summaryrefslogtreecommitdiff
path: root/meta-lsb/packages/procps/procps-3.2.7/sysctl.conf
diff options
context:
space:
mode:
authorSaul Wold <Saul.Wold@intel.com>2010-08-13 09:35:21 -0700
committerRichard Purdie <rpurdie@linux.intel.com>2010-08-13 23:37:30 +0100
commit2c11926528df4459de9c4b6eca3f45c6d3908f06 (patch)
tree08c35de8c69c86c8b1a06207729b20419e3aa9bd /meta-lsb/packages/procps/procps-3.2.7/sysctl.conf
parente8ac5a76d901ef247154bb06a6c27cd7dd6d4b61 (diff)
downloadopenembedded-core-2c11926528df4459de9c4b6eca3f45c6d3908f06.tar.gz
openembedded-core-2c11926528df4459de9c4b6eca3f45c6d3908f06.tar.bz2
openembedded-core-2c11926528df4459de9c4b6eca3f45c6d3908f06.tar.xz
openembedded-core-2c11926528df4459de9c4b6eca3f45c6d3908f06.zip
procps: Move from meta-moblin to meta-lsb
Signed-off-by: Saul Wold <Saul.Wold@intel.com>
Diffstat (limited to 'meta-lsb/packages/procps/procps-3.2.7/sysctl.conf')
-rw-r--r--meta-lsb/packages/procps/procps-3.2.7/sysctl.conf64
1 files changed, 64 insertions, 0 deletions
diff --git a/meta-lsb/packages/procps/procps-3.2.7/sysctl.conf b/meta-lsb/packages/procps/procps-3.2.7/sysctl.conf
new file mode 100644
index 000000000..34e7488bf
--- /dev/null
+++ b/meta-lsb/packages/procps/procps-3.2.7/sysctl.conf
@@ -0,0 +1,64 @@
+# This configuration file is taken from Debian.
+#
+# /etc/sysctl.conf - Configuration file for setting system variables
+# See sysctl.conf (5) for information.
+#
+
+#kernel.domainname = example.com
+
+# Uncomment the following to stop low-level messages on console
+#kernel.printk = 4 4 1 7
+
+##############################################################3
+# Functions previously found in netbase
+#
+
+# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
+# Turn on Source Address Verification in all interfaces to
+# prevent some spoofing attacks
+net.ipv4.conf.default.rp_filter=1
+net.ipv4.conf.all.rp_filter=1
+
+# Uncomment the next line to enable TCP/IP SYN cookies
+#net.ipv4.tcp_syncookies=1
+
+# Uncomment the next line to enable packet forwarding for IPv4
+#net.ipv4.ip_forward=1
+
+# Uncomment the next line to enable packet forwarding for IPv6
+#net.ipv6.conf.all.forwarding=1
+
+
+###################################################################
+# Additional settings - these settings can improve the network
+# security of the host and prevent against some network attacks
+# including spoofing attacks and man in the middle attacks through
+# redirection. Some network environments, however, require that these
+# settings are disabled so review and enable them as needed.
+#
+# Ignore ICMP broadcasts
+#net.ipv4.icmp_echo_ignore_broadcasts = 1
+#
+# Ignore bogus ICMP errors
+#net.ipv4.icmp_ignore_bogus_error_responses = 1
+#
+# Do not accept ICMP redirects (prevent MITM attacks)
+#net.ipv4.conf.all.accept_redirects = 0
+#net.ipv6.conf.all.accept_redirects = 0
+# _or_
+# Accept ICMP redirects only for gateways listed in our default
+# gateway list (enabled by default)
+# net.ipv4.conf.all.secure_redirects = 1
+#
+# Do not send ICMP redirects (we are not a router)
+#net.ipv4.conf.all.send_redirects = 0
+#
+# Do not accept IP source route packets (we are not a router)
+#net.ipv4.conf.all.accept_source_route = 0
+#net.ipv6.conf.all.accept_source_route = 0
+#
+# Log Martian Packets
+#net.ipv4.conf.all.log_martians = 1
+#
+
+#kernel.shmmax = 141762560