diff options
author | Renken <renken@shione.net> | 2024-07-30 20:24:20 +0200 |
---|---|---|
committer | Renken <renken@shione.net> | 2024-07-30 20:25:26 +0200 |
commit | ffbf97ac30f7942175e2e8459348d522f6834bab (patch) | |
tree | 4dd41f58663119890a73cc7cd90d165d67955b01 /config/shione | |
parent | 2f25948d3c2c090d1a394cb60629d40b89191d90 (diff) | |
download | shione-ffbf97ac30f7942175e2e8459348d522f6834bab.tar.gz shione-ffbf97ac30f7942175e2e8459348d522f6834bab.zip |
wiregard: sysctl: use debian default config
Diffstat (limited to 'config/shione')
-rw-r--r-- | config/shione/wireguard/files/etc/sysctl.d/local.conf | 67 | ||||
-rw-r--r-- | config/shione/wireguard/files/etc/sysctl.d/wireguard.conf | 3 |
2 files changed, 67 insertions, 3 deletions
diff --git a/config/shione/wireguard/files/etc/sysctl.d/local.conf b/config/shione/wireguard/files/etc/sysctl.d/local.conf new file mode 100644 index 0000000..cdb2b10 --- /dev/null +++ b/config/shione/wireguard/files/etc/sysctl.d/local.conf @@ -0,0 +1,67 @@ +# +# /etc/sysctl.conf - Configuration file for setting system variables +# See /etc/sysctl.d/ for additional system variables. +# See sysctl.conf (5) for information. +# + +#kernel.domainname = example.com + +# Uncomment the following to stop low-level messages on console +#kernel.printk = 3 4 1 3 + +################################################################### +# Functions previously found in netbase +# + +# Uncomment the next two lines to enable Spoof protection (reverse-path filter) +# Turn on Source Address Verification in all interfaces to +# prevent some spoofing attacks +#net.ipv4.conf.default.rp_filter=1 +#net.ipv4.conf.all.rp_filter=1 + +# Uncomment the next line to enable TCP/IP SYN cookies +# See http://lwn.net/Articles/277146/ +# Note: This may impact IPv6 TCP sessions too +#net.ipv4.tcp_syncookies=1 + +# Uncomment the next line to enable packet forwarding for IPv4 +net.ipv4.ip_forward=1 + +# Uncomment the next line to enable packet forwarding for IPv6 +# Enabling this option disables Stateless Address Autoconfiguration +# based on Router Advertisements for this host +net.ipv6.conf.all.forwarding=1 + + +################################################################### +# Additional settings - these settings can improve the network +# security of the host and prevent against some network attacks +# including spoofing attacks and man in the middle attacks through +# redirection. Some network environments, however, require that these +# settings are disabled so review and enable them as needed. +# +# Do not accept ICMP redirects (prevent MITM attacks) +#net.ipv4.conf.all.accept_redirects = 0 +#net.ipv6.conf.all.accept_redirects = 0 +# _or_ +# Accept ICMP redirects only for gateways listed in our default +# gateway list (enabled by default) +# net.ipv4.conf.all.secure_redirects = 1 +# +# Do not send ICMP redirects (we are not a router) +#net.ipv4.conf.all.send_redirects = 0 +# +# Do not accept IP source route packets (we are not a router) +#net.ipv4.conf.all.accept_source_route = 0 +#net.ipv6.conf.all.accept_source_route = 0 +# +# Log Martian Packets +#net.ipv4.conf.all.log_martians = 1 +# + +################################################################### +# Magic system request Key +# 0=disable, 1=enable all, >1 bitmask of sysrq functions +# See https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html +# for what other values do +#kernel.sysrq=438 diff --git a/config/shione/wireguard/files/etc/sysctl.d/wireguard.conf b/config/shione/wireguard/files/etc/sysctl.d/wireguard.conf deleted file mode 100644 index d51aa3c..0000000 --- a/config/shione/wireguard/files/etc/sysctl.d/wireguard.conf +++ /dev/null @@ -1,3 +0,0 @@ -# Configuration required for wireguard. -net.ipv4.ip_forward = 1 -net.ipv6.conf.all.forwarding = 1 |