summaryrefslogtreecommitdiff
path: root/doc/source
diff options
context:
space:
mode:
Diffstat (limited to 'doc/source')
-rw-r--r--doc/source/features.rst5
1 files changed, 5 insertions, 0 deletions
diff --git a/doc/source/features.rst b/doc/source/features.rst
index 407c0c0..e560925 100644
--- a/doc/source/features.rst
+++ b/doc/source/features.rst
@@ -345,6 +345,11 @@ line number. By using the *right* set of restrictive rules (or by using the
345*overly* restrictives ones in ``simulation`` mode), you might be able 345*overly* restrictives ones in ``simulation`` mode), you might be able
346to gather interesting vulnerabilities used against your website. 346to gather interesting vulnerabilities used against your website.
347 347
348Dumps are stored in the folder that you pass to the ``dump()`` filter,
349in files named ``sp_dump.SHA`` with ``SHA`` being the *sha256* of the
350rule that matched. This approach allows to mitigate denial of services attacks
351that could fill up your filesystem.
352
348 353
349Misc low-hanging fruits in the default configuration file 354Misc low-hanging fruits in the default configuration file
350^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 355^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^