<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DoS attack violation identified when using x-dynatrace field in Real User Monitoring</title>
    <link>https://community.dynatrace.com/t5/Real-User-Monitoring/DoS-attack-violation-identified-when-using-x-dynatrace-field/m-p/175197#M3180</link>
    <description>&lt;P&gt;I would recommend to have in consideration that to fully enable RUM, you must verify the configuration of your firewalls, proxies, and web servers and allow all required data to pass through. I leave the link to the article.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/real-user-monitoring/setup-and-configuration/web-applications/initial-configuration/firewall-constraints-for-rum/" target="_blank"&gt;https://www.dynatrace.com/support/help/how-to-use-dynatrace/real-user-monitoring/setup-and-configuration/web-applications/initial-configuration/firewall-constraints-for-rum/&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 01 Nov 2021 05:14:01 GMT</pubDate>
    <dc:creator>DanielS</dc:creator>
    <dc:date>2021-11-01T05:14:01Z</dc:date>
    <item>
      <title>DoS attack violation identified when using x-dynatrace field</title>
      <link>https://community.dynatrace.com/t5/Real-User-Monitoring/DoS-attack-violation-identified-when-using-x-dynatrace-field/m-p/166529#M2755</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We are using the x-dynatrace header field to monitor the messages by injecting from the Dynatrace Agent. And some of the requests are blocked due to "Jackson data-bind BigDecimal DoS (Header)". In this case, the x-dynatrace field got value as below,&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT size="2"&gt;X-dynaTrace: FW4;-428057869;14;-1830560483;6305125;0;1075664345;735;639a;1h0101c1d4d840c1e2f1f3f7e2e4d7f140404060a9804f20&lt;FONT color="#FF0000"&gt;172e100000000&lt;/FONT&gt;000000000000000000000000000000000000000004c533234375349503200433030302e4541492e4f524445525355425245535000;2h01;3h92e3dd1d;4h603565;5h01&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;The above Highlighted value is the detected keyword for&amp;nbsp;Jackson data-bind BigDecimal Denial of Service.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The F5 WAF blocks the request as it contains "e100000000" in the header value. This will be detected by F5 WAF rules as a DOS attack based on the CVE security flaws (&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000873" target="_self"&gt;https://nvd.nist.gov/vuln/detail/CVE-2018-1000873&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;How can we skip generating the values with highlighted value?&lt;/P&gt;
&lt;P&gt;Is this common issue and what are the resolutions that we can try to fix this issue?&lt;/P&gt;
&lt;P&gt;What is the structure/format of x-dynatrace header? Is it possible to configure at OneAgent level?&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 13:58:58 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Real-User-Monitoring/DoS-attack-violation-identified-when-using-x-dynatrace-field/m-p/166529#M2755</guid>
      <dc:creator>sriaravind</dc:creator>
      <dc:date>2021-05-25T13:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: DoS attack violation identified when using x-dynatrace field</title>
      <link>https://community.dynatrace.com/t5/Real-User-Monitoring/DoS-attack-violation-identified-when-using-x-dynatrace-field/m-p/167899#M2822</link>
      <description>&lt;P&gt;I would recommend opening a support ticket on this so support is aware of the issue and can put a solution in across the platform&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jun 2021 22:46:46 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Real-User-Monitoring/DoS-attack-violation-identified-when-using-x-dynatrace-field/m-p/167899#M2822</guid>
      <dc:creator>ChadTurner</dc:creator>
      <dc:date>2021-06-17T22:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: DoS attack violation identified when using x-dynatrace field</title>
      <link>https://community.dynatrace.com/t5/Real-User-Monitoring/DoS-attack-violation-identified-when-using-x-dynatrace-field/m-p/175197#M3180</link>
      <description>&lt;P&gt;I would recommend to have in consideration that to fully enable RUM, you must verify the configuration of your firewalls, proxies, and web servers and allow all required data to pass through. I leave the link to the article.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/real-user-monitoring/setup-and-configuration/web-applications/initial-configuration/firewall-constraints-for-rum/" target="_blank"&gt;https://www.dynatrace.com/support/help/how-to-use-dynatrace/real-user-monitoring/setup-and-configuration/web-applications/initial-configuration/firewall-constraints-for-rum/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 05:14:01 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Real-User-Monitoring/DoS-attack-violation-identified-when-using-x-dynatrace-field/m-p/175197#M3180</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2021-11-01T05:14:01Z</dc:date>
    </item>
  </channel>
</rss>

