Compare commits

...

2 Commits

Author SHA1 Message Date
571ee1e6ee update.. 2024-04-04 20:11:06 +02:00
8b62f7c557 update.. 2024-03-05 10:19:32 +01:00
58 changed files with 80 additions and 150 deletions

View File

@ -137,7 +137,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -89,7 +89,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -131,7 +131,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -88,7 +88,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -136,7 +136,7 @@ resolved_domains:
- ~.
- b3-bornim.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -91,7 +91,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -91,7 +91,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -91,7 +91,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -88,7 +88,7 @@ resolved_nameserver:
resolved_domains:
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -93,7 +93,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -91,7 +91,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -91,7 +91,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -89,7 +89,7 @@ resolved_domains:
- ~.
- warenform.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -91,7 +91,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -157,7 +157,7 @@ resolved_domains:
- ~.
- blkr.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -157,7 +157,7 @@ resolved_domains:
- ~.
- blkr.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -166,7 +166,7 @@ resolved_domains:
- ~.
- ebs.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -136,7 +136,7 @@ resolved_domains:
- ~.
- fhxb.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -206,7 +206,7 @@ resolved_domains:
- ga.netz
- ga.intra
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -88,7 +88,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -103,7 +103,7 @@ resolved_domains:
- ~.
- 123.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -148,7 +148,7 @@ resolved_domains:
- ~.
- ak.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -103,7 +103,7 @@ resolved_domains:
- ~.
- akb.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -103,7 +103,7 @@ resolved_domains:
- ~.
- b3-bornim.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -219,7 +219,7 @@ resolved_domains:
- ~.
- blkr.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -94,7 +94,7 @@ resolved_domains:
- ~.
- local.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -103,7 +103,7 @@ resolved_domains:
- ~.
- wf.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -149,7 +149,7 @@ resolved_domains:
- ~.
- ebs.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -214,7 +214,7 @@ resolved_domains:
- ~.
- elster.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -148,7 +148,7 @@ resolved_domains:
- ~.
- fhxb.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -209,7 +209,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -148,7 +148,7 @@ resolved_domains:
- ~.
- opp.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -103,7 +103,7 @@ resolved_domains:
- ~.
-local.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -103,7 +103,7 @@ resolved_domains:
- ~.
-local.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -103,7 +103,7 @@ resolved_domains:
- ~.
-local.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -103,7 +103,7 @@ resolved_domains:
- ~.
- sprachenatelier.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -91,7 +91,7 @@ resolved_domains:
- ~.
- warenform.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -92,7 +92,7 @@ resolved_nameserver:
resolved_domains:
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -94,7 +94,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -92,7 +92,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -92,7 +92,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -92,7 +92,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -212,7 +212,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -214,7 +214,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -214,7 +214,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -321,7 +321,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -210,7 +210,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -88,7 +88,7 @@ resolved_domains:
- ~.
- so36.net
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -211,7 +211,7 @@ resolved_domains:
- ~.
- warenform.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -211,7 +211,7 @@ resolved_domains:
- ~.
- warenform.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -221,7 +221,7 @@ resolved_domains:
- ~.
- warenform.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -217,7 +217,7 @@ resolved_domains:
- ~.
- warenform.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -83,7 +83,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -92,7 +92,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -92,7 +92,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -88,7 +88,7 @@ resolved_domains:
- ~.
- oopen.de
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -136,7 +136,7 @@ resolved_domains:
- ~.
- opp.netz
resolved_dnssec: true
resolved_dnssec: false
# dns.as250.net: 194.150.168.168
#

View File

@ -299,7 +299,7 @@
# ---
# Mattermost (MM) Service
# Mattermost (MM) Service (add a block)
# ---
- name: Check if String 'mm_server_ips=..' is present
@ -366,113 +366,43 @@
# ---
# Protection against and Limit Connections settings
# Per IP Connection Limit (add a line)
# ---
- name: Check if String 'protection_against_syn_flooding=..' is present
shell: grep -q -E "^protection_against_syn_flooding=" /etc/ipt-firewall/main_ipv4.conf
register: protect_settings_ipv4_present
- name: Check if String 'per_IP_connection_limit=..' is present
shell: grep -q -E "^per_IP_connection_limit=" /etc/ipt-firewall/main_ipv4.conf
register: per_ip_connection_limit_settings_ipv4_present
when: main_ipv4_exists.stat.exists
failed_when: "protect_settings_ipv4_present.rc > 1"
changed_when: "protect_settings_ipv4_present.rc > 0"
failed_when: "per_ip_connection_limit_settings_ipv4_present.rc > 1"
changed_when: "per_ip_connection_limit_settings_ipv4_present.rc > 0"
- name: Adjust file '/etc/ipt-firewall/main_ipv4.conf' (protect_settings)
blockinfile:
lineinfile:
path: /etc/ipt-firewall/main_ipv4.conf
insertafter: '^#?\s*create_iperf_rules'
block: |
# -------------
# - Protection against ...
# -------------
# - Protection against syn-flooding
# -
protection_against_syn_flooding=true
# - Protection against port scanning
# -
protection_against_port_scanning=true
# - Protection against SSH brute-force attacks
# -
protection_against_ssh_brute_force_attacks=true
# -------------
# - Limit Connections
# -------------
# - Limit connections per source IP
# -
limit_connections_per_source_IP=true
# - Limit RST packets
# -
limit_rst_packets=true
# - Limit new TCP connections per second per source IP
# -
limit_new_tcp_connections_per_seconds_per_source_IP=true
marker: "# Marker set by modify-ipt-server.yml (protect_settings)"
insertafter: '^#?\s*limit_connections_per_source_IP'
line: per_IP_connection_limit=$default_per_IP_connection_limit
when:
- main_ipv4_exists.stat.exists
- protect_settings_ipv4_present is changed
- per_ip_connection_limit_settings_ipv4_present is changed
notify:
- Restart IPv4 Firewall
- name: Check if String 'protection_against_syn_flooding=..' is present
shell: grep -q -E "^protection_against_syn_flooding=" /etc/ipt-firewall/main_ipv6.conf
register: protect_settings_ipv6_present
- name: Check if String 'per_IP_connection_limit=..' is present
shell: grep -q -E "^per_IP_connection_limit=" /etc/ipt-firewall/main_ipv6.conf
register: per_ip_connection_limit_settings_ipv6_present
when: main_ipv6_exists.stat.exists
failed_when: "protect_settings_ipv6_present.rc > 1"
changed_when: "protect_settings_ipv6_present.rc > 0"
failed_when: "per_ip_connection_limit_settings_ipv6_present.rc > 1"
changed_when: "per_ip_connection_limit_settings_ipv6_present.rc > 0"
- name: Adjust file '/etc/ipt-firewall/main_ipv6.conf' (protect_settings)
blockinfile:
path: /etc/ipt-firewall/main_ipv6.conf
insertafter: '^#?\s*create_iperf_rules'
block: |
# -------------
# - Protection against ...
# -------------
# - Protection against syn-flooding
# -
protection_against_syn_flooding=true
# - Protection against port scanning
# -
protection_against_port_scanning=true
# - Protection against SSH brute-force attacks
# -
protection_against_ssh_brute_force_attacks=true
# -------------
# - Limit Connections
# -------------
# - Limit connections per source IP
# -
limit_connections_per_source_IP=true
# - Limit RST packets
# -
limit_rst_packets=true
# - Limit new TCP connections per second per source IP
# -
limit_new_tcp_connections_per_seconds_per_source_IP=true
marker: "# Marker set by modify-ipt-server.yml (protect_settings)"
lineinfile:
dest: /etc/ipt-firewall/main_ipv6.conf
insertafter: '^#?\s*limit_connections_per_source_IP'
line: per_IP_connection_limit=$default_per_IP_connection_limit
when:
- main_ipv6_exists.stat.exists
- protect_settings_ipv6_present is changed
- per_ip_connection_limit_settings_ipv6_present is changed
notify:
- Restart IPv6 Firewall
@ -534,7 +464,7 @@
when:
- git_firewall_repository is defined and git_firewall_repository|length > 0
loop:
- default_ports.conf
- default_settings.conf
- include_functions.conf
- load_modules_ipv4.conf
- load_modules_ipv6.conf
@ -546,7 +476,7 @@
- name: Ensure configuration files are latest
command: cp {{ git_firewall_repository.dest }}/conf/{{ item }} /etc/ipt-firewall/{{ item }}
loop:
- default_ports.conf
- default_settings.conf
- include_functions.conf
- load_modules_ipv4.conf
- load_modules_ipv6.conf