Skip to content

Commit fcadc18

Browse files
authored
[Fundamentals] Update Under Attack mode (#20750)
1 parent 02514fb commit fcadc18

File tree

7 files changed

+41
-44
lines changed

7 files changed

+41
-44
lines changed

src/content/docs/fundamentals/reference/under-attack-mode.mdx

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,31 +2,29 @@
22
pcx_content_type: reference
33
source: https://support.cloudflare.com/hc/en-us/articles/200170076-Understanding-Cloudflare-Under-Attack-mode-advanced-DDOS-protection-
44
title: Under Attack mode
5-
65
---
76

87
import { Example } from "~/components"
98

10-
Cloudflare's **I'm Under Attack Mode** performs additional security checks to help mitigate layer 7 DDoS attacks. Validated users access your website and suspicious traffic is blocked. It is designed to be used as one of the last resorts when a zone is under attack (and will temporarily pause access to your site and impact your site analytics).
9+
Cloudflare's Under Attack mode performs additional security checks to help mitigate layer 7 DDoS attacks. Validated users access your website and suspicious traffic is blocked. It is designed to be used as one of the last resorts when a zone is under attack (and will temporarily pause access to your site and impact your site analytics).
1110

1211
When enabled, visitors receive an interstitial page.
1312

14-
## Enable Under Attack mode
13+
## Turn on Under Attack mode
1514

16-
**I'm Under Attack Mode** is disabled by default for your zone.
15+
Under Attack mode is turned off by default for your zone.
1716

1817
### Globally
1918

20-
To put your entire zone in **I'm Under Attack Mode**:
19+
To put your entire zone in Under Attack mode:
2120

22-
1. Log into the [Cloudflare dashboard](https://dash.cloudflare.com).
21+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com).
2322
2. Select your account and zone.
24-
3. Go to **Security** > **Settings**.
25-
4. For **Security Level**, choose **I'm Under Attack!**.
23+
3. In the zone overview page, turn on **Under Attack Mode** in the **Quick Actions** sidebar.
2624

2725
### Selectively
2826

29-
To enable **I'm Under Attack Mode** for specific pages or sections of your site, use a [Configuration Rule](/rules/configuration-rules/) to adjust the **Security Level**.
27+
To enable Under Attack mode for specific pages or sections of your site, use a [configuration rule](/rules/configuration-rules/) to adjust the **Security Level**.
3028

3129
<Example>
3230

@@ -48,21 +46,21 @@ If you are using the Expression Editor, enter the following expression:<br/>
4846

4947
To turn it on for specific ASNs (hosts/ISPs that own IP addresses), countries, or IP ranges, use [IP Access Rules](/waf/tools/ip-access-rules/).
5048

51-
***
49+
---
5250

5351
## Preview Under Attack mode
5452

55-
To preview what **I'm Under Attack** mode looks like for your visitors:
53+
To preview what Under Attack mode looks like for your visitors:
5654

5755
1. Log into the [Cloudflare dashboard](https://dash.cloudflare.com).
5856
2. Select your account.
5957
3. Go to **Manage Account** > **Configurations**.
6058
4. Go to **Custom Pages**.
6159
5. For **Managed Challenge / I'm Under Attack Mode™**, select **Custom Pages** > **View default**.
6260

63-
The "Checking your browser before accessing..." challenge determines whether to block or allow a visitor within five seconds. After passing the challenge, the visitor does not observe another challenge until the duration configured in [**Challenge Passage**](/waf/tools/challenge-passage/).
61+
The `Checking your browser before accessing...` challenge determines whether to block or allow a visitor within five seconds. After passing the challenge, the visitor does not observe another challenge until the duration configured in [Challenge Passage](/waf/tools/challenge-passage/).
6462

65-
***
63+
---
6664

6765
## Potential issues
6866

src/content/docs/rules/configuration-rules/create-api.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,9 +61,9 @@ https://api.cloudflare.com/client/v4/zones/{zone_id}/rulesets/{ruleset_id} \
6161

6262
</Details>
6363

64-
<Details header="Example: Add a rule that turns on I'm Under Attack mode for the admin area">
64+
<Details header="Example: Add a rule that turns on Under Attack mode for the admin area">
6565

66-
The following example sets the rules of an existing phase ruleset (`{ruleset_id}`) to a single configuration rule — turning on I'm Under Attack mode for the administration area — using the [Update a zone ruleset](/api/resources/rulesets/methods/update/) operation:
66+
The following example sets the rules of an existing phase ruleset (`{ruleset_id}`) to a single configuration rule — turning on Under Attack mode for the administration area — using the [Update a zone ruleset](/api/resources/rulesets/methods/update/) operation:
6767

6868
```bash title="Request"
6969
curl --request PUT \

src/content/docs/ssl/edge-certificates/changing-dcv-method/troubleshooting.mdx

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,9 @@ sidebar:
66
head:
77
- tag: title
88
content: Troubleshooting Domain Control Validation
9-
109
---
1110

12-
import { GlossaryTooltip, Render } from "~/components"
11+
import { GlossaryTooltip, Render } from "~/components";
1312

1413
Taking into account the [steps involved in DCV](/ssl/edge-certificates/changing-dcv-method/dcv-flow/), some situations may interfere with certificate issuance and renewal.
1514

@@ -24,12 +23,14 @@ If you are using the Cloudflare API, error messages are presented under the `val
2423

2524
If you have issues while HTTP DCV is in place, review the following settings:
2625

27-
* **Anything affecting `/.well-known/*`**: Review [WAF custom rules](/waf/custom-rules/), [IP Access Rules](/waf/tools/ip-access-rules/), and other [configuration rules](/rules/configuration-rules/) to make sure that your rules *do not* enable interactive challenge on the validation URL.
26+
- **Anything affecting `/.well-known/*`**: Review [WAF custom rules](/waf/custom-rules/), [IP Access Rules](/waf/tools/ip-access-rules/), and other [configuration rules](/rules/configuration-rules/) to make sure that your rules _do not_ enable interactive challenge on the validation URL.
2827

29-
* **Cloudflare Account Settings** and **Page Rules**: Review your [account settings](/fundamentals/reference/under-attack-mode/), [Configuration Rules](/rules/configuration-rules/), and [Page Rules](/rules/page-rules/) to ensure you have not enabled **I'm Under Attack Mode** on the validation URL.
28+
- **Cloudflare Account Settings** and **Page Rules**: Review your [account settings](/fundamentals/reference/under-attack-mode/), [Configuration Rules](/rules/configuration-rules/), and [Page Rules](/rules/page-rules/) to ensure you have not enabled Under Attack mode on the validation URL.
3029

3130
:::caution
32-
<Render file="dcv-path-security" />
31+
32+
<Render file="dcv-path-security" />
33+
3334
:::
3435

3536
## Redirection
@@ -44,14 +45,14 @@ When using [Redirect Rules](/rules/url-forwarding/single-redirects/) the `/.well
4445

4546
The errors below refer to situations that have to be addressed at the authoritative DNS provider:
4647

47-
* `the Certificate Authority had trouble performing a DNS lookup: dns problem: looking up caa for nsheiapp.codeacloud.com: dnssec: bogus`
48-
* `Certificate authority encountered a SERVFAIL during DNS lookup, please check your DNS reachability.`
48+
- `the Certificate Authority had trouble performing a DNS lookup: dns problem: looking up caa for nsheiapp.codeacloud.com: dnssec: bogus`
49+
- `Certificate authority encountered a SERVFAIL during DNS lookup, please check your DNS reachability.`
4950

5051
Consider the following when troubleshooting:
5152

52-
* [DNSSEC](https://www.cloudflare.com/learning/dns/dns-security/) must be configured correctly. You can use [DNSViz](https://dnsviz.net/) to understand and troubleshoot the deployment of DNSSEC.
53-
* Your [CAA records](/ssl/edge-certificates/caa-records/) should allow Cloudflare's partner [certificate authorities (CAs)](/ssl/reference/certificate-authorities/) to issue certificates on your behalf.
54-
* The HTTP verification process is done preferably over **IPv6**, so if any `AAAA` record exists and does not point to the same dual-stack location as the `A` record, the validation will fail.
53+
- [DNSSEC](https://www.cloudflare.com/learning/dns/dns-security/) must be configured correctly. You can use [DNSViz](https://dnsviz.net/) to understand and troubleshoot the deployment of DNSSEC.
54+
- Your [CAA records](/ssl/edge-certificates/caa-records/) should allow Cloudflare's partner [certificate authorities (CAs)](/ssl/reference/certificate-authorities/) to issue certificates on your behalf.
55+
- The HTTP verification process is done preferably over **IPv6**, so if any `AAAA` record exists and does not point to the same dual-stack location as the `A` record, the validation will fail.
5556

5657
## CA errors
5758

src/content/docs/terraform/tutorial/add-page-rules.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ cloudflare_page_rule.increase-security-on-expensive-page: Creation complete afte
236236
Apply complete! Resources: 2 added, 0 changed, 0 destroyed.
237237
```
238238
239-
With the Page Rules in place, try that call again, along with a test for the I'm Under Attack mode:
239+
With the Page Rules in place, try that call again, along with a test for the Under Attack mode:
240240
241241
```sh
242242
curl -vso /dev/null https://www.example.com/old-location.php 2>&1 | grep "< HTTP\|Location"
@@ -255,4 +255,4 @@ curl -vso /dev/null https://www.example.com/expensive-db-call 2>&1 | grep "< HTT
255255
< HTTP/1.1 503 Service Temporarily Unavailable
256256
```
257257
258-
The call works as expected. In the first case, the Cloudflare global network responds with a `301` redirecting the browser to the new location. In the second case, the Cloudflare global network initially responds with a `503`, which is consistent with the I'm Under Attack mode.
258+
The call works as expected. In the first case, the Cloudflare global network responds with a `301` redirecting the browser to the new location. In the second case, the Cloudflare global network initially responds with a `503`, which is consistent with the Under Attack mode.

src/content/docs/waf/tools/ip-access-rules/actions.mdx

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,16 @@ sidebar:
66
head:
77
- tag: title
88
content: IP Access rules actions
9-
109
---
1110

1211
An IP Access rule can perform one of the following actions:
1312

14-
* **Block**: Prevents a visitor from visiting your site.
13+
- **Block**: Prevents a visitor from visiting your site.
1514

16-
* **Allow**: Excludes visitors from all security checks, including [Browser Integrity Check](/waf/tools/browser-integrity-check/), [I'm Under Attack Mode](/fundamentals/reference/under-attack-mode/), and the WAF. Use this option when a trusted visitor is being blocked by Cloudflare's default security features. The *Allow* action takes precedence over the *Block* action. Note that allowing a given country code will not bypass WAF managed rules (previous and new versions).
15+
- **Allow**: Excludes visitors from all security checks, including [Browser Integrity Check](/waf/tools/browser-integrity-check/), [Under Attack mode](/fundamentals/reference/under-attack-mode/), and the WAF. Use this option when a trusted visitor is being blocked by Cloudflare's default security features. The _Allow_ action takes precedence over the _Block_ action. Note that allowing a given country code will not bypass WAF managed rules (previous and new versions).
1716

18-
* **Managed Challenge**: Depending on the characteristics of a request, Cloudflare will dynamically choose the appropriate type of challenge from a list of possible actions. For more information, refer to [Cloudflare challenges](/waf/reference/cloudflare-challenges/#managed-challenge-recommended).
17+
- **Managed Challenge**: Depending on the characteristics of a request, Cloudflare will dynamically choose the appropriate type of challenge from a list of possible actions. For more information, refer to [Cloudflare challenges](/waf/reference/cloudflare-challenges/#managed-challenge-recommended).
1918

20-
* **JavaScript Challenge**: Presents the [I'm Under Attack Mode](/fundamentals/reference/under-attack-mode/) interstitial page to visitors. The visitor or client must support JavaScript. Useful for blocking DDoS attacks with minimal impact to legitimate visitors.
19+
- **JavaScript Challenge**: Presents the [Under Attack mode](/fundamentals/reference/under-attack-mode/) interstitial page to visitors. The visitor or client must support JavaScript. Useful for blocking DDoS attacks with minimal impact to legitimate visitors.
2120

22-
* **Interactive Challenge**: Requires the visitor to complete an interactive challenge before visiting your site. Prevents bots from accessing the site.
21+
- **Interactive Challenge**: Requires the visitor to complete an interactive challenge before visiting your site. Prevents bots from accessing the site.

src/content/docs/waf/troubleshooting/facebook-sharing.mdx

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,26 +4,25 @@ source: https://support.cloudflare.com/hc/en-us/articles/217720788-Troubleshooti
44
title: Issues sharing to Facebook
55
sidebar:
66
order: 2
7-
87
---
98

10-
import { GlossaryTooltip } from "~/components"
9+
import { GlossaryTooltip } from "~/components";
1110

12-
Cloudflare does not block or challenge requests from Facebook by default. However, a post of a website to Facebook returns an *Attention Required* error in the following situations:
11+
Cloudflare does not block or challenge requests from Facebook by default. However, a post of a website to Facebook returns an _Attention Required_ error in the following situations:
1312

14-
* You have globally set the [security level](/waf/tools/security-level/) to *I'm Under Attack*.
15-
* There is a [configuration rule](/rules/configuration-rules/) or [page rule](/rules/page-rules/) setting the security level to *I'm Under Attack*.
16-
* There is a [custom rule](/waf/custom-rules/) with a challenge or block action that includes a Facebook IP address.
13+
- You have globally set the [security level](/waf/tools/security-level/) to _I'm Under Attack_.
14+
- There is a [configuration rule](/rules/configuration-rules/) or [page rule](/rules/page-rules/) setting turning on Under Attack mode.
15+
- There is a [custom rule](/waf/custom-rules/) with a challenge or block action that includes a Facebook IP address.
1716

1817
A country challenge can block a Facebook IP address. Facebook is known to crawl from both the US and Ireland.
1918

2019
## Resolution
2120

2221
To resolve issues sharing to Facebook, do one of the following:
2322

24-
* Remove the corresponding IP, ASN, or country custom rule that challenges or blocks Facebook IPs.
25-
* Create a [skip rule](/waf/custom-rules/skip/) for <GlossaryTooltip term="autonomous system numbers (ASNs)">ASNs</GlossaryTooltip> `AS32934` and `AS63293` (use the *Skip* action and configure the rule to skip **Security Level**).
26-
* Review existing configuration rules and Page Rules and make sure they are not affecting requests from Facebook IPs.
23+
- Remove the corresponding IP, ASN, or country custom rule that challenges or blocks Facebook IPs.
24+
- Create a [skip rule](/waf/custom-rules/skip/) for <GlossaryTooltip term="autonomous system numbers (ASNs)">ASNs</GlossaryTooltip> `AS32934` and `AS63293` (use the _Skip_ action and configure the rule to skip **Security Level**).
25+
- Review existing configuration rules and Page Rules and make sure they are not affecting requests from Facebook IPs.
2726

2827
If you experience issues with Facebook sharing, you can re-scrape pages via the **Fetch New Scrape Information** option on Facebook's Object Debugger. Facebook [provides an API](https://developers.facebook.com/docs/sharing/opengraph/using-objects) to help update a large number of resources.
2928

src/content/partials/waf/security-level-scores.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ The available security levels are the following:
1919

2020
Selecting a higher **Security Level** value means that even requests with a lower risk (that is, with a low [threat score](#threat-score)) will be challenged. Selecting a lower **Security Level** value means that only requests posing a higher risk (that is, with a high threat score) will be challenged.
2121

22-
Security levels from _Essentially off_ to _High_ will challenge the visitor using a Managed Challenge. When you select _I'm Under Attack!_, which enables [I'm Under Attack mode](/fundamentals/reference/under-attack-mode/), Cloudflare will present a JS challenge page.
22+
Security levels from _Essentially off_ to _High_ will challenge the visitor using a Managed Challenge. When you select _I'm Under Attack!_, which enables [Under Attack mode](/fundamentals/reference/under-attack-mode/), Cloudflare will present a JS challenge page.
2323

2424
:::caution
2525

26-
Only use [I'm Under Attack mode](/fundamentals/reference/under-attack-mode/) when a website is under a DDoS attack. I'm Under Attack mode may affect some actions on your domain, such as your API traffic.
26+
Only use [Under Attack mode](/fundamentals/reference/under-attack-mode/) when a website is under a DDoS attack. Under Attack mode may affect some actions on your domain, such as your API traffic.
2727

2828
To set a custom security level for your API or any other part of your domain, create a [configuration rule](/rules/configuration-rules/).
2929
:::

0 commit comments

Comments
 (0)