All Barracuda Web Application Firewalls, firmware versions 220.127.116.11 and above.
The Barracuda Web Applicatin Firewall's default security policy is to sign all outgoing cookies. This means that whenever the Web Server sets a cookie on a client's web browser, the Barracuda Web Application Firewall will add a digital signature to that cookie. This allows the Barracuda Web Application Firewall to determine whether the cookie has been changed when the client accesses the Web Server again.
When the Web Application Firewall is deployed in front of your production Web Server, all new cookies that are sent out by the web application are signed. But, initially, there may be lots of clients who already have the cookies cached in their browsers. When the Barracuda Web Application Firewall sees preexisting, non-signed cookies, it will interpret them as having been altered (because they were created before the Barracuda could sign them) and will display Cookie Tampered message on the Basic > Web Firewall Logs page.
These log entries will gradually stop appearing as the old cookies expire and the web application sends new cookies, which will then be appropriately signed by the Barracuda Web Application Firewall.
Link to This Page: