Last Modified: Nov 07, 2022
See more info
Known Affected Versions:
14.0.0, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 14.0.1, 188.8.131.52, 14.1.0, 184.108.40.206
Opened: Oct 29, 2018
When using BDoS feature for DNS protocol, and when there are auto-generated DNS Signatures or if Custom DNS signatures are configured manually, it is found that at times, a valid DNS request is dropped because it wrongly matches the configured/dynamically generated DNS Signature when the box is under load, and BDoS mitigation is ongoing.
When box is under load, the configured DNS signature gets into Attack Mitigation mode (which is normal), but may wrongly drop a DNS packet that does not match the signature.
Configured DNS Signature (Or) there exists a Dynamically generated DNS Signature. Such a DNS signature is found to match a DNS packet wrongly, even though the signature match criteria is different from the matched DNS packet.
Disable BDoS for protocol DNS. Also, do not use Manually configured DNS Signatures.
The parsed DNS information is cached and re-used wrongly as a performance optimization, which is corrected.