|
1
|
|
|
2
|
<sysctl>
|
|
3
|
<item>
|
|
4
|
<tunable>vfs.read_max</tunable>
|
|
5
|
<value>128</value>
|
|
6
|
<descr><![CDATA[Increase UFS read-ahead speeds to match the state of hard drives and NCQ.]]></descr>
|
|
7
|
</item>
|
|
8
|
<item>
|
|
9
|
<descr><![CDATA[Set the ephemeral port range to be lower.]]></descr>
|
|
10
|
<tunable>net.inet.ip.portrange.first</tunable>
|
|
11
|
<value>default</value>
|
|
12
|
</item>
|
|
13
|
<item>
|
|
14
|
<tunable>net.inet.tcp.blackhole</tunable>
|
|
15
|
<value>3</value>
|
|
16
|
<descr><![CDATA[Drop packets to closed TCP ports without returning a RST]]></descr>
|
|
17
|
</item>
|
|
18
|
<item>
|
|
19
|
<descr><![CDATA[Do not send ICMP port unreachable messages for closed UDP ports]]></descr>
|
|
20
|
<tunable>net.inet.udp.blackhole</tunable>
|
|
21
|
<value>default</value>
|
|
22
|
</item>
|
|
23
|
<item>
|
|
24
|
<descr><![CDATA[Randomize the ID field in IP packets]]></descr>
|
|
25
|
<tunable>net.inet.ip.random_id</tunable>
|
|
26
|
<value>default</value>
|
|
27
|
</item>
|
|
28
|
<item>
|
|
29
|
<tunable>net.inet.ip.sourceroute</tunable>
|
|
30
|
<value>0</value>
|
|
31
|
<descr><![CDATA[ Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. ]]></descr>
|
|
32
|
</item>
|
|
33
|
<item>
|
|
34
|
<tunable>net.inet.ip.accept_sourceroute</tunable>
|
|
35
|
<value>0</value>
|
|
36
|
<descr><![CDATA[ Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. ]]></descr>
|
|
37
|
</item>
|
|
38
|
<item>
|
|
39
|
<tunable>net.inet.icmp.log_redirect</tunable>
|
|
40
|
<value>0</value>
|
|
41
|
<descr><![CDATA[ This option turns off the logging of redirect packets because there is no limit and this could fill up your logs consuming your whole hard drive. ]]></descr>
|
|
42
|
</item>
|
|
43
|
<item>
|
|
44
|
<descr><![CDATA[Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)]]></descr>
|
|
45
|
<tunable>net.inet.tcp.drop_synfin</tunable>
|
|
46
|
<value>default</value>
|
|
47
|
</item>
|
|
48
|
<item>
|
|
49
|
<tunable>net.inet6.ip6.redirect</tunable>
|
|
50
|
<value>0</value>
|
|
51
|
<descr><![CDATA[Enable sending IPv6 redirects]]></descr>
|
|
52
|
</item>
|
|
53
|
<item>
|
|
54
|
<tunable>net.inet6.ip6.use_tempaddr</tunable>
|
|
55
|
<value>1</value>
|
|
56
|
<descr><![CDATA[Enable privacy settings for IPv6 (RFC 4941)]]></descr>
|
|
57
|
</item>
|
|
58
|
<item>
|
|
59
|
<tunable>net.inet6.ip6.prefer_tempaddr</tunable>
|
|
60
|
<value>1</value>
|
|
61
|
<descr><![CDATA[Prefer privacy addresses and use them over the normal addresses]]></descr>
|
|
62
|
</item>
|
|
63
|
<item>
|
|
64
|
<tunable>net.inet.tcp.syncookies</tunable>
|
|
65
|
<value>0</value>
|
|
66
|
<descr><![CDATA[Generate SYN cookies for outbound SYN-ACK packets]]></descr>
|
|
67
|
</item>
|
|
68
|
<item>
|
|
69
|
<tunable>net.inet.tcp.recvspace</tunable>
|
|
70
|
<value>2097152</value>
|
|
71
|
<descr><![CDATA[Initial receive socket buffer size ]]></descr>
|
|
72
|
</item>
|
|
73
|
<item>
|
|
74
|
<tunable>net.inet.tcp.sendspace</tunable>
|
|
75
|
<value>1048576</value>
|
|
76
|
<descr><![CDATA[Initial send socket buffer size ]]></descr>
|
|
77
|
</item>
|
|
78
|
<item>
|
|
79
|
<tunable>net.inet.tcp.delayed_ack</tunable>
|
|
80
|
<value>0</value>
|
|
81
|
<descr><![CDATA[Do not delay ACK to try and piggyback it onto a data packet]]></descr>
|
|
82
|
</item>
|
|
83
|
<item>
|
|
84
|
<tunable>net.inet.udp.maxdgram</tunable>
|
|
85
|
<value>65536</value>
|
|
86
|
<descr><![CDATA[Maximum outgoing UDP datagram size]]></descr>
|
|
87
|
</item>
|
|
88
|
<item>
|
|
89
|
<descr><![CDATA[Handling of non-IP packets which are not passed to pfil (see if_bridge(4))]]></descr>
|
|
90
|
<tunable>net.link.bridge.pfil_onlyip</tunable>
|
|
91
|
<value>default</value>
|
|
92
|
</item>
|
|
93
|
<item>
|
|
94
|
<tunable>net.link.bridge.pfil_local_phys</tunable>
|
|
95
|
<value>0</value>
|
|
96
|
<descr><![CDATA[Set to 1 to additionally filter on the physical interface for locally destined packets]]></descr>
|
|
97
|
</item>
|
|
98
|
<item>
|
|
99
|
<descr><![CDATA[Set to 0 to disable filtering on the incoming and outgoing member interfaces.]]></descr>
|
|
100
|
<tunable>net.link.bridge.pfil_member</tunable>
|
|
101
|
<value>default</value>
|
|
102
|
</item>
|
|
103
|
<item>
|
|
104
|
<descr><![CDATA[Set to 1 to enable filtering on the bridge interface]]></descr>
|
|
105
|
<tunable>net.link.bridge.pfil_bridge</tunable>
|
|
106
|
<value>default</value>
|
|
107
|
</item>
|
|
108
|
<item>
|
|
109
|
<descr><![CDATA[Allow unprivileged access to tap(4) device nodes]]></descr>
|
|
110
|
<tunable>net.link.tap.user_open</tunable>
|
|
111
|
<value>default</value>
|
|
112
|
</item>
|
|
113
|
<item>
|
|
114
|
<descr><![CDATA[Randomize PID&#039;s (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())]]></descr>
|
|
115
|
<tunable>kern.randompid</tunable>
|
|
116
|
<value>default</value>
|
|
117
|
</item>
|
|
118
|
<item>
|
|
119
|
<tunable>net.inet.ip.intr_queue_maxlen</tunable>
|
|
120
|
<value>2048</value>
|
|
121
|
<descr><![CDATA[Maximum size of the IP input queue]]></descr>
|
|
122
|
</item>
|
|
123
|
<item>
|
|
124
|
<descr><![CDATA[Disable CTRL+ALT+Delete reboot from keyboard.]]></descr>
|
|
125
|
<tunable>hw.syscons.kbd_reboot</tunable>
|
|
126
|
<value>default</value>
|
|
127
|
</item>
|
|
128
|
<item>
|
|
129
|
<descr><![CDATA[Enable TCP extended debugging]]></descr>
|
|
130
|
<tunable>net.inet.tcp.log_debug</tunable>
|
|
131
|
<value>default</value>
|
|
132
|
</item>
|
|
133
|
<item>
|
|
134
|
<descr><![CDATA[Set ICMP Limits]]></descr>
|
|
135
|
<tunable>net.inet.icmp.icmplim</tunable>
|
|
136
|
<value>default</value>
|
|
137
|
</item>
|
|
138
|
<item>
|
|
139
|
<tunable>kern.ipc.maxsockbuf</tunable>
|
|
140
|
<value>614400000</value>
|
|
141
|
<descr><![CDATA[Maximum socket buffer size]]></descr>
|
|
142
|
</item>
|
|
143
|
<item>
|
|
144
|
<tunable>security.bsd.see_other_gids</tunable>
|
|
145
|
<value>0</value>
|
|
146
|
<descr><![CDATA[Hide processes running as other groups]]></descr>
|
|
147
|
</item>
|
|
148
|
<item>
|
|
149
|
<tunable>security.bsd.see_other_uids</tunable>
|
|
150
|
<value>0</value>
|
|
151
|
<descr><![CDATA[Hide processes running as other users]]></descr>
|
|
152
|
</item>
|
|
153
|
<item>
|
|
154
|
<descr><![CDATA[Enable/disable sending of ICMP redirects in response to IP packets for which a better,
|
|
155
|
and for the sender directly reachable, route and next hop is known.
|
|
156
|
]]></descr>
|
|
157
|
<tunable>net.inet.ip.redirect</tunable>
|
|
158
|
<value>0</value>
|
|
159
|
</item>
|
|
160
|
<item>
|
|
161
|
<descr><![CDATA[ Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
|
|
162
|
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
|
|
163
|
packets without returning a response.
|
|
164
|
]]></descr>
|
|
165
|
<tunable>net.inet.icmp.drop_redirect</tunable>
|
|
166
|
<value>1</value>
|
|
167
|
</item>
|
|
168
|
<item>
|
|
169
|
<tunable>net.local.dgram.maxdgram</tunable>
|
|
170
|
<value>65536</value>
|
|
171
|
<descr><![CDATA[Maximum outgoing UDP datagram size]]></descr>
|
|
172
|
</item>
|
|
173
|
<item>
|
|
174
|
<tunable>net.inet.tcp.recvbuf_max</tunable>
|
|
175
|
<value>16777216</value>
|
|
176
|
<descr></descr>
|
|
177
|
</item>
|
|
178
|
<item>
|
|
179
|
<tunable>net.inet.tcp.sendbuf_max</tunable>
|
|
180
|
<value>16777216</value>
|
|
181
|
<descr></descr>
|
|
182
|
</item>
|
|
183
|
<item>
|
|
184
|
<tunable>net.inet.tcp.rfc1323</tunable>
|
|
185
|
<value>2</value>
|
|
186
|
<descr></descr>
|
|
187
|
</item>
|
|
188
|
<item>
|
|
189
|
<tunable>net.inet.tcp.sack.enable</tunable>
|
|
190
|
<value>1</value>
|
|
191
|
<descr></descr>
|
|
192
|
</item>
|
|
193
|
<item>
|
|
194
|
<tunable>net.inet.tcp.ecn.enable </tunable>
|
|
195
|
<value>1</value>
|
|
196
|
<descr></descr>
|
|
197
|
</item>
|
|
198
|
<item>
|
|
199
|
<tunable>net.inet.tcp.path_mtu_discovery </tunable>
|
|
200
|
<value>1</value>
|
|
201
|
<descr></descr>
|
|
202
|
</item>
|
|
203
|
<item>
|
|
204
|
<tunable>net.inet.tcp.minmss </tunable>
|
|
205
|
<value>536</value>
|
|
206
|
<descr></descr>
|
|
207
|
</item>
|
|
208
|
<item>
|
|
209
|
<tunable>net.inet.tcp.rfc3042 </tunable>
|
|
210
|
<value>1</value>
|
|
211
|
<descr></descr>
|
|
212
|
</item>
|
|
213
|
<item>
|
|
214
|
<tunable>net.inet.tcp.rfc3390 </tunable>
|
|
215
|
<value>1</value>
|
|
216
|
<descr></descr>
|
|
217
|
</item>
|
|
218
|
<item>
|
|
219
|
<tunable>net.inet.tcp.sendbuf_auto </tunable>
|
|
220
|
<value>1</value>
|
|
221
|
<descr></descr>
|
|
222
|
</item>
|
|
223
|
<item>
|
|
224
|
<tunable>net.inet.tcp.recvbuf_auto </tunable>
|
|
225
|
<value>1</value>
|
|
226
|
<descr></descr>
|
|
227
|
</item>
|
|
228
|
<item>
|
|
229
|
<tunable>net.inet.tcp.recvbuf_inc </tunable>
|
|
230
|
<value>262144</value>
|
|
231
|
<descr></descr>
|
|
232
|
</item>
|
|
233
|
<item>
|
|
234
|
<tunable>net.inet.tcp.sendbuf_inc </tunable>
|
|
235
|
<value>65536</value>
|
|
236
|
<descr></descr>
|
|
237
|
</item>
|
|
238
|
<item>
|
|
239
|
<tunable>net.inet.raw.maxdgram</tunable>
|
|
240
|
<value>16384</value>
|
|
241
|
<descr><![CDATA[Maximum outgoing raw IP datagram size]]></descr>
|
|
242
|
</item>
|
|
243
|
<item>
|
|
244
|
<tunable>net.inet.tcp.abc_l_var </tunable>
|
|
245
|
<value>10</value>
|
|
246
|
<descr></descr>
|
|
247
|
</item>
|
|
248
|
<item>
|
|
249
|
<tunable>net.inet.tcp.initcwnd_segments </tunable>
|
|
250
|
<value>10</value>
|
|
251
|
<descr></descr>
|
|
252
|
</item>
|
|
253
|
<item>
|
|
254
|
<tunable>net.local.stream.sendspace </tunable>
|
|
255
|
<value>65536</value>
|
|
256
|
<descr></descr>
|
|
257
|
</item>
|
|
258
|
<item>
|
|
259
|
<tunable>net.local.stream.recvspace </tunable>
|
|
260
|
<value>65536</value>
|
|
261
|
<descr></descr>
|
|
262
|
</item>
|
|
263
|
<item>
|
|
264
|
<tunable>net.inet.sctp.blackhole </tunable>
|
|
265
|
<value>2</value>
|
|
266
|
<descr></descr>
|
|
267
|
</item>
|
|
268
|
<item>
|
|
269
|
<tunable>net.inet.ip.portrange.randomized </tunable>
|
|
270
|
<value>1</value>
|
|
271
|
<descr></descr>
|
|
272
|
</item>
|
|
273
|
<item>
|
|
274
|
<tunable>net.inet.ip.portrange.randomcps </tunable>
|
|
275
|
<value>9999</value>
|
|
276
|
<descr></descr>
|
|
277
|
</item>
|
|
278
|
<item>
|
|
279
|
<tunable>net.inet.ip.portrange.randomtime </tunable>
|
|
280
|
<value>1</value>
|
|
281
|
<descr></descr>
|
|
282
|
</item>
|
|
283
|
<item>
|
|
284
|
<tunable>net.inet6.ip6.auto_linklocal </tunable>
|
|
285
|
<value>1</value>
|
|
286
|
<descr></descr>
|
|
287
|
</item>
|
|
288
|
<item>
|
|
289
|
<tunable>net.inet6.icmp6.rediraccept </tunable>
|
|
290
|
<value>0</value>
|
|
291
|
<descr></descr>
|
|
292
|
</item>
|
|
293
|
<item>
|
|
294
|
<tunable>net.inet6.icmp6.nodeinfo </tunable>
|
|
295
|
<value>0</value>
|
|
296
|
<descr></descr>
|
|
297
|
</item>
|
|
298
|
<item>
|
|
299
|
<tunable>kern.ipc.somaxconn </tunable>
|
|
300
|
<value>16384</value>
|
|
301
|
<descr></descr>
|
|
302
|
</item>
|
|
303
|
<item>
|
|
304
|
<tunable>net.inet.udp.recvspace </tunable>
|
|
305
|
<value>65536</value>
|
|
306
|
<descr></descr>
|
|
307
|
</item>
|
|
308
|
<item>
|
|
309
|
<tunable>net.local.dgram.recvspace </tunable>
|
|
310
|
<value>65536</value>
|
|
311
|
<descr></descr>
|
|
312
|
</item>
|
|
313
|
<item>
|
|
314
|
<tunable>net.inet.ip.process_options</tunable>
|
|
315
|
<value>1</value>
|
|
316
|
<descr><![CDATA[Enable IP options processing ([LS]SRR, RR, TS)]]></descr>
|
|
317
|
</item>
|
|
318
|
<item>
|
|
319
|
<tunable>net.inet.tcp.cc.algorithm</tunable>
|
|
320
|
<value>cdg</value>
|
|
321
|
<descr><![CDATA[TCP Congestion Control Algorithm]]></descr>
|
|
322
|
</item>
|
|
323
|
<item>
|
|
324
|
<tunable>net.inet.tcp.cc.abe</tunable>
|
|
325
|
<value>1</value>
|
|
326
|
<descr></descr>
|
|
327
|
</item>
|
|
328
|
<item>
|
|
329
|
<tunable>net.inet.tcp.cc.htcp.adaptive_backoff</tunable>
|
|
330
|
<value>1</value>
|
|
331
|
<descr></descr>
|
|
332
|
</item>
|
|
333
|
<item>
|
|
334
|
<tunable>net.inet.tcp.cc.htcp.rtt_scaling</tunable>
|
|
335
|
<value>1</value>
|
|
336
|
<descr></descr>
|
|
337
|
</item>
|
|
338
|
<item>
|
|
339
|
<tunable>net.inet.tcp.cc.cdg.alpha_inc</tunable>
|
|
340
|
<value>1</value>
|
|
341
|
<descr></descr>
|
|
342
|
</item>
|
|
343
|
<item>
|
|
344
|
<tunable>net.inet.tcp.cc.cdg.smoothing_factor</tunable>
|
|
345
|
<value>10</value>
|
|
346
|
<descr></descr>
|
|
347
|
</item>
|
|
348
|
<item>
|
|
349
|
<tunable>net.inet.raw.recvspace</tunable>
|
|
350
|
<value>16384</value>
|
|
351
|
<descr><![CDATA[Maximum space for incoming raw IP datagrams]]></descr>
|
|
352
|
</item>
|
|
353
|
<item>
|
|
354
|
<tunable>net.inet.tcp.delacktime</tunable>
|
|
355
|
<value>20</value>
|
|
356
|
<descr></descr>
|
|
357
|
</item>
|
|
358
|
<item>
|
|
359
|
<tunable>net.inet6.ip6.intr_queue_maxlen</tunable>
|
|
360
|
<value>2048</value>
|
|
361
|
<descr><![CDATA[Maximum size of the IPv6 input queue]]></descr>
|
|
362
|
</item>
|
|
363
|
<item>
|
|
364
|
<tunable>kern.crypto.iimb.enable_multiq</tunable>
|
|
365
|
<value>2</value>
|
|
366
|
<descr><![CDATA[enable multi-Q]]></descr>
|
|
367
|
</item>
|
|
368
|
<item>
|
|
369
|
<tunable>net.inet.tcp.fast_finwait2_recycle</tunable>
|
|
370
|
<value>1</value>
|
|
371
|
<descr></descr>
|
|
372
|
</item>
|
|
373
|
<item>
|
|
374
|
<tunable>net.route.netisr_maxqlen</tunable>
|
|
375
|
<value>2048</value>
|
|
376
|
<descr></descr>
|
|
377
|
</item>
|
|
378
|
<item>
|
|
379
|
<tunable>net.inet.ip.maxfrags</tunable>
|
|
380
|
<value>-1</value>
|
|
381
|
<descr></descr>
|
|
382
|
</item>
|
|
383
|
<item>
|
|
384
|
<tunable>net.inet.ip.maxfragsperpacket </tunable>
|
|
385
|
<value>512</value>
|
|
386
|
<descr></descr>
|
|
387
|
</item>
|
|
388
|
<item>
|
|
389
|
<tunable>net.inet.ip.maxfragpackets</tunable>
|
|
390
|
<value>-1</value>
|
|
391
|
<descr></descr>
|
|
392
|
</item>
|
|
393
|
<item>
|
|
394
|
<tunable>net.inet6.ip6.maxfrags</tunable>
|
|
395
|
<value>-1</value>
|
|
396
|
<descr></descr>
|
|
397
|
</item>
|
|
398
|
<item>
|
|
399
|
<tunable>net.inet6.ip6.maxfragsperpacket</tunable>
|
|
400
|
<value>512</value>
|
|
401
|
<descr></descr>
|
|
402
|
</item>
|
|
403
|
<item>
|
|
404
|
<tunable>net.inet6.ip6.maxfragpackets</tunable>
|
|
405
|
<value>-1</value>
|
|
406
|
<descr></descr>
|
|
407
|
</item>
|
|
408
|
<item>
|
|
409
|
<tunable>hw.acpi.cpu.cx_lowest</tunable>
|
|
410
|
<value>C1</value>
|
|
411
|
<descr></descr>
|
|
412
|
</item>
|
|
413
|
<item>
|
|
414
|
<tunable>net.inet.tcp.mssdflt</tunable>
|
|
415
|
<value>1460</value>
|
|
416
|
<descr></descr>
|
|
417
|
</item>
|
|
418
|
<item>
|
|
419
|
<tunable>net.inet.tcp.v6mssdflt</tunable>
|
|
420
|
<value>1440</value>
|
|
421
|
<descr></descr>
|
|
422
|
</item>
|
|
423
|
<item>
|
|
424
|
<tunable>net.inet.tcp.pmtud_blackhole_detection</tunable>
|
|
425
|
<value>1</value>
|
|
426
|
<descr></descr>
|
|
427
|
</item>
|
|
428
|
<item>
|
|
429
|
<tunable>net.inet.tcp.pmtud_blackhole_mss</tunable>
|
|
430
|
<value>1280</value>
|
|
431
|
<descr></descr>
|
|
432
|
</item>
|
|
433
|
<item>
|
|
434
|
<tunable>net.inet.tcp.v6pmtud_blackhole_mss</tunable>
|
|
435
|
<value>1280</value>
|
|
436
|
<descr></descr>
|
|
437
|
</item>
|
|
438
|
<item>
|
|
439
|
<tunable>net.inet.tcp.tso</tunable>
|
|
440
|
<value>0</value>
|
|
441
|
<descr><![CDATA[Enable TCP Segmentation Offload]]></descr>
|
|
442
|
</item>
|
|
443
|
<item>
|
|
444
|
<tunable>net.inet.udp.sendspace</tunable>
|
|
445
|
<value>65536</value>
|
|
446
|
<descr></descr>
|
|
447
|
</item>
|
|
448
|
<item>
|
|
449
|
<tunable>net.local.dgram.sendspace </tunable>
|
|
450
|
<value>65536</value>
|
|
451
|
<descr></descr>
|
|
452
|
</item>
|
|
453
|
<item>
|
|
454
|
<tunable>net.inet.raw.sendspace</tunable>
|
|
455
|
<value>16384</value>
|
|
456
|
<descr></descr>
|
|
457
|
</item>
|
|
458
|
<item>
|
|
459
|
<tunable>hw.intr_storm_threshold</tunable>
|
|
460
|
<value>0</value>
|
|
461
|
<descr></descr>
|
|
462
|
</item>
|
|
463
|
</sysctl>
|