Skip to content

Commit 218b047

Browse files
pedrosousaRebeccaTamachiro
authored andcommitted
[WAF] Update notices for old versions (#21015)
1 parent 416000e commit 218b047

File tree

2 files changed

+56
-54
lines changed
  • src/content/docs/waf/reference/legacy

2 files changed

+56
-54
lines changed

src/content/docs/waf/reference/legacy/old-rate-limiting/index.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,9 @@ source: https://support.cloudflare.com/hc/en-us/articles/115001635128-Configurin
44
title: Rate Limiting (previous version)
55
sidebar:
66
order: 3
7+
group:
8+
badge:
9+
text: Deprecated
710
---
811

912
Cloudflare Rate Limiting automatically identifies and mitigates excessive request rates for specific URLs or for an entire domain.

src/content/docs/waf/reference/legacy/old-waf-managed-rules/index.mdx

Lines changed: 53 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -4,36 +4,37 @@ source: https://support.cloudflare.com/hc/en-us/articles/200172016-Understanding
44
title: WAF managed rules (previous version)
55
sidebar:
66
order: 2
7-
7+
group:
8+
badge:
9+
text: Deprecated
810
---
911

1012
Managed rules, a feature of Cloudflare WAF (Web Application Firewall), identifies and removes suspicious activity for HTTP `GET` and `POST` requests.
1113

1214
:::caution
1315

14-
15-
* This page contains documentation about the previous implementation of WAF Managed Rules. For more information on the new version, refer to [WAF Managed Rules](/waf/managed-rules/).
16-
* All customers with access to the previous version of WAF managed rules can [migrate to the new version](/waf/reference/migration-guides/waf-managed-rules-migration/).
17-
* The new WAF Managed Rules provide the [Cloudflare Free Managed Ruleset](/waf/managed-rules/) to all customers, including customers on a Free plan. Refer to the [announcement blog post](https://blog.cloudflare.com/waf-for-everyone/) for details.
16+
- This page contains documentation about the previous implementation of WAF Managed Rules (now deprecated). For more information on the new version, refer to [WAF Managed Rules](/waf/managed-rules/).
17+
- All customers with access to the previous version of WAF managed rules can [migrate to the new version](/waf/reference/migration-guides/waf-managed-rules-migration/).
18+
- The new WAF Managed Rules provide the [Cloudflare Free Managed Ruleset](/waf/managed-rules/) to all customers, including customers on a Free plan. Refer to the [announcement blog post](https://blog.cloudflare.com/waf-for-everyone/) for details.
1819
:::
1920

2021
Examples of [malicious content](https://www.cloudflare.com/learning/security/what-is-web-application-security/) that managed rules identify include:
2122

22-
* Common keywords used in comment spam (`XX`, `Rolex`, `Viagra`, etc.)
23-
* Cross-site scripting attacks (XSS)
24-
* SQL injections (SQLi)
23+
- Common keywords used in comment spam (`XX`, `Rolex`, `Viagra`, etc.)
24+
- Cross-site scripting attacks (XSS)
25+
- SQL injections (SQLi)
2526

2627
WAF managed rules (previous version) are available to Pro, Business, and Enterprise plans for any [subdomains proxied to Cloudflare](/dns/proxy-status/). Control managed rules settings in **Security** > **WAF** > **Managed rules**
2728

2829
Managed rules includes three packages:
2930

30-
* [Cloudflare Managed Ruleset](#cloudflare-managed-ruleset)
31-
* [OWASP ModSecurity Core Rule Set](#owasp-modsecurity-core-rule-set)
32-
* Customer requested rules
31+
- [Cloudflare Managed Ruleset](#cloudflare-managed-ruleset)
32+
- [OWASP ModSecurity Core Rule Set](#owasp-modsecurity-core-rule-set)
33+
- Customer requested rules
3334

34-
You can use the sampled logs in the [Security Events](/waf/analytics/security-events/) dashboard, available at **Security** > **Events**, to review threats blocked by WAF managed rules.
35+
You can use the sampled logs in the [Security Events](/waf/analytics/security-events/) dashboard to review threats blocked by WAF managed rules.
3536

36-
***
37+
---
3738

3839
## Cloudflare Managed Ruleset
3940

@@ -42,99 +43,97 @@ The Cloudflare Managed Ruleset contains security rules written and curated by Cl
4243
**Cloudflare Specials** is a group that provides core firewall security against [common attacks](https://www.cloudflare.com/learning/security/what-is-web-application-security/).
4344

4445
:::note
45-
4646
Cloudflare recommends that you always leave **Cloudflare Specials** enabled. Additionally, only enable rule groups that correspond to your technology stack. For example, if you use WordPress, enable the **Cloudflare WordPress** group.
4747
:::
4848

4949
When viewing a ruleset, Cloudflare shows default actions for each rule listed under **Default mode**. The **Mode** available for individual rules within a specific **Cloudflare Managed Ruleset** are:
5050

51-
* **Default**: Takes the default action listed under **Default mode** when viewing a specific rule.
52-
* **Disable**: Turns off the specific rule within the group.
53-
* **Block**: Discards the request.
54-
* **Interactive Challenge**: The visitor receives a challenge page that requires interaction.
55-
* **Simulate**: The request is allowed through but is logged in [sampled logs](/waf/analytics/security-events/#sampled-logs).
51+
- **Default**: Takes the default action listed under **Default mode** when viewing a specific rule.
52+
- **Disable**: Turns off the specific rule within the group.
53+
- **Block**: Discards the request.
54+
- **Interactive Challenge**: The visitor receives a challenge page that requires interaction.
55+
- **Simulate**: The request is allowed through but is logged in [sampled logs](/waf/analytics/security-events/#sampled-logs).
5656

57-
Cloudflares [WAF changelog](/waf/change-log/) allows customers to monitor ongoing changes to the Cloudflare Managed Ruleset.
57+
Cloudflare's [WAF changelog](/waf/change-log/) allows customers to monitor ongoing changes to the Cloudflare Managed Ruleset.
5858

59-
***
59+
---
6060

6161
## OWASP ModSecurity Core Rule Set
6262

6363
The OWASP ModSecurity Core Rule Set package assigns a score to each request based on how many OWASP rules trigger. Some OWASP rules have a higher sensitivity score than others.
6464

6565
After OWASP evaluates a request, Cloudflare compares the final score to the **Sensitivity** configured for the zone.  If the score exceeds the sensitivity, the request is actioned based on the **Action** configured within **Package: OWASP ModSecurity Core Rule Set**:
6666

67-
* **Block**: The request is discarded.
68-
* **Challenge**: The visitor receives an interactive challenge page.
69-
* **Simulate**: The request is allowed through but is logged in [sampled logs](/waf/analytics/security-events/#sampled-logs).
67+
- **Block**: The request is discarded.
68+
- **Challenge**: The visitor receives an interactive challenge page.
69+
- **Simulate**: The request is allowed through but is logged in [sampled logs](/waf/analytics/security-events/#sampled-logs).
7070

7171
The sensitivity score required to trigger the WAF for a specific **Sensitivity** is as follows:
7272

73-
* **Low**: 60 and higher
74-
* **Medium**: 40 and higher
75-
* **High**: 25 and higher
73+
- **Low**: 60 and higher
74+
- **Medium**: 40 and higher
75+
- **High**: 25 and higher
7676

7777
For AJAX requests, the following scores are applied instead:
7878

79-
* **Low**: 120 and higher
80-
* **Medium**: 80 and higher
81-
* **High**: 65 and higher
79+
- **Low**: 120 and higher
80+
- **Medium**: 80 and higher
81+
- **High**: 65 and higher
8282

8383
Review the entry in [sampled logs](/waf/analytics/security-events/#sampled-logs) for the final score and for the individual triggered rules.
8484

8585
### Control the OWASP package
8686

87-
The OWASP ModSecurity Core Rule Set package contains several rules from the [OWASP project](https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project). Cloudflare does not write or curate OWASP rules. Unlike the Cloudflare Managed Ruleset, specific OWASP rules are either turned *On* or *Off.*
87+
The OWASP ModSecurity Core Rule Set package contains several rules from the [OWASP project](https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project). Cloudflare does not write or curate OWASP rules. Unlike the Cloudflare Managed Ruleset, specific OWASP rules are either turned _On_ or _Off._
8888

89-
To manage OWASP thresholds, set the **Sensitivity** to *Low*, *Medium*, or *High* under **Package: OWASP ModSecurity Core Rule Set**.
89+
To manage OWASP thresholds, set the **Sensitivity** to _Low_, _Medium_, or _High_ under **Package: OWASP ModSecurity Core Rule Set**.
9090

91-
Setting the **Sensitivity** to *Off* will disable the entire OWASP package including all its rules. Determining the appropriate **Sensitivity** depends on your business industry and operations. For instance, a *Low* setting is appropriate for:
91+
Setting the **Sensitivity** to _Off_ will disable the entire OWASP package including all its rules. Determining the appropriate **Sensitivity** depends on your business industry and operations. For instance, a _Low_ setting is appropriate for:
9292

93-
* Certain business industries more likely to trigger the WAF.
94-
* Large file uploads.
93+
- Certain business industries more likely to trigger the WAF.
94+
- Large file uploads.
9595

9696
With a high sensitivity, large file uploads will trigger the WAF.
9797

98-
Cloudflare recommends initially setting the sensitivity to *Low* and reviewing for false positives before further increasing the sensitivity.
98+
Cloudflare recommends initially setting the sensitivity to _Low_ and reviewing for false positives before further increasing the sensitivity.
9999

100100
:::note
101-
102101
Sampled logs displays rule ID `981176` when a request is blocked by OWASP. Also, some OWASP rules listed in Sampled logs do not appear in the OWASP list of rules because disabling those rules is not recommended.
103102
:::
104103

105-
***
104+
---
106105

107106
## Important remarks
108107

109-
* Managed rules introduce a limited amount of latency.
108+
- Managed rules introduce a limited amount of latency.
110109

111-
* Changes to WAF managed rules take about 30 seconds to update globally.
110+
- Changes to WAF managed rules take about 30 seconds to update globally.
112111

113-
* Cloudflare uses proprietary rules to filter traffic.
112+
- Cloudflare uses proprietary rules to filter traffic.
114113

115-
* Established Websockets do not trigger managed rules for subsequent requests.
114+
- Established Websockets do not trigger managed rules for subsequent requests.
116115

117-
* Managed rules parse JSON responses to identify vulnerabilities targeted at APIs. JSON payload parsing is limited to 128 KB.
116+
- Managed rules parse JSON responses to identify vulnerabilities targeted at APIs. JSON payload parsing is limited to 128 KB.
118117

119-
* Managed rules mitigate padding techniques. Cloudflare recommends the following:
118+
- Managed rules mitigate padding techniques. Cloudflare recommends the following:
120119

121120
1. Turn on rule with ID `100048`. This rule protects against padding type attacks, but it is not deployed by default because there is a high probability of causing false positives in customer environments. It is, however, important that customers tune their managed rules configuration.
122121

123122
2. Create a WAF custom rule using the [Expression Editor](/ruleset-engine/rules-language/expressions/edit-expressions/#expression-editor) depending on the need to check headers and/or body to block larger payloads (> 128 KB). Use the following fields for this purpose:
124123

125-
* `http.request.body.truncated`
126-
* `http.request.headers.truncated`
124+
- [`http.request.body.truncated`](/ruleset-engine/rules-language/fields/reference/http.request.body.truncated/)
125+
- [`http.request.headers.truncated`](/ruleset-engine/rules-language/fields/reference/http.request.headers.truncated/)
127126

128-
You should test your rule in *Log* mode first (if available), since the rule might generate false positives.
127+
You should test your rule in _Log_ mode first (if available), since the rule might generate false positives.
129128

130-
* There are a handful of managed rules that Cloudflare does not disable even if you turn off **Managed rules** in the Cloudflare dashboard, such as rules with IDs `WP0025B`, `100043A`, and `100030`.
129+
- There are a handful of managed rules that Cloudflare does not disable even if you turn off **Managed rules** in the Cloudflare dashboard, such as rules with IDs `WP0025B`, `100043A`, and `100030`.
131130

132-
***
131+
---
133132

134133
## Related resources
135134

136-
* [Troubleshoot WAF managed rules (previous version)](/waf/reference/legacy/old-waf-managed-rules/troubleshooting/)
137-
* [Security Events](/waf/analytics/security-events/)
138-
* [Cloudflare WAF](/waf/)
139-
* [Cloudflares WAF changelog](/waf/change-log/)
140-
* [WAF custom rules](/waf/custom-rules/)
135+
- [Troubleshoot WAF managed rules (previous version)](/waf/reference/legacy/old-waf-managed-rules/troubleshooting/)
136+
- [Security Events](/waf/analytics/security-events/)
137+
- [Cloudflare WAF](/waf/)
138+
- [Cloudflare's WAF changelog](/waf/change-log/)
139+
- [WAF custom rules](/waf/custom-rules/)

0 commit comments

Comments
 (0)