set]&lt;br /&gt;
&lt;br /&gt;
These tutorials are part of a big series of Apache / ModSecurity guides published by [https://www.netnea.com/cms/apache-tutorials netnea]. They are written by [[:user:Dune73|Christian Folini]].&lt;br /&gt;
&lt;br /&gt;
More Information at [https://modsecurity.org/crs https://modsecurity.org/crs].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; id:1,phase:1,nolog,pass,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
background-color: #ffffcc;&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[:User:Chaim_sanders|Chaim Sanders]]&lt;br /&gt;
*[[:user:Dune73|Christian Folini]]&lt;br /&gt;
*[[:User:lifeforms|Walter Hop]]&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&lt;br /&gt;
*[[:User:Brian_Rectanus|Brian Rectanus]]&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&lt;br /&gt;
*Nick Galbreath (libinjection)&lt;br /&gt;
&lt;br /&gt;
See changelog for more contributors.&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The CRS project is a small community within the bigger OWASP community. We have a successful project with a wide user base and with the CRS3 release cycle, we have put the development on new feet.&lt;br /&gt;
&lt;br /&gt;
We have big plans and there is a need for all sort of contributions from people on a beginner and from people on an expert level alike.&lt;br /&gt;
&lt;br /&gt;
FIXME&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Plans for AppSecEU 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See separate page: [[CRSAppSecEU2017|Plans for AppSecEU 2017]]&lt;br /&gt;
&lt;br /&gt;
== Archive: v3.0 Detection Concepts / Goals ==&lt;br /&gt;
&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Archive: Detection Logic/Flow Concepts in the Request Header Phase ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
=CRS3 Poster=&lt;br /&gt;
&lt;br /&gt;
The CRS3 poster was designed by [[:User:Hugo_Costa|Hugo Costa]], OWASP's graphical designer. It can be reused under a CC BY-ND license.&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg large version] has a 300 dpi resolution, big enough to be printed in A2, A1, or even A0 format. The format is the standard poster size format 500mm x 700mm (19.68in x 27.56in).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CRS3-movie-poster-small.jpg|1280px|link=https://www.owasp.org/images/e/eb/CRS3-movie-poster-nourl-5906x8268.jpeg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Dune73</name></author>	</entry>

	</feed>