-
-
Notifications
You must be signed in to change notification settings - Fork 421
refactor: 920340 - delete 920341 #4268
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
📊 Quantitative test results for language: |
|
@touchweb-vincent 920340 only adds a notice (2 points) so that rule alone is not enough for a request to be blocked (5 is required by default). I agree the rule is likely redundant, but if you want to remove it then you should modify 920340 to give a critical scoring (5 points) so the request can be blocked at PL-1. @coreruleset/core-developers were there false positives with |
Well seen - i edited the score. |
|
Hum, i don't see why the score is invalid, there is others declarations with setvar:'tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}' and i don't see unit which force value. |
|
@touchweb-vincent You also need to update the |
|
Thanks |
It does have sense. The logic is that, on PL1, it will only log a notice. From PL2, request is blocked. Anyway, i agree that we should block it on PL1. |
|
The reason we didn't block at PL1 right away is that we didn't want to block old / minority browsers. We can argue about it, but we don't have any evidence to support a change to blocking now, i.e., we don't know how many FPs we would start to cause with this change.
I'm not aware of any, but since the score is 2, they might have gone unnoticed. IMO, we could give it a try. If people start complaining we can revert. @fzipi @dune73 what do you think? |
|
Hi @theseion, Here, we haven’t seen any false positives in the past 3 years of hard blocking. There was only one third-party provider that was blocked, and it was a true positive since their corrupted usage neutralized the XML processor. |
afaict no-one has complained about that rule for creating log spam, so it must not be a common issue. Considering what this rule is meant to block, I think it's definitely worth it to give it a try to block it at PL-1. |
|
I've edited the comment. |
|
Ping @fzipi |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it makes sense. Let's do it. After updating the comments, I'll approve.
tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920340.yaml
Outdated
Show resolved
Hide resolved
tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920340.yaml
Outdated
Show resolved
Hide resolved
tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920340.yaml
Outdated
Show resolved
Hide resolved
tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920340.yaml
Outdated
Show resolved
Hide resolved
….yaml Co-authored-by: Max Leske <[email protected]>
….yaml Co-authored-by: Max Leske <[email protected]>
….yaml Co-authored-by: Max Leske <[email protected]>
….yaml Co-authored-by: Max Leske <[email protected]>
|
@theseion accepted but there is now an error i cannot solve : 8:10 syntax error: mapping values are not allowed here (syntax) |
tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920340.yaml
Outdated
Show resolved
Hide resolved
….yaml Co-authored-by: Max Leske <[email protected]>
|
Thanks @touchweb-vincent! |
Hello,
Imo, 920341 doesn't make sense - but maybe there is a good reason this rule exists that i don't have in mind.
Corrupted call should be blocked on PL1.
Thanks you
Vincent