This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree".
The branch, next has been updated via 551bc489408c1efc0d0899ead3894c3d04a0f300 (commit) from b8fcb4956758b88b8a46eff5641aa80f244ed605 (commit)
Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below.
- Log ----------------------------------------------------------------- commit 551bc489408c1efc0d0899ead3894c3d04a0f300 Author: Arne Fitzenreiter arne_f@ipfire.org Date: Wed Apr 8 15:48:20 2020 +0000
suricata: disable dns flood protection
this causes errors in unbound and also other linux clients if a dns rule triggers.
Signed-off-by: Arne Fitzenreiter arne_f@ipfire.org
-----------------------------------------------------------------------
Summary of changes: config/suricata/suricata.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
Difference in files: diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml index 1f33ea0f3..43f10c89d 100644 --- a/config/suricata/suricata.yaml +++ b/config/suricata/suricata.yaml @@ -435,7 +435,7 @@ app-layer:
# How many unreplied DNS requests are considered a flood. # If the limit is reached, app-layer-event:dns.flooded; will match. - request-flood: 2048 + #request-flood: 512
tcp: enabled: yes
hooks/post-receive -- IPFire 2.x development tree