3 comments

  • westurner2 days ago
    How does RhinoWAF compare to other open WAFs like OWASP Coraza WAF, bunkerweb, and SafeLine?<p>Does RhinoWAF support ModSecurity SecLang rulesets like OWASP CRS? Is there a SecLang to RhinoWAF JSON converter?<p>Shouldn&#x27;t eBPF be fast at sorting and running rules?<p>What are good metrics for evaluating WAFs?<p>coraza: <a href="https:&#x2F;&#x2F;github.com&#x2F;corazawaf&#x2F;coraza" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;corazawaf&#x2F;coraza</a><p>bunkerweb: <a href="https:&#x2F;&#x2F;github.com&#x2F;bunkerity&#x2F;bunkerweb" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;bunkerity&#x2F;bunkerweb</a><p>SafeLine: <a href="https:&#x2F;&#x2F;github.com&#x2F;chaitin&#x2F;SafeLine" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;chaitin&#x2F;SafeLine</a><p>RhinoWAF: <a href="https:&#x2F;&#x2F;github.com&#x2F;1rhino2&#x2F;RhinoWAF" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;1rhino2&#x2F;RhinoWAF</a><p>gh topic: waf: <a href="https:&#x2F;&#x2F;github.com&#x2F;topics&#x2F;waf" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;topics&#x2F;waf</a><p>awesome-WAF: <a href="https:&#x2F;&#x2F;github.com&#x2F;0xInfection&#x2F;Awesome-WAF" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;0xInfection&#x2F;Awesome-WAF</a>
    • westurner2 days ago
      &gt; <i>What are good metrics for evaluating WAFs?</i><p>TPR: True Positive Rate (Detection Rate), TNT: True Negative Rate, FPR: False Positive Rate (&quot;ROC Curve&quot;)<p>Accuracy = TP + TN &#x2F; # Requests<p>Latency &#x2F; Detection Time as percentiles<p>Throughput: response time in ms given requests per second<p>Time to Virtual Patch, and CI&#x2F;CD rule deployment integration<p>DDoS Response Time: <i>How quickly does the WAF mitigate a Layer 7 (application) DDoS attack?</i><p>... Rule Management Overhead: MTTT: Mean Time To Tune, Policy Complexity; CI&#x2F;CD, SIEM&#x2F;SOAR integration; <a href="https:&#x2F;&#x2F;gemini.google.com&#x2F;share&#x2F;0d2d1c53bfb0" rel="nofollow">https:&#x2F;&#x2F;gemini.google.com&#x2F;share&#x2F;0d2d1c53bfb0</a>
  • 1rhino22 days ago
    Modsec is a sloppy tool thats honestly sucky. Its config hell, rule hell and its outdated ash. Its vulnerable to just about EVERY modern attack surface. We are gonna make that change: <a href="https:&#x2F;&#x2F;github.com&#x2F;1rhino2&#x2F;RhinoWAF&#x2F;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;1rhino2&#x2F;RhinoWAF&#x2F;</a><p>Just to clarify, we are not a company of any sorts, simply people willing to help.
  • westurner2 days ago
    Is there a good way to go from an OpenAPI &#x2F; Swagger schema to WAF rules; and then to verify that the rules don&#x27;t collide? IIUC eBPF does part of this
    • westurner2 days ago
      Re: eBPF WAF<p>awesome-ebpf &gt; Kernel docs, examples, &quot;eBPF&#x2F;XDP hardware offload to SmartNICs&quot;, Go libraries: <a href="https:&#x2F;&#x2F;github.com&#x2F;zoidyzoidzoid&#x2F;awesome-ebpf#go-libraries" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;zoidyzoidzoid&#x2F;awesome-ebpf#go-libraries</a><p>&#x2F;? ebpf waf site:github.com <a href="https:&#x2F;&#x2F;www.google.com&#x2F;search?q=+ebpf+waf+site%3Agithub.com" rel="nofollow">https:&#x2F;&#x2F;www.google.com&#x2F;search?q=+ebpf+waf+site%3Agithub.com</a><p>harporoeder&#x2F;ebpfsnitch: &quot;Linux Application Level Firewall based on eBPF and NFQUEUE&quot; <a href="https:&#x2F;&#x2F;github.com&#x2F;harporoeder&#x2F;ebpfsnitch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;harporoeder&#x2F;ebpfsnitch</a><p>ebpf-security&#x2F;ebpf-https: &quot;eBPF-https is an open source web application firewall (WAF)&quot; <a href="https:&#x2F;&#x2F;github.com&#x2F;ebpf-security&#x2F;ebpf-https" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ebpf-security&#x2F;ebpf-https</a><p>cilium&#x2F;cilium: <a href="https:&#x2F;&#x2F;github.com&#x2F;cilium&#x2F;cilium" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;cilium&#x2F;cilium</a> :<p>&gt; <i>Cilium is a networking, observability, and security solution with an eBPF-based dataplane. It provides a simple flat Layer 3 network with the ability to span multiple clusters in either a native routing or overlay mode. It is L7-protocol aware and can enforce network policies on L3-L7 using an identity based security model that is decoupled from network addressing.</i>