Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Monthly Chat Agenda May 2024 (2024-05-06 and 2024-05-20) #3694

Open
dune73 opened this issue May 6, 2024 · 2 comments
Open

Monthly Chat Agenda May 2024 (2024-05-06 and 2024-05-20) #3694

dune73 opened this issue May 6, 2024 · 2 comments

Comments

@dune73
Copy link
Member

dune73 commented May 6, 2024

This is the Agenda for the two Monthly CRS Chats.

The general chat is going to happen on https://owasp.slack.com in the channel #coreruleset on Monday, 2024-05-06, at 20:30 CEST. That's the 1st Monday of the month. A separate issue chat is happening at the same location, same time on Monday, 2024-05-20. That's the 3rd Monday of the month. Please note that we have a CRS calendar (maintained by @fzipi).

Archived previous meetings and their decision are here.

What happened in the meantime since the chat last month

Outside development

  • The OWASP ModSecurity project will hold a first onsite meeting on Wed, June 5 in Leuven, Belgium. This will be constitutional for the new community and also elect permanent project leaders. More info in the #project-modsecurity OWASP Slack channel
  • OWASP HQ wants to a June WAF media month, CRS is invited to provide at least a blog post

Inside development

Rules

  • FIXME: Please fill in

CRS Sandbox

  • A lot of work have been done to restore the Sandbox using the latest container versions
    • now it should be blocking using 403 back again
    • started the effort to bring back Coraza to the sandbox

Security

  • FIXME: Please fill in

Plugins

Documentation and Public Relations

  • New website is live!
    • still need to fix some cross postings
  • Alessandro has been comissioned to provide a CRS media kit for OWASP HQ

Project Administration and Sponsor relationships

  • FIXME: Please fill in

Tools

  • FIXME: Please fill in

Testing incl. Seaweed and many future plans

  • Seaweed was failing on older python versions
    • trying to catch up and use regular nuclei + simpler scripting (jq? yq?)
    • ported reporting to golang for now

Containers

  • New versions out with:
    • removed modsecurity setup override and now we use the default modsecurity.conf-recommended as base.
    • new variables have been introduced to support this change, now making everything in that file configurable with env vars.
    • we moved away from two branch development, and now we just use main and tag when we want a new release. this way we have release notes that are easier to track.

CRS Status Page

  • FIXME: Please fill in

Project discussions and decisions

Rules development, key project numbers

PRs that have been merged since the last meeting

We merged 27 PRs since the last monthly project chat.

Open PRs

Open PRs marked DRAFT or work in progress or needs action

Separate 2nd Meeting (Monday, 2024-05-20)

How to get to our slack and join the meeting?

If you are not yet on the OWASP Slack, here is your invite: https://owasp.org/slack/invite .

Everybody is welcome to join our community chat.

@franbuehler
Copy link
Contributor

franbuehler commented May 20, 2024

Decisions 2nd Meeting (Monday, 2024-05-20)

🔵 GeoIP plugin

Information by @fzipi and @azurit

  • There is a new plugin for doing GeoIP (blocking)
  • That still needs to be moved to the coreruleset org
  • It will be a good addition to our plugins
  • Open question is:
    • @azurit would like to have a simple geoip plugin that does nothing by itself, it's meant to use geoip across CRS
    • @dune73 would like to have at least a blocking rule inside this plugin. But @azurit thinks this blocking rule should be a second plugin
    • Decision: no decision yet, but we would like to see what @dune73's arguments are (ping him and discuss it in issue)

🔵 953120

  • Because checking the response header is cheaper than checking the response body, because we think that trusting the Content-Encoding header is acceptable and because we think that solving this fp is important (azurit sees so much diverse traffic) we decide to go with solution 2.

🔵 933120 False Positive

  • already resolved :-)

🔵 Fediverse / ActivityPub

  • We agree that this should be solved with a plugin.
  • As for the RCE rules, they have a couple of open issues. We need to tackle those as a group and conceptually decide what we want to do with them.

🔵 Albedo

  • Intro by @theseion:
    • Albedo is a simple web server that is designed to replace httpbin in our test setup. It does 3 things:
      • requests to unknown endpoints -> return 200 without a body
      • POST requests to /reflect expect a JSON document that describes the response to return; albedo will return the response as specified.
      • endpoint access and payloads are logged
    • The main motivation is response rule testing, which currently doesn't work
      . There are currently 3 issues with response testing:
      • no way to set the status code
      • the request body is embedded in the response, so anchored regexes won't match
      • the request body is embedded as JSON, meaning non-printable characters and double quotes are escaped, with additional white space and newline characters thrown in
    • @theseion updated most response tests to use albedo. They still work with the current setup.

@franbuehler
Copy link
Contributor

franbuehler commented Jun 1, 2024

Blog posts found by dev-on-duty, to be added for the next meeting (external references) when preparing the June meeting (@dune73):

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants