Forum Discussion
Viewing F5 provided ASM attack signature
Hi experts.
I noticed signatures that are matching certain strings (e.g. "more", "at", "id", "tar") in HTTP transactions may be quite dangerous in terms of false positives. There are many occurrences in our environment where legitimate user traffic carries such "words" in parameter values or URL paths.
Does F5 ASM allow one to validate (read, analyze) the F5 provided signatures syntax (regex ...) in order to understand, how they are being triggered? Please note that I am only asking about F5 default signature sets, not user-defined ones (those I know one is allowed to edit and export).
Regards, mm
2 Replies
i believe officially F5 states they are not accessible. but there are knowledge base articles that explain how to examine the databases ASM uses and those signatures are in one of those.
https://support.f5.com/kb/en-us/solutions/public/6000/900/sol6979.html
- Erik_Novak
Employee
Boneyard is correct. Attack signatures are intellectual property:
https://support.f5.com/kb/en-us/solutions/public/8000/700/sol8771.html
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com