Security

22nd February 2017

in Security

Not so sweet, Sweet32 vulnerability…

Posted by Dave Saunders 22nd February in Security

When configuring SSL Termination/Offloading and using the default cipher list, a scan using SSL Labs will produce an A which is great. One thing with our default list is that it could result in a scan indicating that there may be a vulnerability to Sweet32. Sweet32 has several potential methods to be exploited but the one which potentially affects a Loadbalancer.org appliance is the use of the Triple-DES legacy cipher when performing SSL Termination/Offloading. To mitigate this, it is a simple case of altering the cipher list slightly, adding a !3DES, to prevent the use of the Triple-DES cipher.

Continue reading...
19th October 2016

in Security

Blocking Japan with ModSecurity and Maxmind Lite

Posted by Theo Harvey 19th October in Security

Accessibility is the magic word for todays blog. If you’re lucky enough to run a website, then the whole world has access to it by default!
Now lets imagine that the website you’re running is targeted for a geographically specific customer base such as the USA. You get up one morning and decide to take a look at your web analytic reports, and find that Japan is where the second largest volume of traffic is coming from. At which point, you might start thinking about restricting traffic from specific countries that would only waste bandwidth on your server.

Continue reading...
9th November 2015

in Security

New PuTTY vulnerability “vuln-ech-overflow” identified – upgrade to 0.66 to protect your environment

Posted by Dave Saunders 9th November in Security

It has been identified that versions of PuTTY, PutTTYtel and pterm are vulnerable to potential exploit in the handling of ECH (erase characters), affecting versions 0.54 to 0.65. Upgrading to version 0.66 or patching your running version is advised to mitigate the vulnerability.

Continue reading...
3rd September 2015

in Business

Loadbalancer.org partner with Sucuri for cloud based WAF & DDOS protection

Posted by Andrew Zak 3rd September in Business

During the last year at Loadbalancer.org we have spent a lot of time and effort researching WAF (Web Application Firewall) solutions. The integrated WAF in version 8 of the Loadbalancer.org appliance has been designed for fast, low latency PCI-compliance for our customers. We also have several customers clustering commercial solutions (such as Imperva) behind our load balancer giving a much better WAF feature set + great performance and health monitoring.

Continue reading...
20th August 2015

in Business

It’s great to be v8

Posted by Dave Saunders 20th August in Business

As the evolution of Loadbalancer.org continues, we are proud to present our latest software release, v8.0. New features such as the Web Application Firewall (WAF) spearheading our increased focus on security and various updates including an enhanced process for high availability appliance pairing , improved LBCLI, advancement of the web user interface (WebUI).

Continue reading...
18th May 2015

in Denial Of Service

Blocking invalid range headers using ModSecurity and/or HAProxy (MS15-034 – CVE-2015-1635)

Posted by Malcolm Turnbull 18th May in Denial Of Service

Microsoft quietly patched a fairly nasty little bug (MS15-034) in IIS last month: A simple HTTP request with an invalid range header field value to either kill IIS, reveal data or remotely execute code! We haven't seen one of these in a while and obviously you are safe if you have automatic security patching turned on. However, with our renewed focus on web application security, I thought this would be a good example to show how easy virtual patching is with the industry standard tools used in the Loadbalancer.org appliance.

Continue reading...
6th March 2015

in Denial Of Service

Simple Denial of Service DOS attack mitigation using HAProxy

Posted by Malcolm Turnbull 6th March in Denial Of Service

Denial of Service (DOS) attacks can be especially effective against certain types of web application. If the application is highly dynamic or database intensive it can be remarkably simple to degrade or cripple the functionality of a site. This blog article describes some simple methods to mitigate single source IP DOS attacks using HAProxy. I've described how you would implement the techniques using the Loadbalancer.org appliance but they are easily transferable to any HAProxy based cluster.

Continue reading...
Live chat
› Operator: Theo › Theo: Can I help you?
Click here to chat |
Send