Forum Discussion
HTTP Protocol Compliance Failed: Header name with no header value
Hi,
I am getting the following blocked request:
Header 'User-ID' has no value.
POST /abcd/api/checkActivatedWatch HTTP/1.1 Host: new.temporary.com Content-Type: application/json Accept: / Connection: keep-alive UserID: User-Agent: *********%20Extension/2 CFNetwork/759.3.2 Darwin/15.4.0 Accept-Language: en-us Content-Length: 0
6 Replies
- Yann_Desmarest_
Nacreous
Hello,
What is the question ? You effectively have an header named UserID and there is no value assigned to it so ASM trigger this blocking action. You can uncheck this setting within "Security >> Blocking >> Settings >> HTTP Protocol Compliance Failed" section
- MSZ
Nimbostratus
This will be applied on all headers. I need to do only with one header. one option I know is to create the iRule. But is there any other option?
Hello,
What is the question ? You effectively have an header named UserID and there is no value assigned to it so ASM trigger this blocking action. You can uncheck this setting within "Security >> Blocking >> Settings >> HTTP Protocol Compliance Failed" section
- MSZ
Nimbostratus
This will be applied on all headers. I need to do only with one header. one option I know is to create the iRule. But is there any other option?
Hello,
Unfortunately, you can do it only using an irule . The HTTP Headers section can't help as you can just disable Evasion Techniques from checking
You can use an irule to override the blocking action : https://devcentral.f5.com/wiki/iRules.ASM__unblock.ashx
or sanitize the UserID header when it's blank
- Charles_RosenbeHistoric F5 Account
If you know exactly what circumstances you will see a blank value for that header, you might be able to utilize that logic to use a different ASM policy when you expect a blank value. Local Traffic Policies give you some level of logic control without using iRules and if the logic is applicable, you could create a separate policy where that violation was disabled, enable that ASM policy using the traffic policy logic and use your main policy at other times. This would have less impact than iRules.
Basically the idea would be to use traffic policies to determine which ASM policy to use. One policy would have that violation enabled and another would have it disabled. The local traffic policy would then enable the appropriate policy.
This is all dependent upon the ability to determine under what conditions that header would show up as blank - certain urls, certain cookies, etc.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com