NGINX App Protect DoS 2.0
Here you can find the release information for F5 NGINX App Protect DoS v2.0. NGINX App Protect DoS provides behavioral protection against Denial of Service (DoS) for your web applications.
Release 2.0
October 20, 2021
New Features
Protection of gRPC services against application layer Denial of Service attacks
- Message flood Attacker supplies multiple gRPC requests that exceed the service capacity.
- Concurrent large requests Attacker supplies a number of concurrent large requests that exceed the server capacity of concurrent requests.
- Slow gRPC POST Attacker supplies a number of concurrent slow POST gRPC requests that exceed the server capacity of concurrent requests.
- HTTP/2 attack on gRPC service Attacker runs typical DoS HTTP/2 attacks: HTTP flood and slow attacks on gRPC service.
Protection of HTTP/2 services against application layer Denial of Service attacks
Supported Packages
App Protect DoS
CentOS 7.4+ / UBI7
- app-protect-dos-25+2.0.1-1.el7.ngx.el7.ngx.x86_64.rpm
Debian 10
- app-protect-dos_25+2.0.1-1~buster_amd64.deb
Ubuntu 18.04
- app-protect-dos_25+2.0.1-1~bionic_amd64.deb
Ubuntu 20.04
- app-protect-dos_25+2.0.1-1~focal_amd64.deb
NGINX Plus
- NGINX Plus R25
Resolved Issues
-
Security log keeps working on removed Protected Objects.
-
Monitoring requests show up in the access log.
-
app_protect_dos_name
longer than 32 characters creates a garbage name in the logs. -
Created protected objects for the not configured contexts.
-
Wrong reporting of attack status with arbitrator.
-
Wrong
impact_rps
value in Bad actor expired log message. -
Rate limit in Access Log should be optional.
Important Notes
-
proxy_request_buffering
off is not supported. -
gRPC and HTTP/2 protection require active monitoring of the protected service. The directive
app_protect_dos_monitor
is mandatory for these use cases, otherwise, the attack will not be detected. -
gRPC and HTTP/2 protection are available only on Debian 10, Ubuntu 18.04 and Ubuntu 20.04 platforms. For the rest of the platforms, NGINX App Protect DoS does not protect gRPC and HTTP/2 services. The traffic is bypassed.
-
TLS fingerprint feature is not used in CentOS 7.4 due to the old OpenSSL version. The required OpenSSL version is 1.1.1 or higher.
-
Slow POST attack always mitigates with block action while other types of attacks can also be mitigated with redirection or JS challenges.
-
New optional configuration parameters of the directive
app_protect_dos_monitor
to support gRPC and HTTP/2 protocols. -
Added new fields in Security Log:
baseline_dps
(datagrams per second) instead ofbaseline_tps
,incoming_datagrams
successful_responses
instead ofsuccessful_transactions
unsuccessful_requests
instead ofunsuccessful_requests_count
.
-
In the case of an upgrade from the previous
app-protect-dos
version, it’s necessary to remove the oldnginx-plus
and install the newapp-protect-dos
that will install a correspondent version ofnginx-plus
as described in the NGINX App Protect DoS Deployment Guide.