summaryrefslogtreecommitdiff
path: root/sysctl.conf
blob: a34935ba85b4811d5cdb7e573d75451c2097db90 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
### IPV4 NETWORKING

# Disables IPv4 packet forwarding
net.ipv4.ip_forward = 0

# Enables source route verification
net.ipv4.conf.all.rp_filter = 1
net.ipv4.conf.default.rp_filter = 1

# Accept ICMP redirect messages (suggested 1 for hosts and 0 for routers)
# net.ipv4.conf.all.accept_redirects = 1

# Accept source routed packages (suggested 0 for hosts and 1 for routers)
# net.ipv4.conf.all.accept_source_route = 1

# Log packets with source addresses with no known route to kernel log
# net.ipv4.conf.all.log_martians = 1

# Do multicast routing ? The kernel needs to be compiled with
# CONFIG_MROUTE and a multicast routing daemon is required.
# net.ipv4.conf.all.mc_forwarding = 1

# If you get message "Neighbour table overflow" try to play with this values.
# Needed in huge networks. These example values are sufficent in networks with
# mask 21.
# net.ipv4.neigh.default.gc_thresh3 = 4096
# net.ipv4.neigh.default.gc_thresh2 = 2048
# net.ipv4.neigh.default.gc_thresh1 = 512
# net.ipv6.neigh.default.gc_thresh3 = 1024
# net.ipv6.neigh.default.gc_thresh2 = 512
# net.ipv6.neigh.default.gc_thresh1 = 128

# Do proxy ARP ?
# net.ipv4.conf.all.proxy_arp = 1

# Accept ICMP redirect messages only for gateways, listed in
# default gateway list ?
# net.ipv4.conf.all.secure_redirects = 1

# Send ICMP redirects to other hosts ?
# net.ipv4.conf.all.send_redirects = 1

# Ignore all ICMP echo requests ?
# net.ipv4.icmp_echo_ignore_all = 1

# Ignore ICMP echo requests to broadcast and multicast addresses ?
# net.ipv4.icmp_echo_ignore_broadcasts = 1

# Enable MTU discovery patch ? (KERNEL MUST SUPPORT THIS)
# MTU (maximal transfer unit) is the size of the chunks we send out
# over the net. "Path MTU Discovery" means that, instead of always
# sending very small chunks, we start out sending big ones and if we
# then discover that some host along the way likes its chunks smaller,
# we adjust to a smaller size.
# net.ipv4.ip_no_pmtu_disc = 1

# Enable debugging of IP masquerading ?
# net.ipv4.ip_masq_debug = 1

# Bug-to-bug compatibility with some broken printers. On retransmit
# try to send bigger packets to work around bugs in certain TCP
# stacks. Can be turned off by setting IPV4_RETRANS_COLLAPSE to ,,yes''.
# net.ipv4.tcp_retrans_collapse = 1

# Disable select acknowledgments after RFC2018 ?
# TCP may experience poor performance when multiple packets are lost
# from one window of data. With the limited information available
# from cumulative acknowledgments, a TCP sender can only learn about a
# single lost packet per round trip time. An aggressive sender could
# choose to retransmit packets early, but such retransmitted segments
# may have already been successfully received.
# net.ipv4.tcp_sack = 0

# Disable timestamps as defined in RFC1323 ?
# Timestamps are designed to provide compatible interworking with
# TCP's that do not implement the TCP Extensions for High Performance
# net.ipv4.tcp_timestamps = 0

# Enable the strict RFC793 interpretation of the TCP urgent pointer field.
# net.ipv4.tcp_stdurg = 1

# Enable tcp_syncookies
# net.ipv4.tcp_syncookies = 1

# Disable window scaling as defined in RFC1323 ?
# The window scale extension expands the definition of the TCP
# window to 32 bits and then uses a scale factor to carry this
# 32-bit value in the 16-bit Window field of the TCP header.
# net.ipv4.tcp_window_scaling = 0

# Enable dynamic socket address rewriting on interface address change.
# This is useful for dialup interface with changing IP addresses.
# sys.net.ipv4.ip_dynaddr = 7

# Range of ports used by TCP and UDP to choose the local
# port. Contains two numbers, the first number is the lowest port,
# the second number the highest local port. Default is "1024 4999".
# Should be changed to "32768 61000" for high-usage systems.
# net.ipv4.ip_local_port_range = 4096 61000

# Disables automatic defragmentation (needed for masquerading, LVS)
# Non existant on Linux 2.4
# net.ipv4.ip_always_defrag = 0

### IPV6 NETWORKING

# Disables IPv6 packet forwarding
# net.ipv6.conf.all.forwarding = 0

# Do you want IPv6 address autoconfiguration? Kernel default is yes.
# net.ipv6.conf.all.autoconf = 0
# net.ipv6.conf.default.autoconf = 0

# Do you want kernel to add default route for IPv6 interfaces if
# there is no router on the link? Kernel default is yes.
# Kernel 2.4.0-test? or later (after ANK accepts my patch - baggins).
# net.ipv6.conf.all.autoconf_route = 0

### OTHER SETTINGS

# Adjust number of inodes and file handles available in the system.
# If you have a havily loaded system and kernel complains about
# file/inode limit reached in VFS, increase this 2x. The default
# value is 4096 (file) and 8192 (inode). The inode number should be
# always 2-3 times the file number. For most systems this should not
# be changed
# fs.file-max = 8192
# fs.inode-max = 16384

# Controls whether core dumps will append the PID to the core filename.
# Useful for debugging multi-threaded applications.
#kernel.core_uses_pid = 1

# System Request functionality of the kernel (SYNC)
# Use kernel.sysrq = 1 to allow all keys.
# See http://fedoraproject.org/wiki/QA/Sysrq for a list of values and keys.
kernel.sysrq = 1

# After how many seconds reboot system after kernel panic?
# 0 - never reboot system (suggested 60)
#kernel.panic = 60

#
# GRSECURITY http://www.grsecurity.org
#
# WARNING!
# These values are SET ONCE!
#
#kernel.grsecurity.linking_restrictions = 1
#kernel.grsecurity.fifo_restrictions = 1
#kernel.grsecurity.destroy_unused_shm = 0
#kernel.grsecurity.chroot_caps = 0
#kernel.grsecurity.chroot_deny_chmod = 0
#kernel.grsecurity.chroot_deny_chroot = 1
#kernel.grsecurity.chroot_deny_fchdir = 0
#kernel.grsecurity.chroot_deny_mknod = 1
#kernel.grsecurity.chroot_deny_mount = 1
#kernel.grsecurity.chroot_deny_pivot = 1
#kernel.grsecurity.chroot_deny_shmat = 0
#kernel.grsecurity.chroot_deny_sysctl = 1
#kernel.grsecurity.chroot_deny_unix = 0
#kernel.grsecurity.chroot_enforce_chdir = 0
#kernel.grsecurity.chroot_execlog = 0
#kernel.grsecurity.chroot_findtask = 1
#kernel.grsecurity.chroot_restrict_nice = 0

#kernel.grsecurity.exec_logging = 0
#kernel.grsecurity.signal_logging = 1
#kernel.grsecurity.forkfail_logging = 0
#kernel.grsecurity.timechange_logging = 1
#kernel.grsecurity.audit_chdir = 0
#kernel.grsecurity.audit_gid = 65505
#kernel.grsecurity.audit_group = 0
#kernel.grsecurity.audit_ipc = 0
#kernel.grsecurity.audit_mount = 0

#kernel.grsecurity.execve_limiting = 1
#kernel.grsecurity.dmesg = 1
#kernel.grsecurity.tpe = 1
#kernel.grsecurity.tpe_gid = 65500
#kernel.grsecurity.tpe_glibc = 0
#kernel.grsecurity.tpe_restrict_all = 0

#kernel.grsecurity.rand_pids = 1
#kernel.grsecurity.socket_all = 1
#kernel.grsecurity.socket_all_gid = 65501
#kernel.grsecurity.socket_client = 1
#kernel.grsecurity.socket_client_gid = 65502
#kernel.grsecurity.socket_server = 1
#kernel.grsecurity.socket_server_gid = 65503

#kernel.grsecurity.disable_modules = 0
#kernel.grsecurity.grsec_lock = 0

# kernel.randomize_va_space = 2
# 0 - Turn the process address space randomization off by default.
# 1 - Conservative address space randomization makes the addresses of
#     mmap base and VDSO page randomized. This, among other things,
#     implies that shared libraries will be loaded to random addresses.
#     Also for PIE binaries, the location of code start is randomized.
# 2 - This includes all the features that Conservative randomization
#     provides. In addition to that, also start of the brk area is randomized.
#     There a few legacy applications out there (such as some ancient
#     versions of libc.so.5 from 1996) that assume that brk area starts
#     just after the end of the code+bss. These applications break when
#     start of the brk area is randomized. There are however no known
#     non-legacy applications that would be broken this way, so for most
#     systems it is safe to choose Full randomization.

# for mplayer
#dev.rtc.max-user-freq = 1024
#