summaryrefslogtreecommitdiff
path: root/etc/hostapd/appliance/sysctl.conf.sample
blob: a1cd6fd4d5b9affbef7769a844149810f3d726d0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
# IP traffic forwarding.
net.ipv4.ip_forward = 1

# Prevents SYN DOS attacks. Applies to ipv6 as well, despite name.
net.ipv4.tcp_syncookies = 1

# Prevents ip spoofing.
net.ipv4.conf.default.rp_filter = 1
net.ipv4.conf.all.rp_filter = 1

# Only groups within this id range can use ping.
net.ipv4.ping_group_range=999 59999

# Redirects can potentially be used to maliciously alter hosts routing
# tables.
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.secure_redirects = 1

# The source routing feature includes some known vulnerabilities.
net.ipv4.conf.all.accept_source_route = 0

# See RFC 1337
net.ipv4.tcp_rfc1337 = 1

# Restart after 30 seconds after kernel panic
kernel.panic = 30

# Users should not be able to create soft or hard links to files
# which they do not own. This mitigates several privilege
# escalation vulnerabilities.
fs.protected_hardlinks = 1
fs.protected_symlinks = 1

# Maximum number of network connections, which is 1024 per 128 MB.  If
# the value is too low, network packets may get dropped.
net.netfilter.nf_conntrack_max = 1048576
net.nf_conntrack_max = 1048576

# Only live IPTables connections are kept track of, dead connections
# are removed by a timeout period.  By reducing this value, the
# tracking table becomes lean which is optimal for high traffic.
# Lowering this value might break long-running idle TCP connections.
net.netfilter.nf_conntrack_tcp_timeout_established = 3600