Verified Commit cf006b0b authored by tr's avatar tr
Browse files
parent ddf048f1
......@@ -35,7 +35,9 @@ SecRule REQUEST_HEADERS:Content-Type "application/json" \
# to the size of data, with files excluded. You want to keep that value as
# low as practical.
#
SecRequestBodyLimit 13107200
# Buffer request bodies of up to 10 MiB in length.
SecRequestBodyLimit 10485760
# Buffer request without body of up to 128 KiB in length.
SecRequestBodyNoFilesLimit 131072
# What to do if the request body size is above our configured limit.
......@@ -125,8 +127,8 @@ SecRule MULTIPART_UNMATCHED_BOUNDARY "@eq 1" \
# PCRE Tuning
# We want to avoid a potential RegEx DoS condition
#
SecPcreMatchLimit 1000
SecPcreMatchLimitRecursion 1000
SecPcreMatchLimit 1000000
SecPcreMatchLimitRecursion 1000000
# Some internal errors will set flags in TX and we will need to look for these.
# All of these are prefixed with "MSC_". The following flags currently exist:
......@@ -154,8 +156,8 @@ SecResponseBodyAccess On
#
SecResponseBodyMimeType text/plain text/html text/xml
# Buffer response bodies of up to 512 KB in length.
SecResponseBodyLimit 524288
# Buffer response bodies of up to 10 MiB in length.
SecResponseBodyLimit 10485760
# What happens when we encounter a response body larger than the configured
# limit? By default, we process what we have and let the rest through.
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment