From patchwork Fri Mar 1 01:28:14 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Tremer X-Patchwork-Id: 2109 Return-Path: Received: from mail01.ipfire.org (mail01.i.ipfire.org [172.28.1.200]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail01.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web07.i.ipfire.org (Postfix) with ESMTPS id 493BA88B0B9 for ; Thu, 28 Feb 2019 14:29:27 +0000 (GMT) Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 449FLG5XPDz5KgVR; Thu, 28 Feb 2019 14:29:26 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201801; t=1551364166; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:list-id:list-unsubscribe:list-subscribe:list-post; bh=SVIe6o+yUmtA5POIzjGYmmaP59NKUmM5GQg1BQ4ZO9A=; b=SPy9M09V4BTMPZKwcpk8zPlcSiu8rrULjEc1LTbo9dBF4awzIkVzs1XJmzZRDI6CRPKHyo GcaJ+eba8RJFN/zDU37bLc28OXvJKckiqdQOuj0TK9ZG0OErSsUBKsV1ZO0TSw62MfnAnV 73/YZG69f2uThsN3UANswXmwmzQmceA5a06ubjEtot928v/bUEHN/gHAOwLv73aXsHTzoE If3qo62XP+oUPylo6rTIHoy4e2Vl2R2/5IMC59CUenWCfQQZCz1oq3zzcleXLBvWrZBETT dyjhIpD91DOESlfkj++B+GP12+cBmQogoU5lLd5hZP7zTI9xW3Q4BxfMKVwpoA== Received: from ipfire.tremer.co.uk (unknown [88.215.19.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 449FKR3LwKz5KvHQ; Thu, 28 Feb 2019 14:28:43 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201801; t=1551364123; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=SVIe6o+yUmtA5POIzjGYmmaP59NKUmM5GQg1BQ4ZO9A=; b=uu2EiGfdMZ5jCjgAUN25kLo4nPWuIyInFsdr6J+siomEO6/hMbNQ2hqvx0T1X0GyCb5e+s K740v32Y+P/uXkxmQnXkNTrlb4mprTbmjKpbocyudiUda4UecKS/jK7sRgS1BE04SREQLF 99UDvrCGsAlFoXd1yQi1rNWraKorOv5+jPxx4fpNQJCkat07Ko50mlxMqHwyN5rSKMsZaM YDMwIhOmvxUy11TNKw0RkfW3xLSxjnfRm8zv2/S0GOlHfsMoQmixL5ptKdCRPldK1PNIU5 mNJcGDJTvHBKX8tZtBsDO6b3LZx7dZ+tab1dOFsdAVc9epbEQir9MQuS2HRRNQ== From: Michael Tremer To: development@lists.ipfire.org Subject: [PATCH 09/20] suricata: Allow 32MB of RAM for DNS decoding Date: Thu, 28 Feb 2019 14:28:14 +0000 Message-Id: <20190228142825.5153-10-michael.tremer@ipfire.org> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20190228142825.5153-1-michael.tremer@ipfire.org> References: <20190228142825.5153-1-michael.tremer@ipfire.org> Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=ms smtp.mailfrom=michael.tremer@ipfire.org X-Spamd-Result: default: False [-8.80 / 11.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; REPLY(-4.00)[]; DKIM_SIGNED(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; MID_CONTAINS_FROM(1.00)[]; NEURAL_HAM(-2.70)[-0.899,0]; RCVD_COUNT_ZERO(0.00)[0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:31655, ipnet:88.215.0.0/18, country:GB]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-3.00)[100.00%] X-Spam-Status: No, score=-8.80 X-Rspamd-Server: mail01.i.ipfire.org Cc: Michael Tremer X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Signed-off-by: Michael Tremer --- config/suricata/suricata.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml index b09d5906d..882dc1bd0 100644 --- a/config/suricata/suricata.yaml +++ b/config/suricata/suricata.yaml @@ -194,12 +194,12 @@ app-layer: # enabled: yes dns: # memcaps. Globally and per flow/state. - #global-memcap: 16mb - #state-memcap: 512kb + global-memcap: 32mb + state-memcap: 512kb # How many unreplied DNS requests are considered a flood. # If the limit is reached, app-layer-event:dns.flooded; will match. - #request-flood: 500 + request-flood: 512 tcp: enabled: yes