
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 13:25:51 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Always-on detections: eliminating the WAF “log versus block” trade-off]]></title>
            <link>https://blog.cloudflare.com/attack-signature-detection/</link>
            <pubDate>Wed, 04 Mar 2026 15:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is introducing Attack Signature Detection and Full-Transaction Detection to provide continuous, high-fidelity security insights without the manual tuning of traditional WAFs. By correlating request payloads with server responses, we can now identify successful exploits and data exfiltration while minimizing false positives. ]]></description>
            <content:encoded><![CDATA[ <p>Traditional Web Application Firewalls typically require extensive, manual tuning of their rules before they can safely block malicious traffic. When a new application is deployed, security teams usually begin in a logging-only mode, sifting through logs to gradually assess which rules are safe for blocking mode. This process is designed to minimize false positives without affecting legitimate traffic. It’s manual, slow and error-prone.</p><p>Teams are forced into a trade-off: visibility in log mode, or protection in block mode. When a rule blocks a request, evaluation stops, and you lose visibility into how other signatures would have assessed it — valuable insight that could have helped you tune and strengthen your defenses.</p><p>Today, we’re solving this by introducing the next evolution of our managed rules: Attack Signature Detection.</p><p>When enabled, this detection inspects every request for malicious payloads and attaches rich detection metadata before any action is taken. You get complete visibility into every signature match, without sacrificing protection or performance. Onboarding becomes simple: traffic is analyzed, data accumulates, and you see exactly which signatures fire and why. You can then build precise mitigation policies based on past traffic, reducing the risk of false positives.</p><p>But we’re going one step further. We’re moving beyond request-only analysis to something far more powerful: Full-Transaction Detection.</p><p>Instead of looking at just the incoming request, this new detection correlates the entire HTTP transaction: request and response. By analyzing the full context, we dramatically reduce false positives compared to traditional request-only signature engines. More importantly, we uncover threats others miss, such as reflective SQL injection, subtle data exfiltration patterns, and dangerous misconfigurations that only reveal themselves in the response. </p><p>Attack Signature Detection is available now in Early Access — <a href="https://www.cloudflare.com/lp/attack-detection/"><u>sign up here</u></a> to express interest. Full-Transaction Detection is under development; <a href="https://www.cloudflare.com/lp/full-transaction-detection/"><u>register here</u></a> to be among the first to try it when it’s ready.</p>
    <div>
      <h2>The always-on framework</h2>
      <a href="#the-always-on-framework">
        
      </a>
    </div>
    <p>To provide full visibility on your traffic without slowing down the Internet, we had to change how we think about the request lifecycle. For customers who opt in, Attack Signature detection is now "always on." This means that as soon as traffic is proxied, all detection signatures are executed on every request, and the results are immediately visible in Security Analytics.</p><p>This "always-on" framework separates detection from mitigation. Detections run continuously, enriching analytics with metadata about triggered detections. This metadata is also added to the request as a new field, which customers can use to create custom policies within security rules. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Vx8m4KODWR1lqusEdBtUj/8339eea7b73eb79bae416ef7fe01b60b/image9.png" />
          </figure><p><sup><i>Separating the detection of malicious payloads from the actions taken by security rules is the core of the always-on framework. This approach enhances the analytics experience and increases confidence when deploying new protections.</i></sup></p><p>Our existing Bot Score and Attack Score detections already follow this method. Attack Signature Detection provides the same coverage as our Managed Rules product but operates within this new framework.</p><p>Does this introduce additional latency to the request? No — this model is designed for efficiency. If a customer has not created a blocking rule based on a detection, the detection can be executed <i>after</i> the request has been sent to the origin server, ensuring that the detection itself introduces no additional latency to the traffic. Therefore, upon onboarding, the detection is enabled by default but does not impact traffic performance. When a rule is created, the detection is moved in-line with the request that might experience additional latency. The exact value depends on the traffic profile of the application. </p>
    <div>
      <h2>Attack Signature Detection</h2>
      <a href="#attack-signature-detection">
        
      </a>
    </div>
    <p>Compared to traditional, rule-based systems like the Cloudflare Managed Ruleset, the new detection offers a substantial advancement in web application security. This approach makes identifying malicious web payloads and deploying security rules significantly more user-friendly.</p><p>The Cloudflare Managed Ruleset is where our analyst team develops detections for common attack vectors, including <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/"><u>SQL injection (SQLi)</u></a>, <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/"><u>Cross Site Scripting (XSS)</u></a>, <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/"><u>Remote Code Execution (RCE)</u></a>, and specific Common Vulnerabilities and Exposures (CVEs). Analysts typically release new rules weekly, with emergency releases deployed for high-profile vulnerabilities (such as the recent <a href="https://react2shell.com/"><u>React2Shell</u></a> <a href="https://blog.cloudflare.com/waf-rules-react-vulnerability/"><u>release</u></a>). Currently, over 700 managed rules are active in our Managed Ruleset. The new detections are also known as <i>signature rules</i> or simply <i>signatures</i>. They employ the same heuristics as Managed Rules but do not directly apply actions to traffic.</p><p>Each signature is uniquely identified by a Ref ID (similar to the Rule ID for the Managed Ruleset) and is tagged with both <i>category</i> and <i>confidence</i>. The category specifies the attack vectors the signature targets, while the confidence level indicates the likelihood of a false positive (a trigger on legitimate traffic). A rule can have only one confidence level but may have multiple categories. </p><p>Category indicates what attack vector the rule refers to. The list of categories is long, but includes tags like SQLi, XSS, RCE or specific CVE with its number.</p><p>The confidence field is divided into two values, based on whether at least one signature from the corresponding group matches the traffic.</p><table><tr><td><p><b>Confidence</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>High</p></td><td><p>These signatures aim for high true positives and low false positives, typical for CVEs where payloads are identifiable without blocking legitimate traffic. They function like the Managed Ruleset’s default configuration.</p></td></tr><tr><td><p>Medium</p></td><td><p>These signatures, which are turned off by default in the Managed Ruleset, may cause false positives based on your traffic. Before blocking traffic matching these rules, assess their potential application impact.</p></td></tr></table><p>
The detection's analysis of a request populates three fields. These fields are accessible in Security Analytics and Edge Rules Engine, our core engine for Security Rules.</p><table><tr><td><p>Field</p></td><td><p>Description</p></td><td><p>Where can be used</p></td></tr><tr><td><p><code>cf.waf.signature.request.</code><code><b>confidence</b></code></p></td><td><p>Array. Aggregate the confidence scores associated with the matching signatures.</p></td><td><p>Analytics and Security Rules</p></td></tr><tr><td><p><code>cf.waf.signature.request.</code><code><b>categories</b></code></p></td><td><p>Array. Aggregate the categories associated with the matching signatures.</p></td><td><p>Analytics and Security Rules</p></td></tr><tr><td><p><code>cf.waf.signature.request.</code><code><b>ref</b></code></p></td><td><p>Array. Aggregates the Ref IDs of the matching signatures, up to 10.</p></td><td><p>Analytics and Security Rules</p></td></tr></table>
    <div>
      <h3>Analyzing your data in Security Analytics</h3>
      <a href="#analyzing-your-data-in-security-analytics">
        
      </a>
    </div>
    <p>Security Analytics is at the core of the Cloudflare Application Security toolbox, providing a comprehensive, data-driven view of how signatures interact with your web traffic. It gives you the tools necessary to understand, measure, and optimize your web protection. Common use cases for combining Analytics with signatures include: design a security posture during the onboarding process, verify the most frequent attack attempts and create exceptions to handle false positives.</p><p>Once a new application is proxied through Cloudflare, Attack Signature Detection begins populating your dashboard with data. The initial step is to examine the aggregated matches, categorized by type and signature, to confirm that all potential attacks are being blocked. Analysts can do this by reviewing the top statistics for signatures, filtering the data to show whether requests were blocked, served from the cache, or permitted to reach the origin server. If any malicious requests are found to have reached the origin, analysts can quickly implement security rules. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Flwiq3kVd2vHnIT7w30Op/2c9564f636b5e1169228711cd7ff5c15/image6.png" />
          </figure><p><sup><i>A breakdown of the total request volume matching attack signatures, categorized by their corresponding Category or Signature.</i></sup></p><p>Analytics provides insights into attack patterns, such as the most frequent CVEs based on traffic volume over time. This capability is designed for quickly identifying the dominant attack payloads targeting applications and verifying the efficacy of current protections against related CVEs. For example, analysts can monitor the attack frequency targeting a specific part of the application, like <code>/api/</code>, or confirm if known malicious payloads, such as React2Shell, are reaching a particular endpoint, such as the <code>POST /_next/</code> Node.js path. Both the Analytics filters and the Attack Analysis tool can be used to perform this type of investigation.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/PswhIBA7AXI5y6BaH4Rq6/aafe3e2f272d8077ed1454066600da51/image5.png" />
          </figure><p><sup><i>A visualization within Security Analytics offers a time-series view of malicious payloads targeting the /api/ endpoint. This view groups the data to highlight the top five CVEs by volume.</i></sup></p><p>Analytics also help create exceptions and identifying false positives. An increase in matches for a specific rule, for instance, may suggest false positives rather than active exploitation. For example, an application that allows users to submit rich HTML content (such as a Content Management Systems or support ticketing system) may legitimately include markup that matches more generic XSS signatures. In these cases, a scoped exception can be applied to the affected endpoint, while keeping the protection enabled across the rest of the application. </p><p>This approach is especially useful for evaluating medium-confidence signatures, which balance aggressive blocking with false-positive risk. The tool allows "what-if" scenarios against historical traffic to empirically determine production performance. This process helps determine if a medium-confidence signature is appropriate for the overall traffic profile, or if a high rate of false positives requires limiting its deployment to specific URLs or request types. </p><p>Generally, signatures that have a very low match rate on historical traffic can be more safely deployed in block mode without significant disruption to legitimate traffic. To achieve this level of confidence, Security Analytics provides the tools for in-depth forensics investigations.</p><p>Beyond immediate detection, a crucial aspect of defense management is the ability to customize your security posture. The user interface offers a searchable catalog of all security signatures, allowing you to browse the full list and understand the specific threat each is designed to address. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6enXCjehRa8ibfhOoUfnRv/330231e1e7cc96cb1450f0f450d33aab/Screenshot_2026-03-04_at_17.17.59.png" />
          </figure><p><sup><i>A searchable catalog of signatures is available, providing more detail on critical detections to help customers understand the threats and the remediation actions.</i></sup></p>
    <div>
      <h3>Creating security rules</h3>
      <a href="#creating-security-rules">
        
      </a>
    </div>
    <p>After analyzing your data and establishing confidence in how the signatures performed against your past traffic, you can easily create custom rules to handle traffic based on the detections. For example, if you want to create a policy that blocks requests matching high confidence signatures you can create the following rule:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55sYmYsoMh9effxtmxG65j/2ca91e74188ad69a908b5ae69571225c/image1.png" />
          </figure><p><sup><i>Creating a rule to block requests matching with high confidence signatures.</i></sup></p><p>This is equivalent to the Cloudflare Managed Ruleset default deployment.</p><p>If you want to block all requests matching at least one rule, you will add the Medium confidence tag. This is equivalent to enabling all rules of Cloudflare Managed Ruleset. Alternatively, you can configure multiple rules, applying a more stringent action (like "Block") for detections with High confidence and a less strict action (such as "Challenge") for those with Medium confidence.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JhVPtrx2ZRhsNgRQHCaLc/ca3f597d8b794fd5a2eb1ddfc1362288/image8.png" />
          </figure><p><sup><i>By selecting both High and Medium confidence you can trigger a rule if any signature matches.</i></sup></p><p>To create a rule blocking a specific CVE or attack vector, you will use Categories. The rule builder allows you to combine attack vector category tags with all existing HTTP request data. This enables you to create granular rules (or exceptions) and tailor your security posture to different parts of your application. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wEf21sGlDdKkO7Mgt1pVn/01bd915ae33d931ca33bd0b2d04fc9e8/image7.png" />
          </figure><p><sup><i>Customers can create rules to block (or allow) requests matching specific CVEs or attack categories.</i></sup></p><p>To create rules based on a specific Signature, you can use Ref ID. You can find the right Ref ID within the rule builder by exploring the available Attack Signature rules. This is especially useful if you want to create exceptions to manage false positives.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LQ93vHMecuHS8xNbL0RTz/b805072b739f1ded6f4383c13f2cfb5a/image3.png" />
          </figure><p><sup><i>Customers can browse signature rules directly from the rule builder.</i></sup></p>
    <div>
      <h3>What happens to Cloudflare Managed Ruleset?</h3>
      <a href="#what-happens-to-cloudflare-managed-ruleset">
        
      </a>
    </div>
    <p>All customers continue to have access to our classic Managed Ruleset. When Attack Signature Detection is broadly available, customers will be able to choose the deployment model that best suits their needs, whether that is Attack Signature Detection or Managed Rules. Our analyst teams ensure that new detections are released simultaneously across both the Managed Ruleset and Attack Signature Detection.</p>
    <div>
      <h2>Full-Transaction Detection</h2>
      <a href="#full-transaction-detection">
        
      </a>
    </div>
    <p>Traditional web attack detection primarily focuses on the "ask": the HTTP request. However, the request only tells half the story. To know if an attack actually succeeded, you have to look at the "answer": the HTTP response.</p><p>By combining request and response metadata into a single detection event, we can dramatically reduce false positives and identify successful exploits that request-only systems miss.</p><p>For example, consider a request containing a common SQL injection string in a query parameter.</p><blockquote><p><code>GET /user?id=1' UNION SELECT username, password FROM users--</code></p></blockquote><p>A traditional WAF will see the <code>UNION SELECT</code> pattern and block it. However, if the application isn't actually vulnerable, this might be a false positive — for instance a security researcher testing their own site.</p><p>With Full-Transaction Detection, the system notes the SQLi signature in the request but waits for the response. If the origin responds with a <code>500 Internal Server Error</code> or a standard <code>404</code>, the confidence of a "successful exploit" is low. If the origin responds with a <code>200 OK</code> and a body containing a string that matches a "sensitive data" signature (like a list of usernames), the system flags a Successful Exploit Confirmation.</p><p>To start, we are rolling out a few detection categories and plan to expand this list over time. Here are the three areas we are currently focused on, and some of the flags you’ll see:</p><ul><li><p><b>Exploit attempts. </b>The detection provides web attack detections by inspecting the entire HTTP request-to-response cycle. It focuses on three key areas: identifying input exploitation like XSS and SQLi via malicious signatures, stopping automated abuse such as vulnerability probing, and confirming successful exploits by correlating suspicious requests with unusual server responses.</p></li></ul><ul><li><p><b>Data exposure and exfiltration signals. </b>This framework also allows us to catch data exfiltration that looks like legitimate traffic on the way in. A request for /api/v1/export is a standard administrative action. But if that specific request triggers a response containing 5,000 credit card numbers (for example identified via Luhn algorithm signatures), the transaction is flagged as Data Exposure. </p></li></ul><ul><li><p><b>Misconfigurations. </b>Exposed admin interfaces are often attack vectors. Traditional security checks miss this misconfiguration because the traffic itself looks valid (real endpoints or admin pages). The issue isn't the traffic but its public accessibility. We prioritize detection based on common real-world misconfigurations seen in customer data, such as public unauthenticated Elasticsearch clusters, Internet reachable admin panels, and exposed Apache sensitive endpoints.</p></li></ul><p>The detection, much like Attack Signatures, will store the results in two specific fields. These fields are accessible in our dashboard and logged within Security Analytics.</p><table><tr><td><p>Field</p></td><td><p>Description</p></td><td><p>Where can be used</p></td></tr><tr><td><p><code>cf.waf.signature.response.</code><code><b>categories</b></code></p></td><td><p>Array. Aggregate the categories associated with the matching signatures.</p></td><td><p>Security Analytics </p></td></tr><tr><td><p><code>cf.waf.signature.response.</code><code><b>ref</b></code></p></td><td><p>Array. Aggregates the Ref IDs of the matching signatures, up to 10.</p></td><td><p>Security Analytics </p></td></tr></table><p>Initially, we are focused on offering visibility into matching requests via analytics. By surfacing events on potential exploits, we provide customers information that can be used for incident response through targeted remediations across their infrastructure and software stack. Our future plans include extending Security Rules to the response phase, which will empower customers to block responses based on these detections by allowing policy creation.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3uUoiHlxC6qEjBNU1AA5Rg/1402f5be8f412443cf3b9ff39e8d0700/image4.png" />
          </figure><p><sup><i>A diagram illustrating the execution locations and corresponding populated fields for both Attack Signature Detection and Full-Transaction Detection.</i></sup></p>
    <div>
      <h2>Sign up to get access</h2>
      <a href="#sign-up-to-get-access">
        
      </a>
    </div>
    <p>Attack Signature detection is in Early Access while Full-Transaction Detection is under development. <a href="https://www.cloudflare.com/lp/attack-detection"><u>Sign up here</u></a> to get access to Attack Signature, and <a href="https://www.cloudflare.com/lp/full-transaction-detection/"><u>here to express interest</u></a> for Full-Transaction. We’ll gather feedback in the coming months as we prepare these features for General Availability.</p> ]]></content:encoded>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[Managed Rules]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Security Analytics]]></category>
            <guid isPermaLink="false">1oOFMFJ55pkBU09IKiw8fm</guid>
            <dc:creator>Daniele Molteni</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Location-Aware DDoS Protection]]></title>
            <link>https://blog.cloudflare.com/location-aware-ddos-protection/</link>
            <pubDate>Mon, 11 Jul 2022 12:57:54 GMT</pubDate>
            <description><![CDATA[ Location-Aware DDoS Protection is now available in beta for Cloudflare Enterprise customers that are subscribed to the Advanced DDoS service ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We’re thrilled to introduce Cloudflare’s Location-Aware DDoS Protection.</p><p><a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS) attacks</a> are cyber attacks that aim to make your Internet property unavailable by flooding it with more traffic than it can handle. For this reason, attackers usually aim to generate as much attack traffic as they can — from as many locations as they can. With Location-Aware DDoS Protection, we take this <i>distributed</i> characteristic of the attack, that is thought of being advantageous for the attacker, and turn it on its back — making it into a disadvantage.</p><p>Location-Aware DDoS Protection is now available in beta for Cloudflare Enterprise customers that are subscribed to the Advanced DDoS service.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ttg8VXMQfmMLeEAiy9pI7/6194e4700ab620c56bea9828865b8168/image4-2.png" />
            
            </figure>
    <div>
      <h3>Distributed attacks lose their edge</h3>
      <a href="#distributed-attacks-lose-their-edge">
        
      </a>
    </div>
    <p>Cloudflare’s Location-Aware DDoS Protection takes the attacker’s advantage and uses it against them. By learning where your traffic comes from, the system becomes location-aware and constantly asks “Does it make sense for <i>your</i> website?” when seeing new traffic.</p><p>For example, if you operate an <a href="https://www.cloudflare.com/ecommerce/">e-commerce website</a> that mostly serves the German consumer, then most of your traffic would most likely originate from within Germany, some from neighboring European countries, and a decreasing amount as we expand globally to other countries and geographies. If sudden spikes of traffic arrive from unexpected locations outside your main geographies, the system will flag and mitigate the unwanted traffic.</p><p>Location-Aware DDoS Protection also leverages Cloudflare’s <a href="https://developers.cloudflare.com/bots/concepts/bot-score/#machine-learning">Machine Learning models</a> to identify traffic that is likely automated. This is used as an additional signal to provide more accurate protection.</p>
    <div>
      <h3>Enabling Location-Aware Protection</h3>
      <a href="#enabling-location-aware-protection">
        
      </a>
    </div>
    <p>Enterprise customers subscribed to the Advanced DDoS service can customize and enable the Location-Aware DDoS Protection system. By default, the system will only show what it thinks is suspicious traffic based on your last 7-day P95 rates, bucketed by client country and region (recalculated every 24 hours).</p><p>Customers can view what the system flagged in the <a href="https://dash.cloudflare.com/?to=/:account/:zone/security"><b>Security Overview</b> dashboard</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Kb6nbcrtf6KOE4Yi7k4jw/07ebb6b1c838be3adbc4ba1e2fbe008b/image1-4.png" />
            
            </figure><p>Location-Aware DDoS Protection is exposed to customers as a new HTTP DDoS Managed rule within the existing ruleset. To enable it, change the action to <i>Managed Challenge</i> or <i>Block</i>. Customers can adjust its sensitivity level to define how much tolerance you permit for traffic that deviates from your observed geographies. The lower the sensitivity, the higher the tolerance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/yEvUggqYGn2yK8t4QTswP/018b63dfdf8fb95b597a29d499e23661/image5-3.png" />
            
            </figure><p>To learn how to view flagged traffic and how to configure the Location-Aware DDoS Protection, visit our <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/http/location-aware-protection/">developer docs site</a>.</p>
    <div>
      <h3>Making the impact of DDoS attacks a thing of the past</h3>
      <a href="#making-the-impact-of-ddos-attacks-a-thing-of-the-past">
        
      </a>
    </div>
    <p>Our mission at Cloudflare is to help build a better Internet. The DDoS Protection team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. Location-aware protection is only the first step to making Cloudflare’s <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> even more intelligent, sophisticated, and tailored to individual needs.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a> with our Free and Pro <a href="https://www.cloudflare.com/plans/">plans</a> to protect your websites, or <a href="https://www.cloudflare.com/magic-transit/">contact us</a> to learn more about the Enterprise Advanced DDoS Protection package.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Advanced DDoS]]></category>
            <category><![CDATA[Managed Rules]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">4baPBZiCeKjLcASgOUOAQO</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Julien Desgats</dc:creator>
        </item>
        <item>
            <title><![CDATA[WAF for everyone: protecting the web from high severity vulnerabilities]]></title>
            <link>https://blog.cloudflare.com/waf-for-everyone/</link>
            <pubDate>Tue, 15 Mar 2022 12:59:29 GMT</pubDate>
            <description><![CDATA[ We are excited to provide our new Cloudflare Web Application Firewall, with a Free Managed Ruleset to all Cloudflare users ]]></description>
            <content:encoded><![CDATA[ <p></p><p>At Cloudflare, we like disruptive ideas. Pair that with our core belief that security is something that should be accessible to everyone and the outcome is a better and safer Internet for all.</p><p>This isn’t idle talk. For example, back in 2014, we announced <a href="/introducing-universal-ssl/">Universal SSL</a>. Overnight, we provided SSL/TLS encryption to over one million Internet properties <a href="https://www.cloudflare.com/application-services/products/ssl/">without anyone having to pay a dime</a>, or configure a certificate. This was good not only for our customers, but also for everyone using the web.</p><p>In 2017, we announced <a href="/unmetered-mitigation/">unmetered DDoS mitigation</a>. We’ve never asked customers to pay for DDoS bandwidth as it never felt right, but it took us some time to reach the network size where we could offer completely unmetered mitigation for everyone, paying customer or not.</p><p>Still, I often get the question: how do we do this? It’s simple really. We do it by building great, efficient technology that scales well—and this allows us to keep costs low.</p><p><b><i>Today, we’re doing it again, by providing a Cloudflare WAF (Web Application Firewall) Managed Ruleset to all </i></b><a href="https://www.cloudflare.com/plans/"><b><i>Cloudflare plans</i></b></a><b><i>, free of charge.</i></b></p>
    <div>
      <h3>Why are we doing this?</h3>
      <a href="#why-are-we-doing-this">
        
      </a>
    </div>
    <p>High profile vulnerabilities have a major impact across the Internet affecting organizations of all sizes. We’ve <a href="/tag/log4j/">recently seen this with Log4J</a>, but even before that, major vulnerabilities such as <a href="/inside-shellshock/">Shellshock</a> and <a href="/tag/heartbleed/">Heartbleed</a> have left scars across the Internet.</p><p>Small application owners and teams don’t always have the time to keep up with fast moving security related patches, causing many applications to be compromised and/or used for nefarious purposes.</p><p>With millions of Internet properties behind the Cloudflare proxy, we have a duty to help keep the web safe. And that is what we did with Log4J by <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">deploying mitigation rules</a> for all traffic, including FREE zones. We are now formalizing our commitment by providing a Cloudflare Free Managed Ruleset to all plans on top of our new WAF engine.</p>
    <div>
      <h3>When are we doing this?</h3>
      <a href="#when-are-we-doing-this">
        
      </a>
    </div>
    <p>If you are on a <a href="www.cloudflare.com/plans/free/">FREE plan</a>, you are already receiving protection. Over the coming months, all our FREE zone plan users will also receive access to the <a href="https://www.cloudflare.com/waf/">Cloudflare WAF</a> user interface in the dashboard and will be able to deploy and configure the new ruleset. This ruleset will provide mitigation rules for high profile vulnerabilities such as Shellshock and Log4J among others.</p><p>To access our broader set of WAF rulesets (Cloudflare Managed Rules, Cloudflare OWASP Core Ruleset and Cloudflare Leaked Credential Check Ruleset) along with advanced WAF features, customers will still have to upgrade to PRO or higher <a href="https://www.cloudflare.com/plans/">plans</a>.</p>
    <div>
      <h3>The Challenge</h3>
      <a href="#the-challenge">
        
      </a>
    </div>
    <p>With over 32 million HTTP requests per second being proxied by the Cloudflare global network, running the WAF on every single request is no easy task.</p><p><a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAFs</a> secure all HTTP request components, including bodies, by running a set of rules, sometimes referred as signatures, that look for specific patterns that could represent a malicious payload. These rules vary in complexity, and the more rules you have, the harder the system is to optimize. Additionally, many rules will take advantage of regex capabilities, allowing the author to perform complex matching logic.</p><p>All of this needs to happen with a negligible latency impact, as security should not come with a performance penalty and many application owners come to Cloudflare for performance benefits.</p><p>By leveraging our new Edge Rules Engine, on top of which the <a href="/new-cloudflare-waf/">new WAF has been built on</a>, we have been able to reach the performance and memory milestones that make us feel comfortable and that allow us to provide a good baseline WAF protection to everyone. Enter the new Cloudflare Free Managed Ruleset.</p>
    <div>
      <h3>The Free Cloudflare Managed Ruleset</h3>
      <a href="#the-free-cloudflare-managed-ruleset">
        
      </a>
    </div>
    <p>This ruleset is automatically deployed on any new Cloudflare zone and is specially designed to reduce false positives to a minimum across a very broad range of traffic types. Customers will be able to disable the ruleset, if necessary, or configure the traffic filter or individual rules. As of today, the ruleset contains the following rules:</p><ul><li><p>Log4J rules matching payloads in the URI and HTTP headers;</p></li><li><p>Shellshock rules;</p></li><li><p>Rules matching very common WordPress exploits;</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ooomtu9SplFlHMJIY0Bu4/727fde44302b99b52ee3834cb6a1ef26/image1-28.png" />
            
            </figure><p>Whenever a rule matches, an event will be generated in the Security Overview tab, allowing you to inspect the request.</p>
    <div>
      <h3>Deploying and configuring</h3>
      <a href="#deploying-and-configuring">
        
      </a>
    </div>
    <p>For all new FREE zones, the ruleset will be automatically deployed. The rules are battle tested across the Cloudflare network and are safe to deploy on most applications out of the box. Customers can, in any case, configure the ruleset further by:</p><ul><li><p>Overriding all rules to LOG or other action.</p></li><li><p>Overriding specific rules only to LOG or other action.</p></li><li><p>Completely disabling the ruleset or any specific rule.</p></li></ul><p>All options are easily accessible via the <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/waf/managed-rules">dashboard</a>, but can also be performed via API. Documentation on how to configure the ruleset, once it is available in the UI, will be found on our <a href="https://developers.cloudflare.com/waf/managed-rulesets/">developer site</a>.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>The Cloudflare Free Managed Ruleset will be updated by Cloudflare whenever a relevant wide-ranging vulnerability is discovered. Updates to the ruleset will be published on our <a href="https://developers.cloudflare.com/waf/change-log">change log</a>,  like that customers can keep up to date with any new rules.</p><p>We love building cool new technology. But we also love making it widely available and easy to use. We’re really excited about making the web much safer for everyone with a WAF that won’t cost you a dime. If you’re interested in getting started, <a href="https://dash.cloudflare.com/sign-up">just head over here</a> to sign up for our free plan.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Managed Rules]]></category>
            <category><![CDATA[Free]]></category>
            <guid isPermaLink="false">2NmYHeZZxUmMFLjkVaSx7U</guid>
            <dc:creator>Michael Tremante</dc:creator>
        </item>
        <item>
            <title><![CDATA[CVE-2022-26143: A Zero-Day vulnerability for launching UDP amplification DDoS attacks]]></title>
            <link>https://blog.cloudflare.com/cve-2022-26143-amplification-attack/</link>
            <pubDate>Tue, 08 Mar 2022 15:22:13 GMT</pubDate>
            <description><![CDATA[ A zero-day vulnerability in the Mitel MiCollab business phone system has recently been discovered (CVE-2022-26143). This vulnerability, called TP240PhoneHome, which Cloudflare customers are already protected against, can be used to launch UDP amplification attacks ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6eQV6PQHDh8jsTmebq0aYh/d12ea39e4715d439d2fd829ec8c37970/image3-2.png" />
            
            </figure><p>A <a href="https://www.cloudflare.com/learning/security/threats/zero-day-exploit/">zero-day vulnerability</a> in the <a href="https://www.mitel.com/products/applications/collaboration/micollab">Mitel MiCollab</a> business phone system has recently been discovered (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26143">CVE-2022-26143</a>). This vulnerability, called TP240PhoneHome, which Cloudflare customers are already protected against, can be used to launch UDP amplification attacks. This type of attack reflects traffic off vulnerable servers to victims, amplifying the amount of traffic sent in the process <b>by an amplification factor of 220 billion percent</b> in this specific case.</p><p>Cloudflare has been actively involved in investigating the TP240PhoneHome exploit, along with other members of the InfoSec community. <a href="/cve-2022-26143/">Read our joint disclosure here for more details</a>. As far as we can tell, the vulnerability has been exploited as early as February 18, 2022. We have deployed emergency mitigation rules to protect Cloudflare customers against the amplification DDoS attacks.</p><p>Mitel has been informed of the vulnerability. As of February 22, they have issued a high severity <a href="https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0001">security advisory</a> advising their customers to block exploitation attempts using a firewall, until a software patch is made available. Cloudflare <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> customers can use the <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a> to block external traffic to the exposed Mitel UDP port 10074 by following the example in the screenshot below, or by pasting the following expression into their Magic Firewall rule editor and selecting the <i>Block</i> action:</p><p><code>(udp.dstport eq 10074)</code>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2THwFEkTMEVxP01OI4EbEl/3a708a27e4a28435aa34bc8977e8a8cd/image1-4.png" />
            
            </figure><p>Creating a Magic Firewall rule to block traffic to port 10074</p><p>To learn more, register for our <a href="https://event.on24.com/wcc/r/3689260/FDF7748F92652EA50A2447619373709B?partnerref=announcement-blog">webinar</a> on March 23rd, 2022.</p>
    <div>
      <h3>Exploiting the vulnerability to launch DDoS attacks</h3>
      <a href="#exploiting-the-vulnerability-to-launch-ddos-attacks">
        
      </a>
    </div>
    <p>Mitel Networks is based in Canada and provides business communications and collaboration products to over 70 million business users around the world. Amongst their enterprise collaboration products is the aforementioned Mitel MiCollab platform, known to be used in critical infrastructure such as municipal governments, schools, and emergency services. The vulnerability was discovered in the Mitel MiCollab platform.</p><p>The vulnerability manifests as an unauthenticated UDP port that is incorrectly exposed to the public Internet. The call control protocol running on this port can be used to, amongst other things, issue the debugging command <code>startblast</code>. This command does not place real telephone calls; rather, it simulates a “blast” of calls in order to test the system. For each test call that is made, two UDP packets are emitted in response to the issuer of the command.</p><p>According to the security advisory, the exploit can “<i>allow a malicious actor to gain unauthorized access to sensitive information and services, cause performance degradations or a denial of service condition on the affected system. If exploited with a denial of service attack, the impacted system may cause significant outbound traffic impacting availability of other services.</i>”</p><p>Since this is an unauthenticated and connectionless UDP-based protocol, you can use <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofing</a> to direct the response traffic toward any IP and port number — and by doing so, reflect and amplify a DDoS attack to the victim.</p><p>We’ve mainly focused on the amplification vector because it can be used to hurt the whole Internet, but the phone systems themselves can likely be hurt in other ways with this vulnerability. This UDP call control port offers many other commands. With some work, it’s likely that you could use this UDP port to commit <a href="https://www.twilio.com/learn/voice-and-video/toll-fraud">toll fraud</a>, or to simply render the phone system inoperable. We haven’t assessed these other possibilities, because we do not have access to a device that we can safely test with.</p>
    <div>
      <h3>The good news</h3>
      <a href="#the-good-news">
        
      </a>
    </div>
    <p>Fortunately, only a few thousand of these devices are improperly exposed to the public Internet, meaning that this vector can “only” achieve several hundred million packets per second total. This volume of traffic can cause major outages if you’re not protected by an <a href="https://www.cloudflare.com/ddos/">always-on automated DDoS protection service</a>, but it’s nothing to be concerned with if you are.</p><p>Furthermore, an attacker can't run multiple commands at the same time. Instead, the server queues up commands and executes them serially. The fact that you can only launch one attack at a time from these devices, mixed with the fact that you can make that attack for many hours, has fascinating implications. If an attacker chooses to start an attack by specifying a very large number of packets, then that box is “burned” – it can’t be used to attack anyone else until the attack completes.</p>
    <div>
      <h3>How Cloudflare detects and mitigates DDoS attacks</h3>
      <a href="#how-cloudflare-detects-and-mitigates-ddos-attacks">
        
      </a>
    </div>
    <p>To defend organizations against DDoS attacks, we built and operate software-defined systems that run autonomously. They automatically detect and mitigate DDoS attacks across our entire network.</p><p>Initially, traffic is routed through the Internet via <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">BGP Anycast</a> to the nearest Cloudflare edge data center. Once the traffic reaches our data center, our DDoS systems sample it asynchronously allowing for out-of-path analysis of traffic without introducing latency penalties.</p><p>The analysis is done using data streaming algorithms. Packet samples are compared to the fingerprints and multiple real-time signatures are created based on the dynamic masking of various fingerprint attributes. Each time another packet matches one of the signatures, a counter is increased. When the system qualifies an attack, i.e., the activation threshold is reached for a given signature, a mitigation rule is compiled and pushed inline. The mitigation rule includes the real-time signature and the mitigation action, e.g., drop.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zML76BvtkeFIWND7V7QuD/e033760800f2b97817e9851a1e34d49c/image2-5.png" />
            
            </figure><p>You can read more about our autonomous DDoS protection systems and how they work in our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">joint-disclosure technical blog post</a>.</p>
    <div>
      <h3>Helping build a better Internet</h3>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks and emerging zero-day threats. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. To counter the attacker’s advantage, we want to make sure that it is also easy and free for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Managed Rules]]></category>
            <category><![CDATA[Mitel]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">5rrIE6ZZvuppBrAySzDiyH</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Alex Forster</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to customize your layer 3/4 DDoS protection settings]]></title>
            <link>https://blog.cloudflare.com/l34-ddos-managed-rules/</link>
            <pubDate>Thu, 09 Dec 2021 13:59:16 GMT</pubDate>
            <description><![CDATA[ Cloudflare Enterprise customers using the Magic Transit and Spectrum services can now tune and tweak their L3/4 DDoS protection settings directly from the Cloudflare dashboard or via the Cloudflare API. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XAmgCsMHnrtq7ExJ8f80q/b6e9f311a614523ffbf7a91a47d96199/image2-28.png" />
            
            </figure><p>After initially providing our customers <a href="/http-ddos-managed-rules/">control over the HTTP-layer DDoS protection settings earlier this year</a>, we’re now excited to extend the control our customers have to the packet layer. Using these new controls, Cloudflare Enterprise customers using the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> services can now tune and tweak their L3/4 DDoS protection settings directly from the Cloudflare dashboard or via the Cloudflare API.</p><p>The new functionality provides customers control over two main DDoS rulesets:</p><ol><li><p><b>Network-layer DDoS Protection</b> <b>ruleset</b> — This ruleset includes rules to detect and mitigate DDoS attacks on layer 3/4 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a> such as UDP floods, SYN-ACK reflection attacks, SYN Floods, and DNS floods. This ruleset is available for Spectrum and Magic Transit customers on the Enterprise plan.</p></li><li><p><b>Advanced TCP Protection</b> <b>ruleset</b> — This ruleset includes rules to detect and mitigate sophisticated out-of-state TCP attacks such as spoofed ACK Floods, Randomized SYN Floods, and distributed SYN-ACK Reflection attacks. This ruleset is available for Magic Transit customers only.</p></li></ol><p>To learn more, review our <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets">DDoS Managed Ruleset developer documentation</a>. We’ve put together a few guides that we hope will be helpful for you:</p><ol><li><p><a href="https://developers.cloudflare.com/ddos-protection/get-started">Onboarding &amp; getting started with Cloudflare DDoS protection</a></p></li><li><p><a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adjust-rules/false-negative">Handling false negatives</a></p></li><li><p><a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adjust-rules/false-positive">Handling false positives</a></p></li><li><p><a href="https://developers.cloudflare.com/ddos-protection/best-practices/third-party">Best practices when using VPNs, VoIP, and other third-party services</a></p></li><li><p><a href="https://developers.cloudflare.com/ddos-protection/reference/simulate-ddos-attack">How to simulate a DDoS attack</a></p></li></ol>
    <div>
      <h2>Cloudflare’s DDoS Protection</h2>
      <a href="#cloudflares-ddos-protection">
        
      </a>
    </div>
    <p>A <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS) attack</a> is a type of cyberattack that aims to disrupt the victim’s Internet services. There are many types of DDoS attacks, and they can be generated by attackers at different layers of the Internet. One example is the <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP flood</a>. It aims to disrupt HTTP application servers such as those that power mobile apps and websites. Another example is the <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP flood</a>. While this type of attack can be used to disrupt HTTP servers, it can also be used in an attempt to disrupt non-HTTP applications. These include TCP-based and UDP-based applications, networking services such as <a href="/update-on-voip-attacks/">VoIP services</a>, gaming servers, cryptocurrency, and more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C1TrYyVltpMud4OWi3UgR/693f024b661f0a5231e2a0579360468a/image5-12.png" />
            
            </figure><p>To defend organizations against DDoS attacks, we built and operate software-defined systems that run autonomously. They automatically detect and mitigate DDoS attacks across our entire network. You can read more about our autonomous <a href="https://www.cloudflare.com/ddos/">DDoS protection systems</a> and how they work in our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">deep-dive technical blog post</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/zVNe9hiMYUaf1DcZzxP2t/281a3ae7d02c862e830cef6e480c7bca/unnamed-33.png" />
            
            </figure>
    <div>
      <h2>Unmetered and unlimited DDoS Protection</h2>
      <a href="#unmetered-and-unlimited-ddos-protection">
        
      </a>
    </div>
    <p>The level of protection that we offer is <a href="/unmetered-mitigation/">unmetered and unlimited</a> — It is not bounded by the size of the attack, the number of the attacks, or the duration of the attacks. This is especially important these days because as we’ve recently seen, attacks are getting larger and more frequent. Consequently, in Q3, network-layer attacks increased by 44% compared to the previous quarter. Furthermore, just recently, our systems automatically detected and mitigated a <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">DDoS attack that peaked just below 2 Tbps</a> — the largest we’ve seen to date.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FDNWzHw3jIcywi8qMcKlq/60fd4b3b9bf13f144c9e72ab8a9c1ba9/image4.jpg" />
            
            </figure><p>Mirai botnet launched an almost 2 Tbps DDoS attack</p><p>Read more about <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q3">recent DDoS trends</a>.</p>
    <div>
      <h2>Managed Rulesets</h2>
      <a href="#managed-rulesets">
        
      </a>
    </div>
    <p>You can think of our autonomous DDoS protection systems as groups (rulesets) of intelligent rules. There are rulesets of HTTP DDoS Protection rules, Network-layer DDoS Protection rules and Advanced TCP Protection rules. In this blog post, we will cover the latter two rulesets. We’ve already covered the former in the blog post <a href="/http-ddos-managed-rules/">How to customize your HTTP DDoS protection settings</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/38zn08I5UIGe7IvmFb5aIT/6dac7a5d5ac1ab875410d6e77d765a14/image7-6.png" />
            
            </figure><p>Cloudflare L3/4 DDoS Managed Rules</p><p>In the <b>Network-layer DDoS Protection rulesets</b>, each rule has a unique set of conditional fingerprints, dynamic field masking, activation thresholds, and mitigation actions. These rules are managed (by Cloudflare), meaning that the specifics of each rule is curated in-house by our DDoS experts. Before deploying a new rule, it is first rigorously tested and optimized for mitigation accuracy and efficiency across our entire global network.</p><p>In the <b>Advanced TCP Protection ruleset</b>, we use a novel TCP state classification engine to identify the state of TCP flows. The engine powering this ruleset is <i>flowtrackd</i> — you can read more about it in our <a href="/announcing-flowtrackd/">announcement blog post</a>. One of the unique features of this system is that it is able to operate using only the ingress (inbound) packet flows. The system sees only the ingress traffic and is able to drop, challenge, or allow packets based on their legitimacy. For example, a flood of ACK packets that don’t correspond to open TCP connections will be dropped.</p>
    <div>
      <h2>How attacks are detected and mitigated</h2>
      <a href="#how-attacks-are-detected-and-mitigated">
        
      </a>
    </div>
    
    <div>
      <h3>Sampling</h3>
      <a href="#sampling">
        
      </a>
    </div>
    <p>Initially, traffic is routed through the Internet via <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">BGP Anycast</a> to the nearest Cloudflare edge data center. Once the traffic reaches our data center, our DDoS systems sample it asynchronously allowing for out-of-path analysis of traffic without introducing latency penalties. The Advanced TCP Protection ruleset needs to view the entire packet flow and so it sits inline for Magic Transit customers only. It, too, does not introduce any latency penalties.</p>
    <div>
      <h3>Analysis &amp; mitigation</h3>
      <a href="#analysis-mitigation">
        
      </a>
    </div>
    <p>The analysis for the <b>Advanced TCP Protection ruleset</b> is straightforward and efficient. The system qualifies TCP flows and tracks their state. In this way, packets that don’t correspond to a legitimate connection and its state are dropped or challenged. The mitigation is activated only above certain thresholds that customers can define.</p><p>The analysis for the <b>Network-layer DDoS Protection ruleset</b> is done using data streaming algorithms. Packet samples are compared to the conditional fingerprints and multiple real-time signatures are created based on the dynamic masking. Each time another packet matches one of the signatures, a counter is increased. When the activation threshold is reached for a given signature, a mitigation rule is compiled and pushed inline. The mitigation rule includes the real-time signature and the mitigation action, e.g., drop.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fZ5yjyahUgG57t6OeKuNW/3bff52421a5f96a64c41a0573bf7fcba/image9-1.png" />
            
            </figure>
    <div>
      <h3>​​​​Example</h3>
      <a href="#example">
        
      </a>
    </div>
    <p>As a simple example, one fingerprint could include the following fields: source IP, source port, destination IP, and the TCP sequence number. A packet flood attack with a fixed sequence number would match the fingerprint and the counter would increase for every packet match until the activation threshold is exceeded. Then a mitigation action would be applied.</p><p>However, in the case of a <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> attack where the source IP addresses and ports are randomized, we would end up with multiple signatures for each combination of source IP and port. Assuming a sufficiently randomized/distributed attack, the activation thresholds would not be met and mitigation would not occur. For this reason, we use dynamic masking, i.e. ignoring fields that may not be a strong indicator of the signature. By masking (ignoring) the source IP and port, we would be able to match all the attack packets based on the unique TCP sequence number regardless of how randomized/distributed the attack is.</p>
    <div>
      <h3>Configuring the DDoS Protection Settings</h3>
      <a href="#configuring-the-ddos-protection-settings">
        
      </a>
    </div>
    <p>For now, we’ve only exposed a handful of the Network-layer DDoS protection rules that we’ve identified as the ones most prone to customizations. We will be exposing more and more rules on a regular basis. This shouldn’t affect any of your traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WfQ9IUiHT6kl2R6i2fsu4/d422a01101609b28f3f61c29bae31ebc/image8-4.png" />
            
            </figure><p>Overriding the sensitivity level and mitigation action</p><p>For the <b>Network-layer DDoS Protection ruleset</b>, for each of the available rules, you can override the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/override-parameters#sensitivity-level">sensitivity level</a> (activation threshold), customize the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/override-parameters#action">mitigation action</a>, and apply <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/fields">expression filters</a> to exclude/include traffic from the DDoS protection system based on various packet fields. You can create multiple overrides to customize the protection for your network and your various applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4S7gQPtUwI4ksZFqre6wvy/844f25450258c041d5693ac993f660cb/image3-22.png" />
            
            </figure><p>Configuring expression fields for the DDoS Managed Rules to match on</p><p>In the past, you’d have to go through our support channels to customize the rules. In some cases, this may have taken longer to resolve than desired. With today’s announcement, you can tailor and fine-tune the settings of our autonomous edge system by yourself to quickly improve the accuracy of the protection for your specific network needs.</p><p>For the <b>Advanced TCP Protection ruleset</b>, for now, we’ve only exposed the ability to enable or disable it as a whole in the dashboard. To enable or disable the ruleset per IP prefix, you must use <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/configure-api">the API</a>. At this time, when initially onboarding to Cloudflare, the Cloudflare team must first create a policy for you. After onboarding, if you need to change the sensitivity thresholds, use Monitor mode, or add filter expressions you must contact Cloudflare Support. In upcoming releases, this too will be available via the dashboard and API without requiring help from our Support team.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1UG7jeJmxbiKYel0U9qRol/dcf3d05fc6a7a69f975ffe70d4cde261/image1-45.png" />
            
            </figure>
    <div>
      <h2>Pre-existing customizations</h2>
      <a href="#pre-existing-customizations">
        
      </a>
    </div>
    <p>If you previously contacted Cloudflare Support to apply customizations, your customizations have been preserved, and you can visit the dashboard to view the settings of the Network-layer DDoS Protection ruleset and change them if you need. If you require any changes to your Advanced TCP Protection customizations, please reach out to Cloudflare Support.</p><p>If so far you didn't have the need to customize this protection, there is no action required on your end. However, if you would like to view and customize your DDoS protection settings, follow <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/configure-dashboard">this dashboard guide</a> or review the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/configure-api">API documentation</a> to programmatically configure the DDoS protection settings.</p>
    <div>
      <h2>Helping Build a Better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, everything we do is guided by our mission to help build a better Internet. The DDoS team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. Our first step was to build the autonomous systems that detect and mitigate attacks independently. Done. The second step was to expose the control plane over these systems to our customers (announced today). Done. The next step will be to fully automate the configuration with an auto-pilot feature — training the systems to learn your specific traffic patterns to automatically optimize your DDoS protection settings. You can expect many more improvements, automations, and new capabilities to keep your Internet properties safe, available, and performant.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Managed Rules]]></category>
            <category><![CDATA[dosd]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Spectrum]]></category>
            <guid isPermaLink="false">31YKEgNs7eGl1f4G22B5o2</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to customize your HTTP DDoS protection settings]]></title>
            <link>https://blog.cloudflare.com/http-ddos-managed-rules/</link>
            <pubDate>Mon, 20 Sep 2021 12:59:20 GMT</pubDate>
            <description><![CDATA[ We’re excited to announce the availability of the HTTP DDoS Managed Ruleset. This new feature allows Cloudflare customers to independently tailor their HTTP DDoS protection settings.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7o7W9D8M4TVhHLooN2QqJV/d913c62caf374cb832f205253344e3cd/customize-your-HTTP-DDoS-protection-settings-1.png" />
            
            </figure><p>We’re excited to announce the availability of the <b>HTTP DDoS Managed Ruleset</b>. This new feature allows Cloudflare customers to independently tailor their HTTP DDoS protection settings. Whether you’re on the <a href="https://www.cloudflare.com/plans/free/">Free plan</a> or the Enterprise plan, you can now tweak and optimize the settings directly from within the Cloudflare dashboard or via API.</p><p>We expect that in most cases, Cloudflare customers won't need to customize any settings. Our mission is to make DDoS disruptions a thing of the past, with no customer overhead. To achieve this mission we’re constantly investing in our automated detection and mitigation systems. In some rare cases, there is a need to make some configuration changes, and so now, Cloudflare customers can customize those protection mechanisms independently. The next evolutionary step is to make those settings learn and auto-tune themselves for our customers, based on their unique traffic patterns. Zero-touch <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> at scale.</p>
    <div>
      <h2>Unmetered DDoS Protection</h2>
      <a href="#unmetered-ddos-protection">
        
      </a>
    </div>
    <p>Back in 2017, we <a href="/unmetered-mitigation/">announced</a> that we will never kick a customer off of our network because they face large attacks, even if they are not paying us at all (i.e., using the Free plan). Furthermore, we committed to never charge a customer for DDoS attack traffic — no matter the size and duration of the attack. Just this summer, our systems automatically detected and mitigated one of the <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">largest DDoS attacks of all time</a>. As opposed to other vendors, Cloudflare customers don’t need to request a service credit for the attack traffic: we simply exclude DDoS traffic from our billing systems. This is done automatically, just like our attack detection and mitigation mechanisms.</p>
    <div>
      <h2>Autonomous DDoS Protection</h2>
      <a href="#autonomous-ddos-protection">
        
      </a>
    </div>
    <p>Our unmetered DDoS protection commitment is possible due to our <a href="/250-cities-is-just-the-start/">ongoing investment in our network and technology stack</a>. The global coverage and capacity of <a href="https://www.cloudflare.com/network/">our network</a> allows us to absorb the largest attacks ever recorded, without manual intervention. Using <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">BGP Anycast</a>, traffic is routed to the closest Cloudflare edge data center as a form of global inter-data center load balancing. Traffic is then load balanced efficiently inside the data center between servers with the help of <a href="/unimog-cloudflares-edge-load-balancer/">Unimog</a>, our home-grown L4 load balancer, to ensure that traffic arrives at the least loaded server. Then, each server scans for malicious traffic and, if detected, applies mitigations in the most optimal location in the tech stack. Each server detects and mitigates attacks completely autonomously without requiring any centralized consensus, and shares details with each other using multicast. This is done using our proprietary <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">autonomous edge detection and mitigation system</a>, and this is how we’re able to continue offering unmetered DDoS protection for free at the scale we operate at.</p>
    <div>
      <h2>Configurable DDoS Protection</h2>
      <a href="#configurable-ddos-protection">
        
      </a>
    </div>
    <p>Our autonomous systems use a set of dynamic rules that scan for attack patterns, known attack tools, suspicious patterns, protocol violations, requests causing large amounts of origin errors, excessive traffic hitting the origin/cache, and additional attack vectors. Each rule has a predefined sensitivity level and default action that varies based on the rule’s confidence that the traffic is indeed part of an attack.</p><p>But how do we determine those confidence levels? The answer to that depends on each specific rule and what that rule is looking for. Some rules look for the patterns in HTTP attributes that are generated by known attack tools and botnets, known protocol violations and other general suspicious patterns and traffic abnormalities. If a given rule is searching for the HTTP patterns of known attack tools, then once found, the likelihood (i.e., confidence) that this traffic is part of an attack is high, and we can therefore safely block all the traffic that matches that rule. However, in other cases, the detected patterns or abnormal activity might resemble an attack but can actually be caused by faulty applications that generate abnormal HTTP calls, misbehaving API clients that flood their origin server, and even legitimate traffic that naively violates protocol standards. In those cases, we might want to rate-limit the traffic that matches the rule or serve a challenge action to verify and allow legitimate users in while blocking bad bots and attackers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30T2iIuSDEIH80XF4pJfF4/a14c6c9b3e2ebfe76a92c795bb6627a2/image1-26.png" />
            
            </figure>
    <div>
      <h3>Configuring the DDoS Protection Settings</h3>
      <a href="#configuring-the-ddos-protection-settings">
        
      </a>
    </div>
    <p>In the past, you’d have to go through our support channels to customize any of the default actions and sensitivity levels. In some cases, this may have taken longer to resolve than desired. With today’s release, you can tailor and fine-tune the settings of our autonomous edge system by yourself to quickly improve the accuracy of the protection for your specific application needs.</p><p>If you previously contacted Cloudflare Support to apply customizations, the DDoS Ruleset has been set to Essentially off or Low for your zone, based on your existing customization. You can visit the dashboard to view the settings and change them if you need.</p><p>If you’ve requested to exclude or bypass the mitigations for specific HTTP attributes or IPs, or if you’ve requested a significantly high threshold that requires Cloudflare approval, then those customizations are still active but may not yet be visible in the dashboard.</p><p>If you haven't experienced this issue previously, there is no action required on your end. However, if you would like to customize your DDoS protection settings, go directly to the <a href="http://dash.cloudflare.com/?to=/:account/:zone/firewall/ddos">DDoS tab</a> or follow these steps:</p><ol><li><p>Log in to the <a href="https://dash.cloudflare.com/">Cloudflare dashboard</a>, and select your account and website.</p></li><li><p>Go to <b>Firewall</b> &gt; <b>DDoS</b>.</p></li><li><p>Next to <b>HTTP DDoS attack protection</b>, click <b>Configure</b>.</p></li><li><p>In <b>Ruleset configuration</b>, select the <b>action</b> and <b>sensitivity</b> values for all the rules in the HTTP DDoS Managed Ruleset.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1pehLd2xjlPRmw1CwrwTGr/749b125f13e70b0cc74de474ad98b654/image6-19.png" />
            
            </figure><p>Alternatively, follow the <a href="https://developers.cloudflare.com/waf/ddos-l7-mitigation">API documentation</a> to programmatically configure the DDoS protection settings.</p><p>In the configuration page, you can select a different <b>Action</b> and <b>Sensitivity Level</b> to override all the DDoS protection rules as a group of rules (i.e., the “ruleset”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/44KWtruDG6g87b9QXwi3AW/4f5d1ca3cf517536d370fc5bb3a8b4e7/image9-4.png" />
            
            </figure><p>Alternatively, you can click <b>Browse Rules</b> to override specific rules, rather than all of them as a set of rules.</p>
    <div>
      <h3>Mitigation Action</h3>
      <a href="#mitigation-action">
        
      </a>
    </div>
    <p>The mitigation action defines what action to take when the mitigation rule is applied. Our systems constantly analyze traffic and track potentially malicious activity. When certain request-per-second thresholds exceed the configured sensitivity level, a mitigation rule with a dynamically generated signature will be applied to mitigate the attack. The default mitigation action can vary according to the specific rule. A rule with less confidence may apply a <b>Challenge</b> action as a form of soft mitigation, and a rule with a <b>Block</b> action is applied when there is higher confidence that the traffic is part of an attack — as a form of a stricter mitigation action.</p><p>The available values for the action are:</p><ul><li><p>Block</p></li><li><p>Challenge (CAPTCHA)</p></li><li><p>Log</p></li><li><p>Use Rule Defaults</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/729xHGkm51RcvOr23QP0WQ/90dcc89051d6d7c73ed789a81d8cbf98/image3-29.png" />
            
            </figure><p>Some examples of when you may want to change the mitigation action include:</p><ul><li><p><b>Safer onboarding</b>: You’re onboarding a new HTTP application which has odd traffic patterns, naively violates protocol standards or causes spiky behavior. In this case, you can set the action to <b>Log</b> and see what traffic our systems flag. Afterwards, you can make the necessary changes to the sensitivity levels as required and switch the mitigation action back to the default.</p></li><li><p><b>Stricter mitigation</b>: A DDoS attack has been detected but a Rate-limit or Challenge action have been applied due to the rule’s default logic. However, in this specific case, you’re sure that this is malicious traffic, so you can change the action to <b>Block</b> for a more complete mitigation.</p></li></ul>
    <div>
      <h3>Mitigation Sensitivity</h3>
      <a href="#mitigation-sensitivity">
        
      </a>
    </div>
    <p>The sensitivity level defines when the mitigation rule is applied. Our systems constantly analyze traffic and track potentially malicious activity. When certain request-per-second thresholds are crossed, a mitigation rule with a dynamically generated signature will be applied to mitigate the attack. Toggling the sensitivity levels allows you to define <i>when</i> the mitigation is applied. The higher the sensitivity, the faster the mitigation is applied. The available values for sensitivity are:</p><ol><li><p>High (default)</p></li><li><p>Medium</p></li><li><p>Low</p></li><li><p>Essentially Off</p></li></ol><p><b>Essentially Off</b> means that we’ve set an exceptionally low sensitivity level so in most cases traffic won't be mitigated for you. However, attack traffic will be mitigated at exceptional levels to ensure the safety and stability of the Cloudflare network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7i68eRgtZYSsj2VO3SKSS3/c153ed1e0d347b2613c1ac98c2a8ceee/image10-4.png" />
            
            </figure><p>Some examples of when you may want to change the sensitivity action include:</p><ul><li><p><b>Avoid impact to legitimate traffic</b>: One of the rules has applied mitigation to your legitimate traffic due to a suspicious pattern. In this case, you may want to reduce the rule sensitivity to avoid recurrence of the issue and negative impact to your traffic.</p></li><li><p><b>Legacy applications</b>: One of your legacy HTTP applications is violating protocol standards, or you may have mistakenly introduced a bug into your mobile application/API client. These cases may result in abnormal traffic activity that may be flagged by our systems. In such a case, you can select the <b>Essentially Off</b> sensitivity level until you’ve resolved the issue on your end, to avoid false positives.</p></li></ul>
    <div>
      <h3>Overriding Specific Rules</h3>
      <a href="#overriding-specific-rules">
        
      </a>
    </div>
    <p>As mentioned above, you can also select a specific rule to override its action and sensitivity levels. The per-rule override takes priority over the ruleset override.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eiS4lfKkJ4abPHsdl79uv/d778ee3828358573742922d1881c1b33/image2-31.png" />
            
            </figure><p>When configuring per-rule overrides, you’ll see that some rules have a <b>DDoS Dynamic</b> action. This means that the mitigation is multi-staged and will apply different mitigation actions depending on various factors including attack type, request characteristics, and various other factors. This dynamic action can also be overridden if you choose to do so.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/160CcAEAJIkDbCmp9GrkSU/13a0cd889d740ad6c916b9bce4657801/image7-7.png" />
            
            </figure>
    <div>
      <h2>DDoS Attack Analytics</h2>
      <a href="#ddos-attack-analytics">
        
      </a>
    </div>
    <p>When a DDoS attack is detected and mitigated, you’ll receive a <a href="https://support.cloudflare.com/hc/en-us/articles/360053216191-Understanding-Cloudflare-DDoS-alerts">real-time DDoS alert</a> (if you’ve configured one) and you’ll be able to view the attack in the <a href="https://support.cloudflare.com/hc/en-us/articles/360024520152-Understanding-Cloudflare-Firewall-Analytics">Firewall analytics dashboard</a>. The attack details and the rule ID that was triggered will also be displayed in the <b>Activity log</b> as part of each HTTP request log that was mitigated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/H9paxP96ijGeNRLtDOu7f/52d1f2847f324eecd313b3ce69abca8e/image5-22.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DadNnh4a187v3duXNbhbe/90af214676709cd2bfb95a1f62843644/image8-6.png" />
            
            </figure>
    <div>
      <h2>Helping Build a Better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, everything we do is guided by our mission to help build a better Internet. A significant part of that mission is to make DDoS downtime and service disruptions a thing of the past. By giving our users the visibility and tools they need in order to understand and improve their DDoS protection, we’re hoping to make another step towards a better Internet.</p><p>Do you have feedback about the user interface or anything else? In the new DDoS tab, we’ve added a link to provide feedback, so you too can help shape the future of Cloudflare’s DDoS protection Managed Rules.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Managed Rules]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">19mP3n95YUnAMxbjI6dzAZ</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>