<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="fr">
	<id>https://futex.re/mediawiki/index.php?action=history&amp;feed=atom&amp;title=8.1_Tips</id>
	<title>8.1 Tips - Historique des versions</title>
	<link rel="self" type="application/atom+xml" href="https://futex.re/mediawiki/index.php?action=history&amp;feed=atom&amp;title=8.1_Tips"/>
	<link rel="alternate" type="text/html" href="https://futex.re/mediawiki/index.php?title=8.1_Tips&amp;action=history"/>
	<updated>2026-04-22T18:48:22Z</updated>
	<subtitle>Historique des versions pour cette page sur le wiki</subtitle>
	<generator>MediaWiki 1.39.17</generator>
	<entry>
		<id>https://futex.re/mediawiki/index.php?title=8.1_Tips&amp;diff=1744&amp;oldid=prev</id>
		<title>Futex le 15 septembre 2012 à 15:28</title>
		<link rel="alternate" type="text/html" href="https://futex.re/mediawiki/index.php?title=8.1_Tips&amp;diff=1744&amp;oldid=prev"/>
		<updated>2012-09-15T15:28:28Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nouvelle page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Rendre la pile non executable dans /etc/system:&lt;br /&gt;
  noexec_user_stack=1&lt;br /&gt;
&lt;br /&gt;
Il faut passer le champ tcp_strong_iss à 2 (par défaut il est à 1, on peut prévoir le numéro de séquence TCP) &lt;br /&gt;
  ndd -set /dev/tcp tcp_strong_iss 2&lt;br /&gt;
  To configure this behavior to be the default after future reboots, put the line TCP_STRONG_ISS=2 in the file /etc/default/inetinit&lt;br /&gt;
&lt;br /&gt;
Disable ICMP broadcast echo activity. Otherwise, your system could be used as part of a Smurf attack:&lt;br /&gt;
  ndd -set /dev/ip ip_respond_to_echo_broadcast 0&lt;br /&gt;
  ndd -set /dev/ip ip6_respond_to_echo_multicast 0&lt;br /&gt;
  ndd -set /dev/ip ip_forward_directed_broadcasts 0&lt;br /&gt;
&lt;br /&gt;
Disable ICMP routing redirects. &lt;br /&gt;
  ndd -set /dev/ip ip_ignore_redirect 1&lt;br /&gt;
  ndd -set /dev/ip ip6_ignore_redirect 1&lt;br /&gt;
  ndd -set /dev/ip ip_send_redirects 0&lt;br /&gt;
  ndd -set /dev/ip ip6_send_redirects 0&lt;br /&gt;
&lt;br /&gt;
Disable ICMP broadcast probes.&lt;br /&gt;
  ndd -set /dev/ip ip_respond_to_address_mask_broadcast 0&lt;br /&gt;
  ndd -set /dev/ip ip_respond_to_timestamp_broadcast 0 &lt;br /&gt;
&lt;br /&gt;
Disable IP source routing. &lt;br /&gt;
  ndd -set /dev/ip ip_forward_src_routed 0&lt;br /&gt;
  ndd -set /dev/ip ip6_forward_src_routed 0 &lt;br /&gt;
&lt;br /&gt;
Enforce strict multi-homing for non-forwarding multi-homed systems.&lt;br /&gt;
  ndd -set /dev/ip ip_strict_dst_multihoming 1&lt;br /&gt;
  ndd -set /dev/ip ip6_strict_dst_multihoming 1 &lt;br /&gt;
&lt;br /&gt;
Increase resiliance under heavy TCP load (which makes the system more resistant to SYN Flood attacks).&lt;br /&gt;
  ndd -set /dev/tcp tcp_conn_req_max_q 1024&lt;br /&gt;
  ndd -set /dev/tcp tcp_conn_req_max_q0 4096&lt;br /&gt;
  ndd -set /dev/tcp tcp_time_wait_interval 60000 &lt;br /&gt;
&lt;br /&gt;
Defend against TCP connection hijacking by following the recommendations of RFC 1948.&lt;br /&gt;
  ndd -set /dev/tcp tcp_strong_iss 2&lt;br /&gt;
  To configure this behavior to be the default after future reboots, put the line TCP_STRONG_ISS=2 in the file /etc/default/inetinit&lt;br /&gt;
&lt;br /&gt;
Increase TCP send and receive window sizes to at least 32 kbytes.&lt;br /&gt;
  ndd -set /dev/tcp tcp_xmit_hwat 32768&lt;br /&gt;
  ndd -set /dev/tcp tcp_recv_hwat 32768&lt;/div&gt;</summary>
		<author><name>Futex</name></author>
	</entry>
</feed>