<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="fr">
	<id>https://futex.re/mediawiki/index.php?action=history&amp;feed=atom&amp;title=8.4_Tips</id>
	<title>8.4 Tips - Historique des versions</title>
	<link rel="self" type="application/atom+xml" href="https://futex.re/mediawiki/index.php?action=history&amp;feed=atom&amp;title=8.4_Tips"/>
	<link rel="alternate" type="text/html" href="https://futex.re/mediawiki/index.php?title=8.4_Tips&amp;action=history"/>
	<updated>2026-05-13T16:19:04Z</updated>
	<subtitle>Historique des versions pour cette page sur le wiki</subtitle>
	<generator>MediaWiki 1.39.17</generator>
	<entry>
		<id>https://futex.re/mediawiki/index.php?title=8.4_Tips&amp;diff=2349&amp;oldid=prev</id>
		<title>Futex : Futex a déplacé la page 5.4 Tips vers 8.4 Tips</title>
		<link rel="alternate" type="text/html" href="https://futex.re/mediawiki/index.php?title=8.4_Tips&amp;diff=2349&amp;oldid=prev"/>
		<updated>2013-06-19T15:05:36Z</updated>

		<summary type="html">&lt;p&gt;Futex a déplacé la page &lt;a href=&quot;/mediawiki/index.php/5.4_Tips&quot; class=&quot;mw-redirect&quot; title=&quot;5.4 Tips&quot;&gt;5.4 Tips&lt;/a&gt; vers &lt;a href=&quot;/mediawiki/index.php/8.4_Tips&quot; title=&quot;8.4 Tips&quot;&gt;8.4 Tips&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nouvelle page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Activer l&amp;#039;ASLR&lt;br /&gt;
  echo 2 &amp;gt; /proc/sys/kernel/randomize_va_space&lt;br /&gt;
&lt;br /&gt;
Disable ICMP broadcast echo activity. Otherwise, your system could be used as part of a Smurf attack:&lt;br /&gt;
  sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1&lt;br /&gt;
&lt;br /&gt;
Disable ICMP routing redirects. Otherwise, your system could have its routing table misadjusted by an attacker. &lt;br /&gt;
  sysctl -w net.ipv4.conf.all.accept_redirects=0&lt;br /&gt;
  sysctl -w net.ipv6.conf.all.accept_redirects=0&lt;br /&gt;
  sysctl -w net.ipv4.conf.all.send_redirects=0&lt;br /&gt;
  sysctl -w net.ipv6.conf.all.send_redirects=0&lt;br /&gt;
&lt;br /&gt;
Disable ICMP broadcast probes.&lt;br /&gt;
  You will have to block these with a packet filter like iptables&lt;br /&gt;
&lt;br /&gt;
Disable IP source routing. The only use of IP source routing these days is by attackers trying to spoof IP addresses that you would trust as internal hosts. &lt;br /&gt;
  sysctl -w net.ipv4.conf.all.accept_source_route=0&lt;br /&gt;
  sysctl -w net.ipv4.conf.all.forwarding=0&lt;br /&gt;
  sysctl -w net.ipv4.conf.all.mc_forwarding=0&lt;br /&gt;
&lt;br /&gt;
Enforce sanity checking, also called ingress filtering or egress filtering.&lt;br /&gt;
  sysctl -w net.ipv4.conf.all.rp_filter=1&lt;br /&gt;
&lt;br /&gt;
Log and drop &amp;quot;Martian&amp;quot; packets.&lt;br /&gt;
  sysctl -w net.ipv4.conf.all.log_martians=1&lt;br /&gt;
&lt;br /&gt;
Increase resiliance under heavy TCP load (which makes the system more resistant to SYN Flood attacks). &lt;br /&gt;
  sysctl -w net.ipv4.tcp_max_syn_backlog=1280&lt;br /&gt;
  sysctl -w net.ipv4.tcp_syncookies=1&lt;br /&gt;
  Already drops inactive TCP connections within 60 seconds &lt;br /&gt;
&lt;br /&gt;
Increase TCP send and receive window sizes to at least 32 kbytes.&lt;br /&gt;
  The kernel supports RFC 1323 and RFC 2018 and dynamically adjusts the TCP send and receive space by default&lt;/div&gt;</summary>
		<author><name>Futex</name></author>
	</entry>
</feed>