Bug ID 461245: DoS WhiteList entry with ipproto specified will not work correctly for fragments

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP AFM(all modules)

Known Affected Versions:
11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.5.10, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.0.0

Opened: May 08, 2014

Severity: 2-Critical

Symptoms

If a DoS whitelist entry has an IP protocol specified, and IP fragments are received for that IP protocol, then the whitelist entry is not matched correctly. This can cause the whitelist to miss such packets.

Impact

In this situation, AFM DoS rate limits might rate-limit whitelisted fragmented packets.

Conditions

AFM DoS whiteList entry with an IP protocol field specified.

Workaround

To avoid this, do not specify an IP protocol for a DoS whitelist entry.

Fix Information

AFM DoS white lists will now correctly process IP fragments for white list entries with an IP protocol specified.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips