Axe TCP_RESTRICT_RST. It was never a particularly good idea except for a few
very specific scenarios, and now that we have had net.inet.tcp.blackhole for quite some time there is really no reason to use it any more. (second of three commits)
This commit is contained in:
parent
11b876c98e
commit
cc084f7587
@ -79,7 +79,6 @@ tcp_keepalive="YES" # Enable stale TCP connection timeout (or NO).
|
||||
# TCP_RESTRICT_RST set in your kernel. Please refer to LINT for details.
|
||||
tcp_drop_synfin="NO" # Set to YES to drop TCP packets with SYN+FIN
|
||||
# NOTE: this violates the TCP specification
|
||||
tcp_restrict_rst="NO" # Set to YES to restrict emission of RST
|
||||
icmp_drop_redirect="NO" # Set to YES to ignore ICMP REDIRECT packets
|
||||
icmp_log_redirect="NO" # Set to YES to log ICMP REDIRECT packets
|
||||
network_interfaces="auto" # List of network interfaces (or "auto").
|
||||
|
@ -394,13 +394,6 @@ network_pass1() {
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_restrict_rst} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' restrict TCP reset=YES'
|
||||
sysctl -w net.inet.tcp.restrict_rst=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
|
@ -394,13 +394,6 @@ network_pass1() {
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_restrict_rst} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' restrict TCP reset=YES'
|
||||
sysctl -w net.inet.tcp.restrict_rst=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
|
@ -394,13 +394,6 @@ network_pass1() {
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_restrict_rst} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' restrict TCP reset=YES'
|
||||
sysctl -w net.inet.tcp.restrict_rst=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
|
@ -394,13 +394,6 @@ network_pass1() {
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_restrict_rst} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' restrict TCP reset=YES'
|
||||
sysctl -w net.inet.tcp.restrict_rst=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
|
@ -394,13 +394,6 @@ network_pass1() {
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_restrict_rst} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' restrict TCP reset=YES'
|
||||
sysctl -w net.inet.tcp.restrict_rst=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
|
@ -394,13 +394,6 @@ network_pass1() {
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_restrict_rst} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' restrict TCP reset=YES'
|
||||
sysctl -w net.inet.tcp.restrict_rst=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
|
@ -394,13 +394,6 @@ network_pass1() {
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_restrict_rst} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' restrict TCP reset=YES'
|
||||
sysctl -w net.inet.tcp.restrict_rst=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
|
@ -470,14 +470,6 @@ This prevents OS fingerprinting, but may
|
||||
break some legitimate applications.
|
||||
This option is only available if the
|
||||
kernel was built with the TCP_DROP_SYNFIN option.
|
||||
.It Ar tcp_restrict_rst
|
||||
(bool) Set to
|
||||
.Ar NO
|
||||
by default.
|
||||
Setting to YES will cause the kernel to refrain from emitting TCP RST frames
|
||||
in response to invalid TCP packets (e.g. frames destined for closed ports).
|
||||
This option is only available if the kernel was built with the
|
||||
TCP_RESTRICT_RST option.
|
||||
.It Ar icmp_drop_redirect
|
||||
(bool) Set to
|
||||
.Ar NO
|
||||
|
Loading…
Reference in New Issue
Block a user