<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="fr">
	<id>https://futex.re/mediawiki/index.php?action=history&amp;feed=atom&amp;title=13.5_Tips</id>
	<title>13.5 Tips - Historique des versions</title>
	<link rel="self" type="application/atom+xml" href="https://futex.re/mediawiki/index.php?action=history&amp;feed=atom&amp;title=13.5_Tips"/>
	<link rel="alternate" type="text/html" href="https://futex.re/mediawiki/index.php?title=13.5_Tips&amp;action=history"/>
	<updated>2026-05-13T16:22:25Z</updated>
	<subtitle>Historique des versions pour cette page sur le wiki</subtitle>
	<generator>MediaWiki 1.39.17</generator>
	<entry>
		<id>https://futex.re/mediawiki/index.php?title=13.5_Tips&amp;diff=1512&amp;oldid=prev</id>
		<title>Futex le 5 juin 2012 à 15:06</title>
		<link rel="alternate" type="text/html" href="https://futex.re/mediawiki/index.php?title=13.5_Tips&amp;diff=1512&amp;oldid=prev"/>
		<updated>2012-06-05T15:06:58Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nouvelle page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Vérifier que la stack n&amp;#039;est pas exécutable&lt;br /&gt;
  # sedmgr&lt;br /&gt;
  Stack Execution Disable (SED) mode: select&lt;br /&gt;
  SED configured in kernel: select&lt;br /&gt;
&lt;br /&gt;
Modifier le SED d&amp;#039;un programme (Insertion d&amp;#039;un tag dans le header COFF)&lt;br /&gt;
  # sedmgr -c exempt getenvaddress&lt;br /&gt;
&lt;br /&gt;
Afficher le SED d&amp;#039;un programme&lt;br /&gt;
   # sedmgr -d getenvaddress&lt;br /&gt;
   getenvaddress : system&lt;br /&gt;
&lt;br /&gt;
Decrease the ARP cache cleanup interval.&lt;br /&gt;
  no -o arpt_killc=20 &lt;br /&gt;
&lt;br /&gt;
Disable ICMP broadcast echo activity. Otherwise, your system could be used as part of a Smurf attack:&lt;br /&gt;
  no -o directed_broadcast=0&lt;br /&gt;
&lt;br /&gt;
Disable ICMP routing redirects. Otherwise, your system could have its routing table misadjusted by an attacker. &lt;br /&gt;
  no -o ipignoreredirects=1&lt;br /&gt;
  no -o ipsendredirects=0 &lt;br /&gt;
&lt;br /&gt;
Disable ICMP broadcast probes. Otherwise, an attacker might be able to reverse engineer some details of your network infrastructure. &lt;br /&gt;
  no -o icmpaddressmask=0 &lt;br /&gt;
&lt;br /&gt;
Disable IP source routing. The only use of IP source routing these days is by attackers trying to spoof IP addresses that you would trust as internal hosts&lt;br /&gt;
  no -o ipsrcroutesend=0&lt;br /&gt;
  no -o ipsrcrouteforward=0 &lt;br /&gt;
&lt;br /&gt;
Increase resiliance under heavy TCP load (which makes the system more resistant to SYN Flood attacks).&lt;br /&gt;
  no -o clean_partial_conns=1 &lt;br /&gt;
&lt;br /&gt;
Increase TCP send and receive window sizes to at least 32 kbytes.&lt;br /&gt;
  no -o tcp_sendspace=32768&lt;br /&gt;
  no -o tcp_recvspace=32768&lt;/div&gt;</summary>
		<author><name>Futex</name></author>
	</entry>
</feed>