F5 DoS for NGINX 4.2

Here you can find the release information for F5 F5 DoS for NGINX v4.2. F5 DoS for NGINX provides behavioral protection against Denial of Service (DoS) for your web applications.

Release 4.2

August 15, 2023

In this release, F5 DoS for NGINX supports NGINX Plus R30.

New Features

  • Support for Nginx Plus R30
  • Support for Ubuntu 22.04
  • Support for HTTP3/QUIC
  • Improvement of Embedded Server Health mechanism

Supported Packages

App Protect DoS

Alpine 3.15
  • app-protect-dos-30.4.2.0-r1.apk
CentOS 7.4+ / RHEL 7.4+ / UBI7
  • app-protect-dos-30.4.2.0-1.el7.ngx.x86_64.rpm
RHEL 8 and Rocky Linux 8
  • app-protect-dos-30.4.2.0-1.el8.ngx.x86_64.rpm
Debian 11
  • app-protect-dos_30.4.2.0-1~bullseye_amd64.deb
Ubuntu 20.04
  • app-protect-dos_30.4.2.0-1~focal_amd64.deb
Ubuntu 22.04
  • app-protect-dos_30.4.2.0-1~jammy_amd64.deb

NGINX Plus

  • NGINX Plus R30

Important Notes

  • Installing L4 accelerated mitigation feature (install app-protect-dos-ebpf) configures nginx and admd to run with root privileges.

  • Support for proxy_protocol configuration: proxy_protocol monitor parameter should be used when the listen directive of the correspondent server block contains the proxy_protocol parameter.

  • If F5 WAF for NGINX is installed, app protect should be disabled for the location of DoS Live Activity Monitoring API.

    For example:

    location /api {
    app_protect_enable off;
    app_protect_dos_api;
    }
  • Port configuration in app_protect_dos_monitor should correspond to the port, the server listens to. Misconfiguration can potentially cause a false attack declaration.

    For example:

        server {
            listen 8080;
            server_name myservice.com;
            location / {
                app_protect_dos_monitor "myservice.com:8080/";
            }
        }
  • proxy_request_buffering off is not supported.

  • gRPC and HTTP/2 protection require active monitoring of the protected service. The directive app_protect_dos_monitor is mandatory for the attack to be detected.

  • TLS fingerprint feature is not used in CentOS 7.4 and RHEL 7 / UBI 7 due to the old OpenSSL version. The required OpenSSL version is 1.1.1 or higher.

  • Slow POST attack always mitigates with block action while other types of attacks can also be mitigated with redirection or JS challenges.

  • The recommended option of running NGINX Plus in a Docker Container is with the daemon off flag. It’s mandatory for UBI 8.

  • The package dependencies for F5 DoS for NGINX have changed in this release, replacing the curl dependencies with libcurl only. For more information, see the F5 DoS for NGINX Deployment Guide.

  • Starting with this release, Ubuntu 18.04 support has been deprecated.