Server : Apache System : Linux server1.cgrithy.com 3.10.0-1160.95.1.el7.x86_64 #1 SMP Mon Jul 24 13:59:37 UTC 2023 x86_64 User : nobody ( 99) PHP Version : 8.1.23 Disable Function : NONE Directory : /etc/apache2/conf.d/modsec_vendor_configs/OWASP3/ |
# Contributing to the CRS We value third-party contributions. To keep things simple for you and us, please adhere to the following contributing guidelines. ## Getting Started * You will need a [GitHub account](https://github.com/signup/free). * Submit a [ticket for your issue](https://github.com/SpiderLabs/owasp-modsecurity-crs/issues), assuming one does not already exist. * Clearly describe the issue including steps to reproduce when it is a bug. * Make sure you specify the version that you know has the issue. * Bonus points for submitting a failing test along with the ticket. * If you don't have push access, fork the repository on GitHub. ## Making Changes * Please base your changes on branch ```v3.3/dev``` * Create a topic branch for your feature or bug fix. * Please fix only one problem at a time; this will help to quickly test and merge your change. If you intend to fix multiple unrelated problems, please use a separate branch for each problem. * Make commits of logical units. * Make sure your commits adhere to the rules guidelines below. * Make sure your commit messages are in the [proper format](http://tbaggery.com/2008/04/19/a-note-about-git-commit-messages.html): The first line of the message should have 50 characters or less, separated by a blank line from the (optional) body. The body should be wrapped at 70 characters and paragraphs separated by blank lines. Bulleted lists are also fine. ## General Formatting Guidelines for rules contributions - 4 spaces per indentation level, no tabs - no trailing whitespace at EOL or trailing blank lines at EOF - comments are good, especially when they clearly explain the rule - try to adhere to a 80 character line length limit - if it is a [chained rule](https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#chain), alignment should be like ``` SecRule .. ..\ "...." SecRule .. ..\ "..." SecRule .. ..\ ".." ``` - use quotes even if there is only one action, it improves readability (e.g., use `"chain"`, not `chain`, or `"ctl:requestBodyAccess=Off"` instead of `ctl:requestBodyAccess=Off`) - always use numbers for phases, instead of names - format your `SecMarker` between double quotes, using UPPERCASE and separating words using hyphens. Examples are: ``` SecMarker "END-RESPONSE-959-BLOCKING-EVALUATION" SecMarker "END-REQUEST-910-IP-REPUTATION" ``` - the proposed order for actions is: ``` id phase allow | block | deny | drop | pass | proxy | redirect status capture t:xxx log nolog auditlog noauditlog msg logdata tag sanitiseArg sanitiseRequestHeader sanitiseMatched sanitiseMatchedBytes ctl ver severity multiMatch initcol setenv setvar expirevar chain skip skipAfter ``` ## Variable naming conventions * Variable names are lowercase using chars from `[a-z0-9_]` * To somewhat reflect the fact that the syntax for variable usage is different when you define it (using setvar) and when you use it, we propose the following visual distinction: * Lowercase letters for collection, dot as separator, variable name. E.g.,: `setvar:tx.foo_bar_variable` * Capital letters for collection, colon as separator, variable name. E.g.,: `SecRule TX:foo_bar_variable` ## Rules compliance with each Paranoia Level (PL) Rules in the CRS are organized in Paranoia Levels, which allows you to choose the desired level of rule checks. Please read file ```crs-setup.conf.example``` for an introduction and a more detailed explanation of Paranoia Levels in the section `# -- [[ Paranoia Level Initialization ]]`. **PL0:** * Modsec installed, but almost no rules **PL1:** * Default level, keep in mind that most installations will normally use this one * If there is a complex memory consuming/evaluation rule it surely will be on upper levels, not this one * Normally we will use atomic checks in single rules * Confirmed matches only, all scores are allowed * No false positives / Low FP (Try to avoid adding rules with potential false positives!) * False negatives could happen **PL2:** * Chains usage are OK * Confirmed matches use score critical * Matches that cause false positives are limited to use score notice or warning * Low False positive rates * False negatives are not desirable **PL3:** * Chains usage with complex regex look arounds and macro expansions * Confirmed matches use score warning or critical * Matches that cause false positives are limited to use score notice * False positive rates increased but limited to multiple matches (not single string) * False negatives should be a very unlikely accident **PL4:** * Every item is inspected * Variable creations allowed to avoid engine limitations * Confirmed matches use score notice, warning or critical * Matches that cause false positives are limited to use score notice and warning * False positive rates increased (even on single string) * False negatives should not happen here * Check everything against RFC and white listed values for most popular elements ## ID Numbering Scheme The CRS project used the numerical id rule namespace from 900,000 to 999,999 for the CRS rules as well as 9,000,000 to 9,999,999 for default CRS rule exclusion packages. Rules applying to the incoming request use the id range 900,000 to 949,999. Rules applying to the outgoing response use the id range 950,000 to 999,999. The rules are grouped by vulnerability class they address (SQLi, RCE, etc.) or functionality (initialization). These groups occupy blocks of thousands (e.g. SQLi: 942,000 - 942,999). The grouped rules are defined in files dedicated to a single group or functionality. The filename takes up the first three digits of the rule ids defined within the file (e.g. SQLi: REQUEST-942-APPLICATION-ATTACK-SQLI.conf). The individual rule files for the vulnerability classes are organized by the paranoia level of the rules. PL 1 is first, then PL 2 etc. The block from 9XX000 - 9XX099 is reserved for use by CRS helper functionality. There are no blocking or filtering rules in this block. Among the rules serving a CRS helper functionality are rules that skip rules depending on the paranoia level. These rules always use the following reserved rule ids: 9XX011-9XX018 with very few exceptions. The blocking or filter rules start with 9XX100 with a step width of 10. E.g. 9XX100, 9XX110, 9XX120 etc. The rule id does not correspond directly with the paranoia level of a rule. Given the size of a rule group and the organization by lower PL rules first, PL2 and above tend to have rule IDs with higher numbers. Within a rule file / block, there are sometimes smaller groups of rules that belong to together. They are closely linked and very often represent copies of the original rules with a stricter limit (alternatively, they can represent the same rule addressing a different target in a second rule where this was necessary). These are stricter siblings of the base rule. Stricter siblings usually share the first five digits of the rule ID and raise the rule ID by one. E.g., Base rule at 9XX160, stricter sibling at 9XX161. Stricter siblings often have a different paranoia level. This means that the base rule and the stricter sibling do not reside next to one another in the rule file. Instead they are ordered in their appropriate paranoia level and can be linked via the first digits of the rule id. It is a good practice to introduce stricter siblings together with the base rule in the comments of the base rule and to reference the base rule with the keyword stricter sibling in the comments of the stricter sibling. E.g., "... This is performed in two separate stricter siblings of this rule: 9XXXX1 and 9XXXX2", "This is a stricter sibling of rule 9XXXX0."