Skip to content

Commit 3659826

Browse files
challenges migration (#20996)
1 parent b2fa65b commit 3659826

File tree

36 files changed

+58
-56
lines changed

36 files changed

+58
-56
lines changed

public/__redirects

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -454,7 +454,7 @@
454454
/firewall/cf-rulesets/custom-rules/rate-limiting/ /waf/rate-limiting-rules/ 301
455455
/support/page-rules/required-firewall-rule-changes-to-enable-url-normalization/ /firewall/troubleshooting/required-changes-to-enable-url-normalization/ 301
456456
/firewall/known-issues-and-faq/ /waf/troubleshooting/faq/ 301
457-
/firewall/cf-firewall-rules/cloudflare-challenges/ /waf/reference/cloudflare-challenges/ 301
457+
/firewall/cf-firewall-rules/cloudflare-challenges/ /fundamentals/security/cloudflare-challenges/ 301
458458

459459
# fundamentals
460460
/fundamentals/account-and-billing/account-setup/ /fundamentals/subscriptions-and-billing/ 301
@@ -506,7 +506,7 @@
506506
/fundamentals/global-configurations/ /fundamentals/ 301
507507
/fundamentals/customizations/ /fundamentals/ 301
508508
/fundamentals/security/cybersafe/ /fundamentals/reference/policies-compliances/cybersafe/ 301
509-
/fundamentals/security/challenge-passage/ /waf/tools/challenge-passage/ 301
509+
/fundamentals/security/challenge-passage/ /fundamentals/security/cloudflare-challenges/challenge-passage/ 301
510510
/fundamentals/glossary/ /fundamentals/reference/glossary/ 301
511511
/fundamentals/account-and-billing/login/ /fundamentals/setup/account/login/ 301
512512
/fundamentals/account-and-billing/account-maintenance/delete-account/ /fundamentals/subscriptions-and-billing/delete-account/ 301
@@ -543,7 +543,7 @@
543543
/fundamentals/get-started/setup/minimize-downtime/ /fundamentals/performance/minimize-downtime/ 301
544544
/fundamentals/basic-tasks/maintenance-mode/ /fundamentals/performance/minimize-downtime/ 301
545545
/fundamentals/get-started/concepts/what-is-cloudflare/ https://www.cloudflare.com/learning/what-is-cloudflare/ 301
546-
/fundamentals/get-started/concepts/cloudflare-challenges/ /waf/reference/cloudflare-challenges/ 301
546+
/fundamentals/get-started/concepts/cloudflare-challenges/ /fundamentals/security/cloudflare-challenges/ 301
547547
/fundamentals/get-started/concepts/accounts-and-zones/ /fundamentals/setup/accounts-and-zones/ 301
548548
/fundamentals/get-started/concepts/cloudflare-ip-addresses/ /fundamentals/concepts/cloudflare-ip-addresses/ 301
549549
/fundamentals/get-started/concepts/network-layers/ /fundamentals/reference/network-layers/ 301
@@ -1272,6 +1272,8 @@
12721272
/waf/analytics/security-events/free-plan/ /waf/analytics/security-events/ 301
12731273
/waf/analytics/security-events/paid-plans/ /waf/analytics/security-events/ 301
12741274
/waf/analytics/security-events/additional-information/ /waf/tools/validation-checks/ 301
1275+
/waf/reference/cloudflare-challenges/ /fundamentals/security/cloudflare-challenges/ 301
1276+
/waf/tools/challenge-passage/ /fundamentals/security/cloudflare-challenges/challenge-passage/ 301
12751277

12761278
# waiting-room
12771279
/waiting-room/how-to/mobile-traffic/ /waiting-room/how-to/json-response/ 301

src/content/docs/analytics/account-and-zone-analytics/status-codes.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Users may also see `100x` errors which are not reported. These will be displayed
3232
## Common edge status codes
3333

3434
- `400` - Bad Request intercepted at the Cloudflare Edge (for example, missing or bad HTTP header)
35-
- `403` - Security functionality (for example, Web Application Firewall, Browser Integrity Check, [Cloudflare challenges](/waf/reference/cloudflare-challenges/), and most 1xxx error codes)
35+
- `403` - Security functionality (for example, Web Application Firewall, Browser Integrity Check, [Cloudflare challenges](/fundamentals/security/cloudflare-challenges/), and most 1xxx error codes)
3636
- `409` - DNS errors typically in the form of 1000 or 1001 error code
3737
- `413` - File size upload exceeded the maximum size allowed (configured in the dashboard under **Network** > **Maximum Upload Size**.)
3838
- `444` - Used by Nginx to indicate that the server has returned no information to the client, and closed the connection. This error code is internal to Nginx and is **not** returned to the client.

src/content/docs/analytics/account-and-zone-analytics/threat-types.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ A /24 IP range that was blocked based on the [user configuration](/waf/tools/ip-
5252

5353
## New Challenge (user)
5454

55-
[Challenge](/waf/reference/cloudflare-challenges/) based on user configurations set for visitor’s IP in either WAF managed rules or custom rules, configured in **Security** > **WAF**.
55+
[Challenge](/fundamentals/security/cloudflare-challenges/) based on user configurations set for visitor’s IP in either WAF managed rules or custom rules, configured in **Security** > **WAF**.
5656

5757
## Challenge error
5858

src/content/docs/analytics/account-and-zone-analytics/total-threats-stopped.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ title: Total threats stopped
77
Total Threats Stopped measures the number of “suspicious” and “bad” requests that were aimed at your site. Requests receive these labels by our IP Reputation Database as they enter Cloudflare’s network:
88

99
- **Legitimate:** Request passed directly to your site.
10-
- **Suspicious:** Request has been challenged with a [Cloudflare challenge](/waf/reference/cloudflare-challenges/).
10+
- **Suspicious:** Request has been challenged with a [Cloudflare challenge](/fundamentals/security/cloudflare-challenges/).
1111
- **Bad:** Request has been blocked because our Browser Integrity Check, or because of user configured settings like WAF rules or IP range block.
1212

1313
Cloudflare uses threat scores gathered from sources such as Project Honeypot, as well as our own communities' traffic to determine whether a visitor is legitimate or malicious. When a legitimate visitor passes a challenge, that helps offset the threat score against the previous negative behavior seen from that IP address. Our system learns who is a threat from this activity.

src/content/docs/bots/concepts/detection-ids.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ and not any(cf.bot_management.detection_ids[*] in {3355446 12577893})
8787

8888
### Challenges for account takeover detections
8989

90-
Cloudflare's [Managed Challenge](/waf/reference/cloudflare-challenges/) can limit brute-force attacks on your login endpoints.
90+
Cloudflare's [Managed Challenge](/fundamentals/security/cloudflare-challenges/) can limit brute-force attacks on your login endpoints.
9191

9292
To access account takeover detections:
9393

src/content/docs/bots/troubleshooting.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Cloudflare uses data from millions of requests and re-train the system on a peri
5959

6060
When you choose to challenge different bot categories with Bot Fight Mode or Super Bot Fight Mode, you will see Security Events with an **Action Taken** of **Managed Challenge**.
6161

62-
You may also see Managed Challenge due to a triggered [WAF custom rule](/waf/reference/cloudflare-challenges/#managed-challenge-recommended).
62+
You may also see Managed Challenge due to a triggered [WAF custom rule](/fundamentals/security/cloudflare-challenges/#managed-challenge-recommended).
6363

6464
This does not mean that your traffic was blocked. It is the challenge sent to your user to determine whether they are likely human or likely bot.
6565

src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ You may not see any traffic matching the adaptive rules. This can be because the
7878

7979
If you do see traffic that was _Logged_ by the adaptive rules, use the dashboard to determine if the traffic matches the characteristics of legitimate users or that of attack traffic. As each Internet property is unique, understanding if the traffic is legitimate requires your understanding of how your legitimate traffic looks. For example, the user agent, source country, headers, query string for HTTP requests, and protocols and ports for L3/4 traffic.
8080

81-
- In cases where you are certain that the rule is only flagging attack traffic, you should consider creating an override and enabling that rule with a [Managed Challenge](/waf/reference/cloudflare-challenges/#managed-challenge-recommended) or `Block` action.
81+
- In cases where you are certain that the rule is only flagging attack traffic, you should consider creating an override and enabling that rule with a [Managed Challenge](/fundamentals/security/cloudflare-challenges/#managed-challenge-recommended) or `Block` action.
8282
- In cases where you see legitimate traffic being flagged, you should lower the sensitivity level of the rule and observe the flagged traffic. You can continue reducing the sensitivity level until you reach a point where legitimate traffic is not flagged. Then, you should create an override to enable the rule with a mitigation action.
8383
- If the rule is still flagging legitimate traffic you can consider using the expression filters to condition the rules to exclude certain types of traffic.
8484

src/content/docs/ddos-protection/managed-rulesets/http/override-parameters.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The action that will be performed for requests that match specific rules of Clou
3030

3131
- **Managed Challenge**
3232
- API value: `"managed_challenge"`.
33-
- [Managed Challenges](/waf/reference/cloudflare-challenges/#managed-challenge-recommended) help reduce the lifetimes of human time spent solving Captchas across the Internet. Depending on the characteristics of a request, Cloudflare will dynamically choose the appropriate type of challenge based on specific criteria.
33+
- [Managed Challenges](/fundamentals/security/cloudflare-challenges/#managed-challenge-recommended) help reduce the lifetimes of human time spent solving Captchas across the Internet. Depending on the characteristics of a request, Cloudflare will dynamically choose the appropriate type of challenge based on specific criteria.
3434

3535
- **Interactive Challenge**
3636
- API value: `"challenge"`.

src/content/docs/fundamentals/reference/under-attack-mode.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To preview what Under Attack mode looks like for your visitors:
5858
4. Go to **Custom Pages**.
5959
5. For **Managed Challenge / I'm Under Attack Mode™**, select **Custom Pages** > **View default**.
6060

61-
The `Checking your browser before accessing...` challenge determines whether to block or allow a visitor within five seconds. After passing the challenge, the visitor does not observe another challenge until the duration configured in [Challenge Passage](/waf/tools/challenge-passage/).
61+
The `Checking your browser before accessing...` challenge determines whether to block or allow a visitor within five seconds. After passing the challenge, the visitor does not observe another challenge until the duration configured in [Challenge Passage](/fundamentals/security/cloudflare-challenges/challenge-passage/).
6262

6363
---
6464

src/content/docs/waf/tools/challenge-passage.mdx renamed to src/content/docs/fundamentals/security/cloudflare-challenges/challenge-passage.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Challenge Passage
44

55
---
66

7-
When a visitor solves a [Cloudflare challenge](/waf/reference/cloudflare-challenges/) - as part of a [WAF custom rule](/waf/custom-rules/) or [IP Access rule](/waf/tools/ip-access-rules/) - you can set the **Challenge Passage** to prevent them from having to solve future challenges for a specified period of time.
7+
When a visitor solves a [Cloudflare challenge](/fundamentals/security/cloudflare-challenges/) - as part of a [WAF custom rule](/waf/custom-rules/) or [IP Access rule](/waf/tools/ip-access-rules/) - you can set the **Challenge Passage** to prevent them from having to solve future challenges for a specified period of time.
88

99
## How it works
1010

0 commit comments

Comments
 (0)