NGINX App Protect WAF 4.7

December 19, 2023

In this release, NGINX App Protect WAF supports NGINX Plus R31.

New Features

Supported Packages

App Protect

Alpine 3.16
  • app-protect-31.4.641.0-r1.apk
Alpine 3.17
  • app-protect-31.4.641.0-r1.apk
CentOS 7.4+ / RHEL 7.4+ / Amazon Linux 2
  • app-protect-31+4.641.0-1.el7.ngx.x86_64.rpm
Debian 11
  • app-protect_31+4.641.0-1~bullseye_amd64.deb
Oracle Linux 8.1+
  • app-protect-31+4.641.0-1.el8.ngx.x86_64.rpm
RHEL 8.1+
  • app-protect-31+4.641.0-1.el8.ngx.x86_64.rpm
RHEL 9+
  • app-protect-31+4.641.0-1.el9.ngx.x86_64.rpm
Ubuntu 20.04
  • app-protect_31+4.641.0-1~focal_amd64.deb
Ubuntu 22.04
  • app-protect_31+4.641.0-1~jammy_amd64.deb

NGINX Plus

  • NGINX Plus R31

Resolved Issues

  • 9065 Fixed - Increasing the limit for “max_request_size” in log configuration from 2k to 10k. The default will change from “any” to 2k to maintain the old behaviour.
  • 9297 Fixed - Add new limit from responseCheckLength to response ingress event handling in order to reduce the memory used for buffering.

Limitation

  • 9992 - There is a limitation on Edwards-curve Digital Signature Algorithm (EdDSA) protocol on CentOS 7 as the Enforcer does not support this protocol on this Operating System (OS). When a JSON Web Token (JWT) signed with EdDSA is used on CentOS 7, it results in a VIOL_ACCESS_INVALID error.

Important Notes

  • Starting with this release, the bot signatures list is generated automatically as a part of the app-protect-bot-signatures package, which is a dependency of the app-protect-compiler package. It resembles a format similar to the README-style text file found in the attack signature. Refer to the Bot Signatures Update File for more details.

  • Starting with the next release version of NGINX App Protect WAF, the existing bot signatures file included_bot_signatures which is located at the following path: /opt/app-protect/var/update_files/included_bot_signatures will be removed from the app-protect-compile package.


Last modified November 19, 2024