Bug ID 680244: Unable to force Bot Defense action to captcha_challenge in iRule for Suspicious Browsers

Last Modified: May 29, 2024

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
12.1.2, 12.1.3,,,,,,,, 12.1.4,, 12.1.5,,,, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1

Fixed In:

Opened: Aug 25, 2017

Severity: 3-Major

Related Article: K25415554


When a request is being blocked (tcp_rst) due to being a suspicious browser, the action cannot be forced to captcha_challenge in the iRule.


The bot defense action cannot be forced to 'captcha_challenge'. The TCP RST will still be sent.


This occurs when a tcp_rst bot defense action is triggered on a suspicious browser, and you want to change the action to captcha_challenge.


Change the dosl7.browser_legit_min_score_drop db variable so that all suspicious browsers will be responded with the CAPTCHA challenge instead of getting blocked. To do so, run the following command: tmsh modify sys db dosl7.browser_legit_min_score_drop value 999 Then, you can selectively block requests using the 'BOTDEFENSE::action tcp_rst' command in selected conditions.

Fix Information

It is now possible to use BOTDEFENSE iRules to change the action of a Suspicious Browser from tcp_rst to captcha_challenge.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips