Skip to content

Commit 9dabdcb

Browse files
[DNS Firewall] Fix public prefixes info in random-prefix-attacks (#26272)
1 parent 1d756e0 commit 9dabdcb

File tree

1 file changed

+1
-1
lines changed
  • src/content/docs/dns/dns-firewall/random-prefix-attacks

1 file changed

+1
-1
lines changed

src/content/docs/dns/dns-firewall/random-prefix-attacks/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ As part of [DNS Firewall](/dns/dns-firewall/), Cloudflare can protect your upstr
1818

1919
## Limitations
2020

21-
To reduce the impact of false positives, Cloudflare does not block domains on or directly under any zone on the [Public Suffix List](https://publicsuffix.org/). For example, this means that queries only to a domain like `example.com` or `example.co.uk` will not be blocked by the automatic random prefix attack mitigation (though other internal mitigations might catch and block an attack with significant volume).
21+
To reduce the impact of false positives, Cloudflare does not block entire [public suffixes](https://publicsuffix.org/) (such as `com`). However, it can block domains directly under them (such as `example.com`).
2222

2323
In addition, the default setting for the automatic mitigation ensures that it will only be deployed if upstream authoritative nameservers are determined to be unresponsive (and likely overloaded by an attack). This means that, as long as your authoritative nameservers can handle the traffic during a random prefix attack, Cloudflare will not actively block queries in order to avoid false positives. This setting is called `"only_when_upstream_unhealthy"` and is always true if not explicitly disabled during [Setup](/dns/dns-firewall/random-prefix-attacks/setup/).
2424

0 commit comments

Comments
 (0)