|
|
|
@ -2784,11 +2784,14 @@ Beyond suricata.yaml, other ways to harden Suricata are
|
|
|
|
|
- compilation : enabling ASLR and other exploit mitigation techniques.
|
|
|
|
|
- environment : running Suricata on a device that has no direct access to Internet.
|
|
|
|
|
|
|
|
|
|
.. _suricata-yaml-lua-config:
|
|
|
|
|
|
|
|
|
|
Lua
|
|
|
|
|
~~~
|
|
|
|
|
|
|
|
|
|
Suricata 7.0 disables Lua rules by default. Lua rules can be enabled
|
|
|
|
|
in the ``security.lua`` section of the configuration file:
|
|
|
|
|
Suricata 8.0 sandboxes Lua rules by default. The restrictions on the sandbox for Lua rules can be
|
|
|
|
|
modified in the ``security.lua`` section of the configuration file. Additionally, Lua rules
|
|
|
|
|
can be completely disabled the same as the Suricata 7.0 default:
|
|
|
|
|
|
|
|
|
|
::
|
|
|
|
|
|
|
|
|
@ -2797,3 +2800,12 @@ in the ``security.lua`` section of the configuration file:
|
|
|
|
|
# Allow Lua rules. Disabled by default.
|
|
|
|
|
#allow-rules: false
|
|
|
|
|
|
|
|
|
|
# Upper bound of allocations by a Lua rule before it will fail
|
|
|
|
|
#max-bytes: 500000
|
|
|
|
|
|
|
|
|
|
# Upper bound of lua instructions by a Lua rule before it will fail
|
|
|
|
|
#max-instructions: 500000
|
|
|
|
|
|
|
|
|
|
# Allow dangerous lua operations like external packages and file io
|
|
|
|
|
#allow-restricted-functions: false
|
|
|
|
|
|
|
|
|
|