Welcome to DevCentral

 

Featured Articles

Optimizing the CVE-2015-1635 iRule

A couple days ago an iRule was published that mitigates Microsoft’s HTTP.sys vulnerability described in CVE-2015-1635 and MS15-034. It’s a short rule, but it features the dreaded regex. Every time I get the chance at user groups, conferences,...

F5 Synthesis: Delivering Web Application Security in the Cloud as a Service

Web application security. Everyone knows how important it is (and if they don't, they should) and yet the complexity of managing services that provide it often result in, shall we say, less than holistic coverage of applications. At least tha...

DNS Interception: Protecting the Client

Introduction Everything starts with a DNS request. So why not use it to protect the client? With the recent addition of Secure Web Gateway Services to the F5 line up of modules in TMOS 11.5, it provided the ability to access a URL Categorization...

DevOps 101 - A Brief History Of Time

If you have anything to do with developing products or working in IT helping to deploy and run them, chances are you have heard the term "DevOps" in one form or another. Just like the ubiquitous "Cloud" floating out in the Internet somewhere, DevOps has become a catch-all phrase for anything that is Developer or Operations related.

Recent Articles

F5 Friday: App Proxy or ADC?

Choosing between BIG-IP and LineRate isn't as difficult as it seems.... Our recent announcement of the availability of LineRate Point raised the same question over and over: isn't this just a software-version of BIG-IP? How do I know when to choose LineRate Point instead of BIG-IP VE (Virtual Edition)? Aren't they the same?? No, no they aren't. LineRate Point (and really Line...

Optimizing the CVE-2015-1635 iRule

A couple days ago an iRule was published that mitigates Microsoft’s HTTP.sys vulnerability described in CVE-2015-1635 and MS15-034. It’s a short rule, but it features the dreaded regex. Every time I get the chance at user groups, conferences, webinars, I preach the evils of regex on the data plane. One of the many reasons it is not the best choice is that just calling the regex engine is the...

Node.js ABC’s - E is for Events

Node.js has it's basis in asynchronous programming. Also known as Event-driven programming, asynchronous development gives the programmer a way to write a program in such a way as to not block the progress of the program while waiting for a long-lived task to complete.  Input/Output processing for local resources such as file system access or for remote network based content such as...

RSA 2015 - The Preview Video

I give a preview of RSA 2015, running April 20 – 23 in San Francisco’s Moscone Center. F5 will showcase a number of solutions that help organizations defend against the threats to their data and protect the perimeter. Visit us in Booth 1515 to learn about solutions like our Silverline Cloud based WAF and DDoS protection, along with secure mobility, SSL Everywhere and Web Fraud Protection...

F5 Silverline: Getting the most out of your WAF

Traditional network firewalls (Layer 3-4) do a great job of preventing outsiders from accessing internal networks. But, these firewalls offer little to no support in the protection of application layer traffic.  Attack vectors today are being introduced at all layers of the network. For example, the Slowloris and HTTP Flood attacks are Layer 7 attacks...a traditional network firewall would...

Billionaires, Icons and Movie Stars – Why Geek Is Now Chic

Over the past few years we’ve seen the unstoppable rise of the geek. From popular culture to big business, the geeks have inherited the earth. They’re the billionaires, the modern day rock stars, and their many achievements have resulted in a significant change to their status in popular society. They are now often championed, given the limelight or even imitated - geek is now chic!...

F5 Predicts: Where will innovation come from in 2015?

In 2014, the charismatic leader of one of the world’s largest democracies, who won the presidency with promises of change and savvy use of social media, turned to the Internet to crowdsource his Cabinet – inviting average citizens to provide input and suggestions online. No, it wasn’t President Obama. In fact, it was President Joko Widodo of Indonesia. Surprised? Well, maybe you shouldn’t...

Using iRules to mitigate Microsoft's MS15-034 / CVE-2015-1635 Range vulnerability

As more information becomes available regarding the recently published Range vulnerability affecting Microsoft platforms (see MS15-034and CVE-2015-1635), you can start mitigating this issue for your backend applications using the following iRule that would remove the Range header when large ranges are detected. Additonal mitigations have been published: Using ASM...

LineRate: Range header attack mitigation

Using the LineRate Node.js engine to mitigate HTTP Range header attacks on backend systems The latest details are emerging about a Range header vulnerability in Microsoft IIS (see MS15-034 and CVE-2015-1635). There have been other previous exploits in the byte range header, as well. F5 has several products available that can protect your backend servers from these exploits, including BIG-I...

Mitigating Remote Code Execution in "HTTP.sys" (CVE-2015-1635)

A critical Windows vulnerability in its HTTP stack ("HTTP.sys"), which was resolved in a recent Microsoft's Patch Tuesday release, could allow remote attackers to execute code on an IIS server with the privileges of the System account. A Proof-of-Concept code to check the existence of this vulnerability was soon to follow. Remote attackers could exploit the way...

Recent Questions and Answers

OTS02 189 answered the question stream profile to detect only?
7 minutes ago Read More
Ibrahim Barngarwala 1 answered the question hide os information
20 minutes ago Read More
nitass 10056 answered the question stream profile to detect only?
38 minutes ago Read More
OTS02 189 asked the question stream profile to detect only?
57 minutes ago Read More
nitass 10056 answered the question I rule for http response 403 & 404
1 hour ago Read More
Piotr_L 201 answered the question irule only working intermittently
2 hours ago Read More
kunjan 2236 answered the question booting issue after a fail over
2 hours ago Read More
nitass 10056 answered the question booting issue after a fail over
2 hours ago Read More
aliakbargholami 2 asked the question booting issue after a fail over
2 hours ago Read More
More Questions »