Sysctl: Difference between revisions

From Hackepedia
Jump to navigationJump to search
No edit summary
link
 
(3 intermediate revisions by one other user not shown)
Line 1: Line 1:
Sysctl - get or set kernel state
Sysctl - get or set [[kernel]] state


To see a specific kernel state:
To see a specific kernel state:
Line 24: Line 24:
some popular ones you might want to check out:
some popular ones you might want to check out:


net.inet.tcp.blackhole: Do not send RST when dropping refused connections
net.inet.ip.forwarding: Enable IP forwarding between interfaces # To allow your computer to act as a [[router]]


net.inet.udp.blackhole: Do not send port unreachables for refused connects
kern.securelevel: Current secure level # You can only increase this number.


To allow your computer to act as a [[router]]:
kern.randompid: Chooses a random pid number when a new process is forked, as OpenBSD does by default.
 
net.inet.ip.forwarding: Enable IP forwarding between interfaces

Latest revision as of 09:12, 28 March 2013

Sysctl - get or set kernel state

To see a specific kernel state:

$ sysctl security.bsd.see_other_uids
security.bsd.see_other_uids: 1

What does the tunable do?

$ sysctl -d security.bsd.see_other_uids
security.bsd.see_other_uids: Unprivileged processes may see subjects/objects with different real uid

To change the status of this tunable:

# sysctl security.bsd.see_other_uids=0
security.bsd.see_other_uids: 1 -> 0

We have now changed the system settings to prevent users from seeing information about processes that are being run under another UID.

To list all the currently available non-opaque values:

$ sysctl -a

some popular ones you might want to check out:

net.inet.ip.forwarding: Enable IP forwarding between interfaces # To allow your computer to act as a router

kern.securelevel: Current secure level # You can only increase this number.

kern.randompid: Chooses a random pid number when a new process is forked, as OpenBSD does by default.