Notes:
- setting any of these variables to
0
will de-activate them. - make sure to quote (
""
) the values, as shown below.
security_net_go_hardcore: true
Whether to perform any TCP/IP stack hardening or not. This variable exists so the user doesn't have to disable the rest of the variables if they don't care for this feature.
security_net_syn_cookies_protection: "1"
Helps protect against SYN flooding attacks.
security_net_default_rp_filter: "1"
security_net_all_rp_filter: "1"
Let the kernel do source validation of the received packets, which can help prevent attacks which use IP spoofing methods. A value of
1
sets the filtering mechanism to strict mode, and a value of2
will set it to loose mode. Both of these variables must have the same value.
security_net_default_icmp_redirect_sending: "0"
security_net_all_icmp_redirect_sending: "0"
Disable ICMP redirect sending. Both of these variables must have the same value.
security_net_icmp_accept_redirects: "0"
Don't accept ICMP redirects. This can protect against MITM (Man In The Middle) attacks.