<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Changelog · DDoS Protection</title><link>https://developers.cloudflare.com/ddos-protection/change-log/</link><description>Updates to DDoS Protection</description><language>en-us</language><atom:link href="https://developers.cloudflare.com/ddos-protection/change-log/index.xml" rel="self"/><lastBuildDate>Mon, 03 Jun 2024 08:00:00 EST</lastBuildDate><item><title>DDoS alerts now available for EU CMB customers</title><link>https://developers.cloudflare.com/ddos-protection/change-log/general-updates/#ddos-alerts-now-available-for-eu-cmb-customers</link><description>&lt;a href=https://developers.cloudflare.com/ddos-protection/reference/alerts/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">DDoS alerts&lt;/span>&lt;/a> are now available for EU Customer Metadata Boundary (CMB) customers. This includes all DDoS alert type (Standard and Advanced) for both HTTP DDoS attacks and L3/4 DDoS attacks.</description><pubDate>Mon, 03 Jun 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - Scheduled changes for 2024-04-29</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/scheduled-changes/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Announcement Date&lt;/th>
&lt;th>Change Date&lt;/th>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>2024-04-19&lt;/td>
&lt;td>2024-04-29&lt;/td>
&lt;td>&lt;code class="ruleID"> &lt;span class="ruleID" title="Click to copy the full ID" onclick="navigator.clipboard.writeText(&amp;#34;0a07c24f3cd44a57a5c19b73d2f294d7&amp;#34;)">...d2f294d7&amp;nbsp;&lt;svg fill="currentColor" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" style="width: 16px;height: 18px;" class="icon-copy">&lt;path d="M14 1.5H6l-.5.5v2.5h1v-2h7v7h-2v1H14l.5-.5V2l-.5-.5z">&lt;/path>&lt;path d="M2 5.5l-.5.5v8l.5.5h8l.5-.5V6l-.5-.5H2zm7.5 8h-7v-7h7v7z">&lt;/path>&lt;/svg>&lt;/span>&lt;/code>&lt;/td>
&lt;td>HTTP requests trying to impersonate browsers.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Expand rule to catch more attacks&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 19 Apr 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-04-19</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-04-19/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>&lt;code class="ruleID"> &lt;span class="ruleID" title="Click to copy the full ID" onclick="navigator.clipboard.writeText(&amp;#34;4dc034ab293145e4b0b27e20154b29a0&amp;#34;)">...154b29a0&amp;nbsp;&lt;svg fill="currentColor" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" style="width: 16px;height: 18px;" class="icon-copy">&lt;path d="M14 1.5H6l-.5.5v2.5h1v-2h7v7h-2v1H14l.5-.5V2l-.5-.5z">&lt;/path>&lt;path d="M2 5.5l-.5.5v8l.5.5h8l.5-.5V6l-.5-.5H2zm7.5 8h-7v-7h7v7z">&lt;/path>&lt;/svg>&lt;/span>&lt;/code>&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #66).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 19 Apr 2024 08:00:00 EST</pubDate></item><item><title>Network Analytics now supported for EU CMB customers</title><link>https://developers.cloudflare.com/ddos-protection/change-log/general-updates/#network-analytics-now-supported-for-eu-cmb-customers</link><description>&lt;p>The Network Analytics dashboard is available to customers that have opted in to the EU &lt;a href=https://developers.cloudflare.com/data-localization/metadata-boundary/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Customer Metadata Boundary&lt;/span>&lt;/a> (CMB) solution. This also includes Network Analytics Logs (Logpush) and GraphQL API.&lt;/p>
&lt;p>API users can ensure they are routed properly by directing their API requests at &lt;code>eu.api.cloudflare.com&lt;/code>.&lt;/p></description><pubDate>Wed, 17 Apr 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-04-16 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-04-16-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>&lt;code class="ruleID"> &lt;span class="ruleID" title="Click to copy the full ID" onclick="navigator.clipboard.writeText(&amp;#34;767bd3e188fc46f79827e95e05ad9070&amp;#34;)">...05ad9070&amp;nbsp;&lt;svg fill="currentColor" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" style="width: 16px;height: 18px;" class="icon-copy">&lt;path d="M14 1.5H6l-.5.5v2.5h1v-2h7v7h-2v1H14l.5-.5V2l-.5-.5z">&lt;/path>&lt;path d="M2 5.5l-.5.5v8l.5.5h8l.5-.5V6l-.5-.5H2zm7.5 8h-7v-7h7v7z">&lt;/path>&lt;/svg>&lt;/span>&lt;/code>&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #64).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;code class="ruleID"> &lt;span class="ruleID" title="Click to copy the full ID" onclick="navigator.clipboard.writeText(&amp;#34;8655dc40759f43b9878b775d890b8f4e&amp;#34;)">...890b8f4e&amp;nbsp;&lt;svg fill="currentColor" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" style="width: 16px;height: 18px;" class="icon-copy">&lt;path d="M14 1.5H6l-.5.5v2.5h1v-2h7v7h-2v1H14l.5-.5V2l-.5-.5z">&lt;/path>&lt;path d="M2 5.5l-.5.5v8l.5.5h8l.5-.5V6l-.5-.5H2zm7.5 8h-7v-7h7v7z">&lt;/path>&lt;/svg>&lt;/span>&lt;/code>&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #65).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Tue, 16 Apr 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-04-04 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-04-04-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...177059f1&lt;/td>
&lt;td>HTTP requests from known botnet (signature #31).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...7b231fb2&lt;/td>
&lt;td>HTTP requests from known botnet (signature #81).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Thu, 04 Apr 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-04-02</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-04-02/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...d2f294d7&lt;/td>
&lt;td>HTTP requests trying to impersonate browsers.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Update the rule to match to block attacks more consistently.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Tue, 02 Apr 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - Network-layer DDoS managed ruleset - 2024-03-12</title><link>https://developers.cloudflare.com/ddos-protection/change-log/network/2024-03-12/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...85fa2e98&lt;/td>
&lt;td>Adaptive DDoS Protection for UDP Destination Ports (Available only to Enterprise accounts).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Enable rule that uses a customer's UDP destination port profile to
mitigate traffic (log mode by default).&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Tue, 12 Mar 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-02-26 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-02-26-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...6831bff1&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #35).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Extend the rule to catch attacks more comprehensively.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...e269dfd6&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #56).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Extend the rule to catch attacks more comprehensively.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 26 Feb 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-02-19</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-02-19/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...0fbfd5ae&lt;/td>
&lt;td>HTTP requests from known botnet (signature #32).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Expand rule logic to catch more attacks.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...3ad719cd&lt;/td>
&lt;td>HTTP requests from known botnet (signature #79).&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Expand the rule scope to catch more attacks.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 19 Feb 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-02-12</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-02-12/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...c47bdca6&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #62).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 12 Feb 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-02-08 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-02-08-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...3a679c52&lt;/td>
&lt;td>Requests coming from known bad sources.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>managed_challenge&lt;/td>
&lt;td>Expand the rule to mitigate on all zones.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Thu, 08 Feb 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-02-06 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-02-06-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...1fc1e601&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #31).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Modify characteristics of the unusual HTTP headers or URI path.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...3a679c52&lt;/td>
&lt;td>Requests coming from known bad sources.&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...3ad719cd&lt;/td>
&lt;td>HTTP requests from known botnet (signature #79).&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Expand the scope of the rule to match more attacks.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Tue, 06 Feb 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-02-05 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-02-05-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Extend the rule to catch more attacks.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 05 Feb 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-01-26 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-01-26-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...3ad719cd&lt;/td>
&lt;td>HTTP requests from known botnet (signature #79).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...61bc58d5&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #55).&lt;/td>
&lt;td>managed_challenge&lt;/td>
&lt;td>managed_challenge&lt;/td>
&lt;td>Expanded the scope of the rule to catch attacks more consistently.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 26 Jan 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-01-25</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-01-25/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...1fc1e601&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #31).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Add more characteristics to the unusual HTTP headers or URI path.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Thu, 25 Jan 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-01-23</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-01-23/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...1fc1e601&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #31).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Add more characteristics to the unusual HTTP headers or URI path.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...2de94fb2&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #3).&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Expand rule scope to catch more attacks.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...2f8d9a4f&lt;/td>
&lt;td>HTTP requests from known botnet (signature #78).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Tue, 23 Jan 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2024-01-05</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2024-01-05/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...2de94fb2&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #3).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Fine-tune the characteristics of the unusual requests.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...177059f1&lt;/td>
&lt;td>HTTP requests from known botnet (signature #31).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>Removed due to false positives.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...6fe7a312&lt;/td>
&lt;td>HTTP requests from known botnet (signature #70).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>Removed due to false positives.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...82c0ed5f&lt;/td>
&lt;td>HTTP requests from known botnet (signature #77).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...e4f3ea4d&lt;/td>
&lt;td>HTTP requests from known botnet (signature #76).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 05 Jan 2024 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-12-19 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-12-19-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...1fc1e601&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #31).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Add more characteristics to the unusual HTTP headers or URI path.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>log&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Extend the rule to catch more attacks.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...d2f294d7&lt;/td>
&lt;td>HTTP requests trying to impersonate browsers.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Change the rule to catch more attacks.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Tue, 19 Dec 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-12-14 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-12-14-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...6fe7a312&lt;/td>
&lt;td>HTTP requests from known botnet (signature #70).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Tweak the rule to avoid false positives in some rare cases.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Thu, 14 Dec 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-12-08 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-12-08-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...6fe7a312&lt;/td>
&lt;td>HTTP requests from known botnet (signature #70).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Updated the rule to avoid false positives in some rare circumstances.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...e7a37252&lt;/td>
&lt;td>HTTP requests from known botnet (signature #75).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 08 Dec 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-11-29</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-11-29/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...8ed59b32&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #61).&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Rename rule to avoid confusion.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...61e8d513&lt;/td>
&lt;td>Global L7 WordPress attack mitigations (Deprecated)&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Mark rule as deprecated.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Wed, 29 Nov 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-11-22</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-11-22/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...254da96a&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #58).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Wed, 22 Nov 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-11-13 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-11-13-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Improve this filter to catch more attacks.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...6fe7a312&lt;/td>
&lt;td>HTTP requests from known botnet (signature #70).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...7c7a2f25&lt;/td>
&lt;td>HTTP requests from known botnet (signature #74).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...d2f294d7&lt;/td>
&lt;td>HTTP requests trying to impersonate browsers.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 13 Nov 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-11-10 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-11-10-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...7d0f1e5f&lt;/td>
&lt;td>HTTP requests from known botnet (signature #72).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...94547a95&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #59).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...e269dfd6&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #56).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Enable filter early to mitigate widespread impact.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...f35a42a0&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #57).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Enable filter early to mitigate widespread impact.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 10 Nov 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-10-19</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-10-19/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...61bc58d5&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #55).&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Requests will be challenged by default, larger attacks are blocked.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Thu, 19 Oct 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-10-11</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-10-11/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...35675e08&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #24).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>This rule can cause rare false positives with custom apps sending invalid
headers.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Wed, 11 Oct 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-10-09 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-10-09-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...02bbdce1&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #47).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...493cb8a8&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #52).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...5c344623&lt;/td>
&lt;td>HTTP requests from uncommon clients&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...6363bb1b&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #48).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...c1fbd175&lt;/td>
&lt;td>HTTP requests trying to impersonate browsers (pattern #4).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 09 Oct 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-09-24 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-09-24-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...0fb54442&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #49).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...3dd5f188&lt;/td>
&lt;td>HTTP requests from known botnet (signature #71).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...97003a74&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #17).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Expand rule to catch more attacks.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Sun, 24 Sep 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-09-21 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-09-21-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...1d73128d&lt;/td>
&lt;td>HTTP requests from known botnet (signature #56).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Make the rule customizable as it might cause false positive in rare cases.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...4a95ba67&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #32).&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Expand the scope of the rule to catch more attacks.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...6fe7a312&lt;/td>
&lt;td>HTTP requests from known botnet (signature #70).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Update the rule to remove some rare false positives.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Thu, 21 Sep 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-09-05 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-09-05-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Expand filter to catch attacks more comprehensively.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...4346874d&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #46).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...6fe7a312&lt;/td>
&lt;td>HTTP requests from known botnet (signature #70).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Expand filter to catch more attacks. It is now configurable.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Tue, 05 Sep 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-08-30 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-08-30-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...46082508&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #45).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Wed, 30 Aug 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-08-29 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-08-29-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>managed_challenge&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...3fe55678&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #44).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Tue, 29 Aug 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-08-25 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-08-25-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...20c5afb5&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #36).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>This rule was previously readonly, but can cause false positives in rare
cases. It is now possible to override it.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...cb26e2e2&lt;/td>
&lt;td>HTTP requests from known botnet (signature #69).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...ebff5ef1&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #43).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 25 Aug 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-08-16 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-08-16-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...9721fd20&lt;/td>
&lt;td>HTTP requests trying to impersonate browsers (pattern #3).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Wed, 16 Aug 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-08-14</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-08-14/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>managed_challenge&lt;/td>
&lt;td>Expand the filter to catch more attacks.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...d2f294d7&lt;/td>
&lt;td>HTTP requests trying to impersonate browsers.&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>Expand the filter to catch more attacks.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 14 Aug 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-08-11 - Emergency</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-08-11-emergency/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...1de9523e&lt;/td>
&lt;td>HTTP requests with unusual HTTP headers or URI path (signature #41).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...22807318&lt;/td>
&lt;td>HTTP requests from known botnets.&lt;/td>
&lt;td>managed_challenge&lt;/td>
&lt;td>ddos_dynamic&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...aa03a345&lt;/td>
&lt;td>HTTP requests from known botnet (signature #68).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...efca86eb&lt;/td>
&lt;td>HTTP requests from known botnet (signature #66).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...f93fb5d6&lt;/td>
&lt;td>HTTP requests from known botnet (signature #67).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 11 Aug 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - HTTP DDoS managed ruleset - 2023-07-31</title><link>https://developers.cloudflare.com/ddos-protection/change-log/http/2023-07-31/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...9aec0913&lt;/td>
&lt;td>HTTP requests from known botnet (signature #52).&lt;/td>
&lt;td>block&lt;/td>
&lt;td>block&lt;/td>
&lt;td>Expose existing read-only filter publicly as it might cause false positives
in rare cases.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...c5f479f0&lt;/td>
&lt;td>HTTP requests from known botnet (signature #62).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...d0e36f9c&lt;/td>
&lt;td>HTTP requests from known botnet (signature #63).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>block&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 31 Jul 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - Network-layer DDoS managed ruleset - 2023-07-31</title><link>https://developers.cloudflare.com/ddos-protection/change-log/network/2023-07-31/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...aa772b5c&lt;/td>
&lt;td>Adaptive DDoS Protection for Location-Based UDP (Available only to Enterprise accounts).&lt;/td>
&lt;td>N/A&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Enable UDP geolocation Adaptive DDoS rule&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Mon, 31 Jul 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - Network-layer DDoS managed ruleset - 2023-04-17</title><link>https://developers.cloudflare.com/ddos-protection/change-log/network/2023-04-17/</link><description>
&lt;p>Previously, only a subset of rules were exposed publicly. In rare situations, these rules can cause false positives. When this happens, you can customize their behavior using overrides.&lt;/p>
&lt;p>Besides these rules, the DDoS managed rules contain other rules that do not cause issues. Until now, these rules were not shown in the dashboard or referenced in the documentation.&lt;/p>
&lt;p>Cloudflare now shows all rules in the dashboard, including these high-confidence rules. This means that packets matching these rules will now have the correct rule identifier. The newly published rules are read-only and you cannot disable them.&lt;/p></description><pubDate>Mon, 17 Apr 2023 08:00:00 EST</pubDate></item><item><title>DDoS Protection - Network-layer DDoS managed ruleset - 2022-12-02</title><link>https://developers.cloudflare.com/ddos-protection/change-log/network/2022-12-02/</link><description>
&lt;table style="width: 100%">
&lt;thead>
&lt;tr>
&lt;th>Rule ID&lt;/th>
&lt;th>Description&lt;/th>
&lt;th>Previous Action&lt;/th>
&lt;th>New Action&lt;/th>
&lt;th>Notes&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>...58e4914a&lt;/td>
&lt;td>Adaptive DDoS Protection for UDP (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...76d5e15c&lt;/td>
&lt;td>Adaptive DDoS Protection for Other IPv6 Protocols (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...8de83ef6&lt;/td>
&lt;td>Adaptive DDoS Protection for IPv6 GRE (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...938e978c&lt;/td>
&lt;td>Adaptive DDoS Protection for IPv6 ESP (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...9c173480&lt;/td>
&lt;td>Adaptive DDoS Protection for ICMP (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...ad8078b8&lt;/td>
&lt;td>Adaptive DDoS Protection for IPv4 GRE (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...ae3f5e4e&lt;/td>
&lt;td>Adaptive DDoS Protection for ICMPv6 (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...c7dc52df&lt;/td>
&lt;td>Adaptive DDoS Protection for Other IPv4 Protocols (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>...e4e7541c&lt;/td>
&lt;td>Adaptive DDoS Protection for IPv4 ESP (Available only to Enterprise accounts).&lt;/td>
&lt;td>log&lt;/td>
&lt;td>log&lt;/td>
&lt;td>Lower sensitivity to avoid false positives&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table></description><pubDate>Fri, 02 Dec 2022 08:00:00 EST</pubDate></item></channel></rss>