Deleted Added
full compact
NOTES (133640) NOTES (133720)
1# $FreeBSD: head/sys/conf/NOTES 133640 2004-08-13 09:40:58Z fjoe $
1# $FreeBSD: head/sys/conf/NOTES 133720 2004-08-14 15:32:40Z dwmalone $
2#
3# NOTES -- Lines that can be cut/pasted into kernel and hints configs.
4#
5# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers',
6# 'makeoptions', 'hints', etc. go into the kernel configuration that you
7# run config(8) with.
8#
9# Lines that begin with 'hint.' are NOT for config(8), they go into your

--- 524 unchanged lines hidden (view full) ---

534# The `ef' device provides support for multiple ethernet frame types
535# specified via ETHER_* options. See ef(4) for details.
536#
537# The pf packet filter consists of three devices:
538# The `pf' device provides /dev/pf and the firewall code itself.
539# The `pflog' device provides the pflog0 interface which logs packets.
540# The `pfsync' device provides the pfsync0 interface used for
541# synchronization of firewall state tables (over the net).
2#
3# NOTES -- Lines that can be cut/pasted into kernel and hints configs.
4#
5# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers',
6# 'makeoptions', 'hints', etc. go into the kernel configuration that you
7# run config(8) with.
8#
9# Lines that begin with 'hint.' are NOT for config(8), they go into your

--- 524 unchanged lines hidden (view full) ---

534# The `ef' device provides support for multiple ethernet frame types
535# specified via ETHER_* options. See ef(4) for details.
536#
537# The pf packet filter consists of three devices:
538# The `pf' device provides /dev/pf and the firewall code itself.
539# The `pflog' device provides the pflog0 interface which logs packets.
540# The `pfsync' device provides the pfsync0 interface used for
541# synchronization of firewall state tables (over the net).
542# Requires option PFIL_HOOKS and (when used as a module) option RANDOM_IP_ID
542# Requires option PFIL_HOOKS
543#
544# The PPP_BSDCOMP option enables support for compress(1) style entire
545# packet compression, the PPP_DEFLATE is for zlib/gzip style compression.
546# PPP_FILTER enables code for filtering the ppp data stream and selecting
547# events for resetting the demand dial activity timer - requires bpf.
548# See pppd(8) for more details.
549#
550device ether #Generic Ethernet

--- 91 unchanged lines hidden (view full) ---

642options PFIL_HOOKS #required by IPFILTER
643options TCPDEBUG
644
645# The MBUF_STRESS_TEST option enables options which create
646# various random failures / extreme cases related to mbuf
647# functions. See mbuf(9) for a list of available test cases.
648options MBUF_STRESS_TEST
649
543#
544# The PPP_BSDCOMP option enables support for compress(1) style entire
545# packet compression, the PPP_DEFLATE is for zlib/gzip style compression.
546# PPP_FILTER enables code for filtering the ppp data stream and selecting
547# events for resetting the demand dial activity timer - requires bpf.
548# See pppd(8) for more details.
549#
550device ether #Generic Ethernet

--- 91 unchanged lines hidden (view full) ---

642options PFIL_HOOKS #required by IPFILTER
643options TCPDEBUG
644
645# The MBUF_STRESS_TEST option enables options which create
646# various random failures / extreme cases related to mbuf
647# functions. See mbuf(9) for a list of available test cases.
648options MBUF_STRESS_TEST
649
650# RANDOM_IP_ID causes the ID field in IP packets to be randomized
651# instead of incremented by 1 with each packet generated. This
652# option closes a minor information leak which allows remote
653# observers to determine the rate of packet generation on the
654# machine by watching the counter.
655options RANDOM_IP_ID
656
657# Statically Link in accept filters
658options ACCEPT_FILTER_DATA
659options ACCEPT_FILTER_HTTP
660
661# TCP_DROP_SYNFIN adds support for ignoring TCP packets with SYN+FIN. This
662# prevents nmap et al. from identifying the TCP/IP stack, but breaks support
663# for RFC1644 extensions and is not recommended for web servers.
664#

--- 1838 unchanged lines hidden ---
650# Statically Link in accept filters
651options ACCEPT_FILTER_DATA
652options ACCEPT_FILTER_HTTP
653
654# TCP_DROP_SYNFIN adds support for ignoring TCP packets with SYN+FIN. This
655# prevents nmap et al. from identifying the TCP/IP stack, but breaks support
656# for RFC1644 extensions and is not recommended for web servers.
657#

--- 1838 unchanged lines hidden ---