Advertisement
netmd123

sysctl#1

Oct 4th, 2019
220
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.37 KB | None | 0 0
  1. <sysctl>
  2. <item>
  3. <descr>Disable the pf ftp proxy handler.</descr>
  4. <tunable>debug.pfftpproxy</tunable>
  5. <value>default</value>
  6. </item>
  7. <item>
  8. <tunable>vfs.read_max</tunable>
  9. <value>default</value>
  10. <descr>Increase UFS read-ahead speeds to match the state of hard drives and NCQ.</descr>
  11. </item>
  12. <item>
  13. <descr>Set the ephemeral port range to be lower.</descr>
  14. <tunable>net.inet.ip.portrange.first</tunable>
  15. <value>default</value>
  16. </item>
  17. <item>
  18. <descr>Drop packets to closed TCP ports without returning a RST</descr>
  19. <tunable>net.inet.tcp.blackhole</tunable>
  20. <value>default</value>
  21. </item>
  22. <item>
  23. <descr>Do not send ICMP port unreachable messages for closed UDP ports</descr>
  24. <tunable>net.inet.udp.blackhole</tunable>
  25. <value>default</value>
  26. </item>
  27. <item>
  28. <descr>Randomize the ID field in IP packets (default is 0: sequential IP IDs)</descr>
  29. <tunable>net.inet.ip.random_id</tunable>
  30. <value>default</value>
  31. </item>
  32. <item>
  33. <descr>
  34. Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
  35. It can also be used to probe for information about your internal networks. These functions come enabled
  36. as part of the standard FreeBSD core system.
  37. </descr>
  38. <tunable>net.inet.ip.sourceroute</tunable>
  39. <value>default</value>
  40. </item>
  41. <item>
  42. <descr>
  43. Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
  44. It can also be used to probe for information about your internal networks. These functions come enabled
  45. as part of the standard FreeBSD core system.
  46. </descr>
  47. <tunable>net.inet.ip.accept_sourceroute</tunable>
  48. <value>default</value>
  49. </item>
  50. <item>
  51. <descr>
  52. Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
  53. to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
  54. packets without returning a response.
  55. </descr>
  56. <tunable>net.inet.icmp.drop_redirect</tunable>
  57. <value>default</value>
  58. </item>
  59. <item>
  60. <descr>
  61. This option turns off the logging of redirect packets because there is no limit and this could fill
  62. up your logs consuming your whole hard drive.
  63. </descr>
  64. <tunable>net.inet.icmp.log_redirect</tunable>
  65. <value>default</value>
  66. </item>
  67. <item>
  68. <descr>Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)</descr>
  69. <tunable>net.inet.tcp.drop_synfin</tunable>
  70. <value>default</value>
  71. </item>
  72. <item>
  73. <descr>Enable sending IPv4 redirects</descr>
  74. <tunable>net.inet.ip.redirect</tunable>
  75. <value>default</value>
  76. </item>
  77. <item>
  78. <descr>Enable sending IPv6 redirects</descr>
  79. <tunable>net.inet6.ip6.redirect</tunable>
  80. <value>default</value>
  81. </item>
  82. <item>
  83. <descr>Enable privacy settings for IPv6 (RFC 4941)</descr>
  84. <tunable>net.inet6.ip6.use_tempaddr</tunable>
  85. <value>default</value>
  86. </item>
  87. <item>
  88. <descr>Prefer privacy addresses and use them over the normal addresses</descr>
  89. <tunable>net.inet6.ip6.prefer_tempaddr</tunable>
  90. <value>default</value>
  91. </item>
  92. <item>
  93. <descr>Generate SYN cookies for outbound SYN-ACK packets</descr>
  94. <tunable>net.inet.tcp.syncookies</tunable>
  95. <value>default</value>
  96. </item>
  97. <item>
  98. <descr>Maximum incoming/outgoing TCP datagram size (receive)</descr>
  99. <tunable>net.inet.tcp.recvspace</tunable>
  100. <value>default</value>
  101. </item>
  102. <item>
  103. <descr>Maximum incoming/outgoing TCP datagram size (send)</descr>
  104. <tunable>net.inet.tcp.sendspace</tunable>
  105. <value>default</value>
  106. </item>
  107. <item>
  108. <descr>Do not delay ACK to try and piggyback it onto a data packet</descr>
  109. <tunable>net.inet.tcp.delayed_ack</tunable>
  110. <value>default</value>
  111. </item>
  112. <item>
  113. <descr>Maximum outgoing UDP datagram size</descr>
  114. <tunable>net.inet.udp.maxdgram</tunable>
  115. <value>default</value>
  116. </item>
  117. <item>
  118. <descr>Handling of non-IP packets which are not passed to pfil (see if_bridge(4))</descr>
  119. <tunable>net.link.bridge.pfil_onlyip</tunable>
  120. <value>default</value>
  121. </item>
  122. <item>
  123. <descr>Set to 1 to additionally filter on the physical interface for locally destined packets</descr>
  124. <tunable>net.link.bridge.pfil_local_phys</tunable>
  125. <value>default</value>
  126. </item>
  127. <item>
  128. <descr>Set to 0 to disable filtering on the incoming and outgoing member interfaces.</descr>
  129. <tunable>net.link.bridge.pfil_member</tunable>
  130. <value>default</value>
  131. </item>
  132. <item>
  133. <descr>Set to 1 to enable filtering on the bridge interface</descr>
  134. <tunable>net.link.bridge.pfil_bridge</tunable>
  135. <value>default</value>
  136. </item>
  137. <item>
  138. <descr>Allow unprivileged access to tap(4) device nodes</descr>
  139. <tunable>net.link.tap.user_open</tunable>
  140. <value>default</value>
  141. </item>
  142. <item>
  143. <descr>Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())</descr>
  144. <tunable>kern.randompid</tunable>
  145. <value>default</value>
  146. </item>
  147. <item>
  148. <tunable>net.inet.ip.intr_queue_maxlen</tunable>
  149. <value>default</value>
  150. <descr>Maximum size of the IP input queue</descr>
  151. </item>
  152. <item>
  153. <descr>Disable CTRL+ALT+Delete reboot from keyboard.</descr>
  154. <tunable>hw.syscons.kbd_reboot</tunable>
  155. <value>default</value>
  156. </item>
  157. <item>
  158. <descr>Enable TCP extended debugging</descr>
  159. <tunable>net.inet.tcp.log_debug</tunable>
  160. <value>default</value>
  161. </item>
  162. <item>
  163. <descr>Set ICMP Limits</descr>
  164. <tunable>net.inet.icmp.icmplim</tunable>
  165. <value>default</value>
  166. </item>
  167. <item>
  168. <tunable>net.inet.tcp.tso</tunable>
  169. <value>0</value>
  170. <descr>TCP Offload Engine</descr>
  171. </item>
  172. <item>
  173. <tunable>net.inet.udp.checksum</tunable>
  174. <value>default</value>
  175. <descr>UDP Checksums</descr>
  176. </item>
  177. <item>
  178. <tunable>kern.ipc.maxsockbuf</tunable>
  179. <value>default</value>
  180. <descr>Maximum socket buffer size</descr>
  181. </item>
  182. <item>
  183. <descr>Page Table Isolation (Meltdown mitigation, requires reboot.)</descr>
  184. <tunable>vm.pmap.pti</tunable>
  185. <value>default</value>
  186. </item>
  187. <item>
  188. <descr>Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)</descr>
  189. <tunable>hw.ibrs_disable</tunable>
  190. <value>default</value>
  191. </item>
  192. <item>
  193. <descr>Hide processes running as other groups</descr>
  194. <tunable>security.bsd.see_other_gids</tunable>
  195. <value>default</value>
  196. </item>
  197. <item>
  198. <descr>Hide processes running as other users</descr>
  199. <tunable>security.bsd.see_other_uids</tunable>
  200. <value>default</value>
  201. </item>
  202. <item>
  203. <tunable>net.inet.ip.redirect</tunable>
  204. <value>default</value>
  205. <descr>Enable/disable sending of ICMP redirects in response to IP packets for which a better,&#xD;
  206. and for the sender directly reachable, route and next hop is known.&#xD;
  207. </descr>
  208. </item>
  209. <item>
  210. <tunable>net.inet.icmp.drop_redirect</tunable>
  211. <value>default</value>
  212. <descr>Enable/disable dropping of ICMP Redirect packets</descr>
  213. </item>
  214. <item>
  215. <tunable>hw.em.0.eee_setting</tunable>
  216. <value>1</value>
  217. <descr>hw.em.0.eee_setting</descr>
  218. </item>
  219. <item>
  220. <tunable>hw.em.1.eee_setting</tunable>
  221. <value>1</value>
  222. <descr/>
  223. </item>
  224. <item>
  225. <tunable>dev.igb.0.eee_disabled</tunable>
  226. <value>1</value>
  227. <descr/>
  228. </item>
  229. <item>
  230. <tunable>dev.igb.1.eee_disabled</tunable>
  231. <value>1</value>
  232. <descr/>
  233. </item>
  234. <item>
  235. <tunable>legal.intel_ipw.license_ack</tunable>
  236. <value>1</value>
  237. <descr/>
  238. </item>
  239. <item>
  240. <tunable>legal.intel_iwi.license_ack</tunable>
  241. <value>1</value>
  242. <descr/>
  243. </item>
  244. </sysctl>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement