1
0
mirror of https://github.com/tommytran732/Linux-Setup-Scripts synced 2024-11-24 18:21:34 -05:00

Typo fixes

Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
Tommy 2024-06-04 11:39:38 -07:00
parent 22968df08f
commit 79a215e4d8
Signed by: Tomster
GPG Key ID: 555C902A34EC968F
2 changed files with 4 additions and 4 deletions

View File

@ -71,8 +71,8 @@ net.ipv6.conf.*.accept_redirects = 0
net.ipv4.conf.*.rp_filter = 1 net.ipv4.conf.*.rp_filter = 1
# Respond to ICMP # Respond to ICMP
net.ipv4.icmp_echo_ignore_all = 1 net.ipv4.icmp_echo_ignore_all = 0
net.ipv6.icmp.echo_ignore_all = 1 net.ipv6.icmp.echo_ignore_all = 0
# Enable IP Forwarding # Enable IP Forwarding
# Almost all of my servers run Docker anyways, and Docker absolutely requires this. # Almost all of my servers run Docker anyways, and Docker absolutely requires this.

View File

@ -42,6 +42,8 @@ net.core.bpf_jit_harden = 2
kernel.unprivileged_userns_clone = 1 kernel.unprivileged_userns_clone = 1
# Disable ptrace. Not needed on workstations. # Disable ptrace. Not needed on workstations.
# Also, the Debian gVisor package from Google will just take priority over this with their
# /etc/sysctl.d/999-gvisor.conf file.
kernel.yama.ptrace_scope = 3 kernel.yama.ptrace_scope = 3
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl # https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl
@ -52,8 +54,6 @@ kernel.perf_event_paranoid = 4
# https://github.com/containerd/containerd/issues/9048 # https://github.com/containerd/containerd/issues/9048
# Disable io_uring, a very sus feature. # Disable io_uring, a very sus feature.
# Note that this will make using Proxmox extremely annoying though, so you might wanna comment this out
# on a Proxmox node.
kernel_io_uring_disable = 2 kernel_io_uring_disable = 2
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel # https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel