<descr><![CDATA[Disable the pf ftp proxy handler.]]></descr>
<descr><![CDATA[Disable the pf ftp proxy handler.]]></descr>
<tunable>debug.pfftpproxy</tunable>
<tunable>debug.pfftpproxy</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html]]></descr>
<descr><![CDATA[Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html]]></descr>
<tunable>vfs.read_max</tunable>
<tunable>vfs.read_max</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[Set the ephemeral port range to be lower.]]></descr>
<descr><![CDATA[Set the ephemeral port range to be lower.]]></descr>
<tunable>net.inet.ip.portrange.first</tunable>
<tunable>net.inet.ip.portrange.first</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[Drop packets to closed TCP ports without returning a RST]]></descr>
<descr><![CDATA[Drop packets to closed TCP ports without returning a RST]]></descr>
<tunable>net.inet.tcp.blackhole</tunable>
<tunable>net.inet.tcp.blackhole</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[Do not send ICMP port unreachable messages for closed UDP ports]]></descr>
<descr><![CDATA[Do not send ICMP port unreachable messages for closed UDP ports]]></descr>
<tunable>net.inet.udp.blackhole</tunable>
<tunable>net.inet.udp.blackhole</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[Randomize the ID field in IP packets (default is 0: sequential IP IDs)]]></descr>
<descr><![CDATA[Randomize the ID field in IP packets (default is 0: sequential IP IDs)]]></descr>
<tunable>net.inet.ip.random_id</tunable>
<tunable>net.inet.ip.random_id</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[
<descr><![CDATA[
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
as part of the standard FreeBSD core system.
]]></descr>
]]></descr>
<tunable>net.inet.ip.sourceroute</tunable>
<tunable>net.inet.ip.sourceroute</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[
<descr><![CDATA[
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
as part of the standard FreeBSD core system.
]]></descr>
]]></descr>
<tunable>net.inet.ip.accept_sourceroute</tunable>
<tunable>net.inet.ip.accept_sourceroute</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[
<descr><![CDATA[
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
packets without returning a response.
packets without returning a response.
]]></descr>
]]></descr>
<tunable>net.inet.icmp.drop_redirect</tunable>
<tunable>net.inet.icmp.drop_redirect</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[
<descr><![CDATA[
This option turns off the logging of redirect packets because there is no limit and this could fill
This option turns off the logging of redirect packets because there is no limit and this could fill
up your logs consuming your whole hard drive.
up your logs consuming your whole hard drive.
]]></descr>
]]></descr>
<tunable>net.inet.icmp.log_redirect</tunable>
<tunable>net.inet.icmp.log_redirect</tunable>
<value>default</value>
<value>default</value>
</item>
</item>
<item>
<item>
<descr><![CDATA[Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)]]></descr>
<descr><![CDATA[Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)]]></descr>