-
-
Notifications
You must be signed in to change notification settings - Fork 401
Monthly Chat Agenda April 2023 (2023-04-03 and 2022-04-17) #3159
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Comments
Merged
Decisions 2023-04-03
|
This was referenced Apr 5, 2023
Closed
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
This is the Agenda for the two Monthly CRS Chats.
The general chat is going to happen on https://owasp.slack.com in the channel #coreruleset on Monday, 2023-04-03, at 20:30 CET. That's the 1st Monday of the month. A separate issue chat is happening at the same location, same time on Monday, 2022-04-17. That's the 3rd Monday of the month. Please note that we have a CRS calendar (maintained by @fzipi).
Archived previous meetings and their decision are here.
What happened in the meantime since the chat last month
Outside development
Inside development
Rules
sh
andfi
in argument names and values (thanks to @Xhoenix, @emphazer)CRS Sandbox
CRS Bug Bounty and Security
Plugins
Documentation and Public Relations
INSTALL
document continues but is very slow and very tedious work.Project Administration and Sponsor relationships
Tools
SecRule
andSecAction
entries in crs-setup.conf.example by #3161. Explicit initialization of theTX
variable is no longer necessary if it exists incrs-setup.conf.example
, with comments.Testing incl. Seaweed and many future plans
Containers
CRS Status Page
Project discussions and decisions
Due to the recent ‘Unix command’ rule changes, if you use
curl
to access something through CRS then you get an anomaly score of 10 (5 at PL 2 + 5 at PL 3, 932236 PL2 and 932237 PL3) due to "curl" being detected in the User-Agent string. This seems like a significant change: compare this to CRS 3.3.x which does not penalise the use ofcurl
at all.Question: Do we need to fix this? If so, who needs to do what to fix it?
Qs: We are in agreement on our approach? Who will implement this?
Please be careful what we say on public channels about this at the present time.
The Referer header was recently added to several rules to combat a series of bypasses. Unfortunately, some legitimate Referer headers now cause false positives with rule 932200 (issue: Rule 932200, now inspecting Referer headers, matches any query string that contains spaces #3180).
Q: It has been suggested to simply remove Referer from this rule because it is difficult to fix otherwise: are we happy with this?
It has been reported (Base64 Transform being at the end allows false negatives #3182) that having
t:base64Decode
at the end of a transformation pipeline may allow for certain bypasses.I think they might be suggesting that we need to perform an additional round of
t:urlDecodeUni,t:jsDecode,t:removeWhitespace
after the Base64 decoding step?Qs: Do we:
t:base64Decode
away from the end of all transformation pipelines?Rules development, key project numbers
PRs that have been merged since the last meeting
We merged 13 PRs since the last monthly project chat.
Open PRs
Open PRs marked DRAFT or work in progress or needs action
sh
in RCE rules #3186fi
#3187Open issues and PRs
Separate 2nd Meeting (Monday, 2022-04-17)
How to get to our slack and join the meeting?
If you are not yet on the OWASP Slack, here is your invite: https://owasp.org/slack/invite .
Everybody is welcome to join our community chat.
The text was updated successfully, but these errors were encountered: