Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SecArgumentsLimit to modsecurity.conf-recommended #2738

Merged
merged 1 commit into from
May 17, 2022
Merged

Add SecArgumentsLimit to modsecurity.conf-recommended #2738

merged 1 commit into from
May 17, 2022

Conversation

martinhsv
Copy link
Contributor

@martinhsv martinhsv commented May 4, 2022

As of v3.0.5, libModSecurity has included (via #2234) a configuration directive called SecArgumentsLimit that can help protect against certain performance impacts. There is no default value, so if the configuration item is not specified, the limit is not used.

This pull request does not add any new functionality. It only supplies a default value in modsecurity.conf-recommended, along with a new rule to also reject requests that exceed the limit.

The goal here is merely to make it simpler for users (especially new users) to produce a usable and safe configuration.

Community input is welcome, particularly if:

  • you think including this is a bad idea in general
  • you think the default value of 1000 is too low for a substantial percentage of deployments

(The current plan is to include this in v3.0.7, which is likely to be published within 2 weeks or less.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant