Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Naive hueristic proxies are dangerous (Score 2) 17

Several components of the application stack used by this system have had known serious security vulnerabilities in the past.

Could you elaborate, please?

The stack I see Apache/NginX/IIS + ModSecurity + Libinjection + Core Rule Set. What am I missing? Apache has certainly had it's share of weaknesses, but with ModSec the track records seems quite clean; as is the case of Libinjection and the CRS.

Comment False Positives mostly gone in CRS3 (Score 4, Informative) 17

[project committer here]

The ModSec Core Rule Set 3.0 (CRS3) comes with a reduction of at least 90% of false positives (more like 99% on my servers). The base setups of Wordpress and Drupal can be run without any FPs.

If you see FPs with a default install of the Core Rules, please report. The idea is to have next to no FPs in the standard deployment mode.

There is a series of tutorials, which explains the installation of ModSec, the inclusion of the Core Rule Set and the handling of False Positives (still important at higher Paranoia Levels).

Submission + - OWASP ModSecurity Core Rule Set v3.0 released

dune73 writes: The OWASP ModSecurity Core Rule Set v3.0.0 release is now available. The OWASP CRS is a widely used Open Source set of generic rules designed to protect users against threats like the OWASP Top 10. The rule set is most often deployed in conjunction with an existing Web Application Firewall (WAF) like ModSecurity. Four years into the making, this release comes with dozens of new features including: reduced false positives (by over 90% in the default setup), improved detection of SQLi, XSS, RCE and PHP injections, the introduction of a Paranoia Mode which allows to assign a certain security level to a site, and better documentation that takes the pain out of ModSecurity. We are so excited about this, we want to make it into movie. In fact, we have already started the project with a poster.

Comment Re:hip kernel with lousy sw environment (Score 1) 400

Legally you are completely right:
> Solaris tools don't break your scripts, Linux tools prevent your scripts from being portable.

But I do not care about that. "tar xvzf" is a useful extension, "sed -i" too, as is "grep -r".
It helps me get my work done in shorter time. I am paid by the hour. My customer appreciates
speed.

I could write portable scripts, but this is not one of the goals of the projects I work in.
gnu/linux is the de facto standard these days. Not legally, but this is what most people
learn and use. There are dinosaurs around and they will live on for many years to come.
But

for F in `find . type d`; do echo $F; grep xxx $F; done

will look odder every day. (Maybe it is already very odd today, I am not very used to work
without "grep -r" ;-)

Slashdot Top Deals

You can now buy more gates with less specifications than at any other time in history. -- Kenneth Parker

Working...