sysctl.conf

Mike Neo neomikemac at gmail.com
Tue Jan 16 20:23:27 CET 2018


Yes, that helps - thx a lot.


2018-01-16 20:08 GMT+01:00 Maximilian Wilhelm <max at rfc2324.org>:

> Anno domini 2018 Mike Neo scripsit:
>
> Hi,
>
> > could you tell me what is the best practice for sysctl.conf configuration
> > (2 or 3 bgp peers, possible asym routing)?
>
> What exactly are you looking for?
>
> The first things that come to mind would be
>
>   * forwarding enabled
>
>     Old style: global option:
>
>       net.ipv4.ip_forward = 1
>
>     or in the new style (per interface option):
>
>       net.ipv4.conf.default.forwarding = 1
>       net.ipv4.conf.all.forwarding = 1
>
>     If you do not want to enable forwarding on all interface, you could
>     just add the interfaces you care about to that list (instead of "all"
>     and "default"), but beware, that this will only have an effect an
>     interfaces already created before sysctls are applied. Therefore this
>     would be risky when we are talking about some kind of tunnels like
>     OpenVPN / Wireguard / IPse /, etc. which might be recreated while the
>     system is running.
>
>     Also beware, that for IPv6 there only is the new style config:
>
>       net.ipv6.conf.default.forwarding = 1
>       net.ipv6.conf.all.forwarding = 1
>
>
>     When using the new style, you probably want to have both settings
>     to be safe in all scenarios (interfaces which already are present
>     when sysctl is applied + interfaces which (re)emerge later.
>
>
>   * rp_filter disabled
>
>     Similar to the forwarding setting there is reverse path filtering
>
>       net.ipv4.conf.default.rp_filter = 0
>       net.ipv4.conf.all.rp_filter = 0
>
>     which has to be disabled at least on the interfaces which could be
>     involved in asymetric routing. Please make sure to provide some
>     other means of BCP38 (like netfilter) to make sure, your routers
>     prevent people from spoofing source IPs as early as possible.
>
>
>   * Ignore ICMP redirects
>
>     When your routers are the only ones in a potentially untrusted
>     network, you probaly want to ignore ICMP redirects sent to your
>     boxes, to prevent MITM attacks:
>
>       net.ipv4.conf.default.accept_redirects = 0
>       net.ipv4.conf.all.accept_redirects = 0
>       net.ipv6.conf.default.accept_redirects = 0
>       net.ipv6.conf.all.accept_redirects = 0
>
>
> Hope that helps
>
> Best
> Max
> --
> Fortschritt bedeutet, einen Schritt so zu machen,
> daß man den nächsten auch noch machen kann.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://trubka.network.cz/pipermail/bird-users/attachments/20180116/3ea13b6e/attachment.html>


More information about the Bird-users mailing list