fff-network: Add comments to set sysctls

To make it clear why the set sysctls are necessary, add appropriate
comments to them. Also reorder them for improved readability.

Signed-off-by: Fabian Bläse <fabian@blaese.de>
Tested-by: Fabian Bläse <fabian@blaese.de>
This commit is contained in:
Fabian Bläse 2021-04-19 19:01:31 +02:00
parent 5d5eb29518
commit d252d5110a
2 changed files with 21 additions and 6 deletions

View File

@ -1,7 +1,7 @@
include $(TOPDIR)/rules.mk
PKG_NAME:=fff-network
PKG_RELEASE:=44
PKG_RELEASE:=45
include $(INCLUDE_DIR)/package.mk

View File

@ -1,9 +1,24 @@
# Disable IPv4 forwarding.
# This has to be set first, because it resets some of the
# net.ipv4.conf.* sysctls.
net.ipv4.ip_forward=0
net.ipv6.conf.default.accept_dad=0
net.ipv6.conf.default.accept_ra=0
net.ipv6.conf.all.accept_dad=0
net.ipv6.conf.all.accept_ra=0
# Enable IPv6 forwarding, otherwise the fc00::/7 route sometimes is
# not used if a default route is available, which breaks fc00::/7
# inside Freifunk.
# To ensure no packets are routed to different interfaces, fff-firewall
# sets appropriate iptables rules
net.ipv6.conf.all.forwarding=1
net.ipv6.conf.default.forwarding=0
# Do not accept Router Advertisements, so no public
# addresses are assigned to interfaces, where we don't
# want them. OpenWrts netifd overwrites this option for the WAN
# interface, so IPv6 WAN connectivity is still possible.
net.ipv6.conf.default.accept_ra=0
net.ipv6.conf.all.accept_ra=0
# Disable DAD, so fdff::1 on br-client does not get erroneously disabled.
# This should be done on a per-interface basis in the future.
net.ipv6.conf.default.accept_dad=0
net.ipv6.conf.all.accept_dad=0