NOTES (c678bc4f13a340ad88debe321afd0097db2590cb) NOTES (64dddc18727af4db4a6047ff86291d981f6e9042)
1#
2# NOTES -- Lines that can be cut/pasted into kernel and hints configs.
3#
4# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers',
5# 'makeoptions', 'hints' etc go into the kernel configuration that you
6# run config(8) with.
7#
8# Lines that begin with 'hints.' are NOT for config(8), they go into your

--- 576 unchanged lines hidden (view full) ---

585options IPV6FIREWALL_DEFAULT_TO_ACCEPT
586options IPDIVERT #divert sockets
587options IPFILTER #ipfilter support
588options IPFILTER_LOG #ipfilter logging
589options IPFILTER_DEFAULT_BLOCK #block all packets by default
590options IPSTEALTH #support for stealth forwarding
591options TCPDEBUG
592
1#
2# NOTES -- Lines that can be cut/pasted into kernel and hints configs.
3#
4# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers',
5# 'makeoptions', 'hints' etc go into the kernel configuration that you
6# run config(8) with.
7#
8# Lines that begin with 'hints.' are NOT for config(8), they go into your

--- 576 unchanged lines hidden (view full) ---

585options IPV6FIREWALL_DEFAULT_TO_ACCEPT
586options IPDIVERT #divert sockets
587options IPFILTER #ipfilter support
588options IPFILTER_LOG #ipfilter logging
589options IPFILTER_DEFAULT_BLOCK #block all packets by default
590options IPSTEALTH #support for stealth forwarding
591options TCPDEBUG
592
593# RANDOM_IP_ID causes the ID field in IP packets to be randomized
594# instead of incremented by 1 with each packet generated. This
595# option closes a minor information leak which allows remote
596# observers to determine the rate of packet generation on the
597# machine by watching the counter.
598options RANDOM_IP_ID
599
593# Statically Link in accept filters
594options ACCEPT_FILTER_DATA
595options ACCEPT_FILTER_HTTP
596
597# TCP_DROP_SYNFIN adds support for ignoring TCP packets with SYN+FIN. This
598# prevents nmap et al. from identifying the TCP/IP stack, but breaks support
599# for RFC1644 extensions and is not recommended for web servers.
600#

--- 2260 unchanged lines hidden ---
600# Statically Link in accept filters
601options ACCEPT_FILTER_DATA
602options ACCEPT_FILTER_HTTP
603
604# TCP_DROP_SYNFIN adds support for ignoring TCP packets with SYN+FIN. This
605# prevents nmap et al. from identifying the TCP/IP stack, but breaks support
606# for RFC1644 extensions and is not recommended for web servers.
607#

--- 2260 unchanged lines hidden ---