Skip to content
Product Documentation

Web Application Firewall (WAF) Update Log

Arc provides a standardized WAF configuration for OWASP and reputation (score per IP address) for all sites which is continuously adjusted depending on public conditions.

This page is a running log of changes that are occurring within client sites. Monitor this page to keep up to date with changes which may impact your sites.

Why do we make changes

Changes are usually driven in response to alerting on customer sites. High levels of malicious activity, errors triggered on client sites, or high levels of traffic can all trigger alerts which may result in a configuration change depending on the analysis of the alert. Changes can also be triggered by non-technical events such as notifications from 3rd parties about activity targeting Arc clients or discovery made by Arc staff. Once Arc investigates the alert we may chose to take action to mitigate the traffic. Logging every action would add unneeded volume to this log so the following guidelines are used when noting changes:

  • New OWASP changes are updated automatically and are not recorded in this log, but changes to OWASP policies which are due to alerts are if they are global.
  • IP Reputation scores are determined heuristically and change quickly over time and the score for individual IP’s are not recorded in this log.
  • Changes to IP reputation score thresholds for mitigation will be posted
  • Changes to the OWASP policy enforcement (SQL injection, CMDi, XSS, etc) will be posted. Currently ALL OWASP categories are denied on requests managed by Arc.
  • Changes which are implemented to block overtly malicious activity against a single client may not be logged if there is little risk of the change impacting legitimate activity on other clients.

Change Log

DateChangeImpact
N/ARequests sourcing from some VULTR owned IP blocks are being blocked due to activity across multiple customers.Requests connecting from 198.13.54.0/24 will be denied
N/AArc identified Ad scraping site using Arc as source for content is blockedRequests connecting from 51.15.250.49 will be denied
10/1/20Arc has whitelisted parse.ly requests from its reputation score. The crowdsourced score for parse.ly was triggering sporadic denies which is not reflected in their activity to Arc clients. The whitelist is subject to the public IP space parse.ly provided at the time of the event, changes by parse.ly going forward may not be accounted for.Customers using parse.ly should see normal service unless there are operational changes by parse.ly
10/9/20Arc is currently tracking a series of ad fraud sites impacting multiple customers and has implemented a blocked based on fingerprinting of the source hosts.Client requests matching the fingerprint will be served an “invalid site” message.
11/19/20Arc has changed handling of the x-fb-session-id header due to false positive triggersRequests with header patterns that were falsely triggering attack rules will now succeed.
8/13/2021Rate limits have been added for the ‘newspaper/0/2/8andBLP_bbot/0.1` User Agents due to sustained abusive scraping activity
11/28/2022Access by Qualys has been blocked due to unauthorized usage of their infrastructure to perform abusive security scansClients using Qualys security scans will receive 403 responses.
1/4/2023Access from a fingerprint based out of Hetzner Online has be blockedClients matching the fingerprint will receive 403 responses.
10/12/2023Access by the bytespider user agents has been blocked due to excessive bandwidth and resource usageRequests from the 2 primary bytespider user agents will receive 403 responses.
9/9/2024Access by some python-requests UA’s based from specific fingerprints was restricted due to excessive site scrapingRequests will receive a 403 response.