]> git.ipfire.org Git - thirdparty/snort3.git/commitdiff
Merge pull request #1880 in SNORT/snort3 from ~NIHDESAI/snort3:limit_detained_ins...
authorMike Stepanek (mstepane) <mstepane@cisco.com>
Mon, 16 Dec 2019 13:09:10 +0000 (13:09 +0000)
committerMike Stepanek (mstepane) <mstepane@cisco.com>
Mon, 16 Dec 2019 13:09:10 +0000 (13:09 +0000)
Squashed commit of the following:

commit de16cdefb4d6587f116b42a8b992154e059f387b
Author: Nihal Desai <nihdesai@cisco.com>
Date:   Thu Dec 5 03:51:54 2019 -0500

    http_inspect: support limited response depth

doc/http_inspect.txt
src/service_inspectors/http_inspect/http_msg_header.cc

index bad2c291a469158dbfb598fb75dab969983cedda..526cf11731d4b8fdfbf855baaf88fd0954970b9b 100644 (file)
@@ -106,9 +106,6 @@ It enables Snort to more quickly detect and block response messages
 containing malicious JavaScript. As this feature involves actively blocking
 traffic it is designed for use with inline mode operation (-Q).
 
-This feature only functions with response_depth = -1 (unlimited). This
-limitation will be removed in a future version.
-
 This feature is off by default. detained_inspection = true will activate
 it.
 
index 5ff10d2858be17cd9767f1add4405f764cfc4b00..86799351f4e1cf4df3c56940f5617da864ab1db7 100644 (file)
@@ -303,8 +303,7 @@ void HttpMsgHeader::prepare_body()
     update_depth();
     // Limitations on detained inspection will be lifted as the feature is built out
     session_data->detained_inspection[source_id] = params->detained_inspection &&
-        (source_id == SRC_SERVER) && (session_data->compression[source_id] == CMP_NONE) &&
-        (params->request_depth == -1);
+        (source_id == SRC_SERVER) && (session_data->compression[source_id] == CMP_NONE);
     if (source_id == SRC_CLIENT)
     {
         HttpModule::increment_peg_counts(PEG_REQUEST_BODY);