F5 DoS for NGINX 3.1
Here you can find the release information for F5 F5 DoS for NGINX v3.1. F5 DoS for NGINX provides behavioral protection against Denial of Service (DoS) for your web applications.
November 29, 2022
In this release, F5 DoS for NGINX supports NGINX Plus R28.
- Support for NGINX Plus R28.
- F5 DoS for NGINX can be deployed behind L4/L7 load balancers when L4 protection is enabled.
- Fixed the issue: Installing F5 DoS for NGINX with L4 (eBPF) mitigation behind L4/L7 load balancer may result in the load balancer’s starvation during an attack.
- Support for proxy_protocol configuration for server health monitoring.
Previously, server health monitoring could not be used when the listen directive of the correspondent server block contained theproxy_protocolparameter.
This disallowed using F5 DoS for NGINX for Denial of Service (DoS) protection for HTTP2 and gRPC protected objects in theproxy_protocolconfiguration.
- app-protect-dos-28+3.1.7-1.el7.ngx.x86_64.rpm
- app-protect-dos-28+3.1.7-1.el8.ngx.x86_64.rpm
- app-protect-dos_28+3.1.7-1~bullseye_amd64.deb
- app-protect-dos_28+3.1.7-1~bionic_amd64.deb
- app-protect-dos_28+3.1.7-1~focal_amd64.deb
- app-protect-dos-28.3.1.7-r1.apk
- NGINX Plus R28
-
Installing L4 accelerated mitigation feature (install
app-protect-dos-ebpf) configuresnginxandadmdto run with root privileges. -
Support for
proxy_protocolconfiguration:proxy_protocolmonitor parameter should be used when the listen directive of the correspondent server block contains theproxy_protocolparameter. -
If F5 WAF for NGINX is installed, app protect should be disabled for the location of DoS Live Activity Monitoring API.
For example:
shell location /api { app_protect_enable off; app_protect_dos_api; } -
Misconfiguration of
app_protect_dos_monitorpotentially can cause a false attack declaration. Port configuration should correspond to the port the server listens to.For example:
shell server { listen 8080; location / { app_protect_dos_monitor "myservice.com:8080"; } } -
proxy_request_bufferingoff is not supported. -
gRPC and HTTP/2 protection require active monitoring of the protected service. The directive
app_protect_dos_monitoris mandatory for these use cases, otherwise, the attack will not be detected. -
TLS fingerprint feature is not used in CentOS 7.4 and RHEL 7 / UBI 7 due to the old OpenSSL version. The required OpenSSL version is 1.1.1 or higher.
-
Monitor directive (app_protect_monitor) with the
proxy_protocolparameter can not be configured on Ubuntu 18.04. As a result, gRPC and HTTP/2 DoS protection forproxy_protocolconfiguration is not supported. -
Slow POST attack always mitigates with block action while other types of attacks can also be mitigated with redirection or JS challenges.
-
The recommended option of running NGINX Plus in a Docker Container is with the
daemon offflag. It’s mandatory for UBI 8.