--- # --- # vars used by roles/network_interfaces # --- # If true, all additional files in /etc/network/interfaces/interfaces.d/ are deleted network_manage_devices: True # Should the interfaces be reloaded after config change? network_interface_reload: False network_interface_path: /etc/network/interfaces.d network_interface_required_packages: - vlan - bridge-utils - ifmetric - ifupdown - ifenslave network_interfaces: - device: eno1 headline: eno1 - Uplink DSL via Fritz!Box auto: true family: inet method: static address: 172.16.172.1 netmask: 24 gateway: 172.16.172.254 - device: eno3 headline: eno3 - LAN auto: true family: inet method: static address: 192.168.172.254 netmask: 24 - device: eno3:ns headline: eno3:ns - Alias on eno2 (Nameserver) auto: true family: inet method: static address: 192.168.172.1 netmask: 32 - device: eno4 headline: eno4 - Uplink DSL via mobile data (Fritzbox 6850 5G) auto: true family: inet method: static address: 192.168.173.254 netmask: 24 # --- # vars used by roles/ansible_dependencies # --- # --- # vars used by roles/ansible_user # --- # --- # vars used by roles/common/tasks/basic.yml # --- # --- # vars used by roles/common/tasks/cron.yml # --- cron_user_entries: - name: "Check if Postfix Mailservice is up and running?" minute: '*/15' hour: '*' job: /root/bin/monitoring/check_postfix.sh - name: "Check if SSH service is up and running?" minute: '*/15' hour: '*' job: /root/bin/monitoring/check_ssh.sh - name: "Check if OpenVPN service is up and running?" minute: '*/30' hour: '*' job: /root/bin/monitoring/check_vpn.sh - name: "Check if nameservice (bind) is running?" minute: '*/10' hour: '*' job: /root/bin/monitoring/check_dns.sh - name: "Check forwarding ( /proc/sys/net/ipv4/ip_forward contains \"1\" )" minute: '0-59/2' hour: '*' job: /root/bin/monitoring/check_forwarding.sh - name: "Copy gateway configuration" minute: '09' hour: '3' job: /root/bin/manage-gw-config/copy_gateway-config.sh FLR-BRB #cron_user_special_time_entries: [] cron_user_special_time_entries: - name: "Check if Postfix Service is running at boot time" special_time: reboot job: "sleep 7 ; /root/bin/monitoring/check_postfix.sh" insertafter: PATH - name: "Restart Systemd's resolved at boottime." special_time: reboot job: "sleep 10 ; /bin/systemctl restart systemd-resolved" insertafter: PATH - name: "Restart NTP service 'ntpsec'" special_time: reboot job: "sleep 15 ; /bin/systemctl restart ntpsec" insertafter: PATH # --- # vars used by roles/common/tasks/sshd.yml # --- sshd_hostkeyalgorithms: - ssh-ed25519 - ssh-ed25519-cert-v01@openssh.com - rsa-sha2-256 - rsa-sha2-512 - ecdsa-sha2-nistp256 - rsa-sha2-256-cert-v01@openssh.com - rsa-sha2-512-cert-v01@openssh.com # --- # vars used by roles/common/tasks/apt.yml # --- # --- # vars used by roles/common/tasks/systemd-resolved.yml # --- systemd_resolved: true # CyberGhost - Schnelle Verbindung mit Keine-Logs-Datenschutzrichtlinie # Primäre DNS-Adresse: 38.132.106.139 # Sekundäre DNS-Adresse: 194.187.251.67 # # Cloudflare (USA) Bester kostenloser DNS-Server für Gaming mit zuverlässigen Verbindungen # primäre DNS-Adresse # IPv4: 1.1.1.1 # IPv6: 2606:4700:4700::1111 # sekundäre DNS-Adresse # IPv4: 1.0.0.1 # IPv6: 2606:4700:4700::1001 # # Google (USA) Public DNS - Großartige Kombination aus Geschwindigkeit und Sicherheit # primäre DNS-Adresse # IPv4: 8.8.8.8 # IPv6: 2001:4860:4860::8888 # sekundäre DNS-Adresse # IPv4: 8.8.4.4 # IPv6: 2001:4860:4860::8844 # # Quad9 (CH) - Blockiert mühelos schädliche Seiten und verhindert Phishing-Betrug # primäre DNS-Adresse # IPv4: 9.9.9.9 # IPv6: 2620:fe::fe # sekundäre DNS-Adresse # IPv4: 149.112.112.112 # IPv6: 2620:fe::9 # # OpenNIC - https://www.opennic.org/ # IPv4: 195.10.195.195 - ns31.de # IPv4: 94.16.114.254 - ns28.de # IPv4: 51.254.162.59 - ns9.de # IPv4: 194.36.144.87 - ns29.de # IPv6: 2a00:f826:8:2::195 - ns31.de # # Freifunk München (normales DNS, DNS-over-TLS und DNS-over-HTTPS) # IPv4: 5.1.66.255 # IPv6: 2001:678:e68:f000:: # Servername für DNS-over-TLS: dot.ffmuc.net # IPv4: 185.150.99.255 # IPv6: 2001:678:ed0:f000:: # Servername für DNS-over-TLS: dot.ffmuc.net # für iOS 14+: DoT-Server-Konfiguration (unsigniert, vom PrHdb) resolved_nameserver: - 127.0.0.1 # search domains # # If there are more than one search domains, then specify them here in the order in which # the resolver should also search them # #resolved_domains: [] resolved_domains: - ~. - oopen.de resolved_dnssec: false # dns.as250.net: 194.150.168.168 # resolved_fallback_nameserver: - 194.150.168.168 # --- # vars used by roles/common/tasks/users.yml # --- insert_ssh_keypair_backup_server: false ssh_keypair_backup_server: - name: backup backup_user: back priv_key_src: root/.ssh/id_rsa.backup.oopen.de priv_key_dest: /root/.ssh/id_rsa pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub pub_key_dest: /root/.ssh/id_rsa.pub insert_keypair_backup_client: true ssh_keypair_backup_client: - name: backup priv_key_src: root/.ssh/id_ed25519.oopen-server priv_key_dest: /root/.ssh/id_ed25519 pub_key_src: root/.ssh/id_ed25519.oopen-server.pub pub_key_dest: /root/.ssh/id_ed25519.pub target: backup.oopen.de # --- # vars used by roles/common/tasks/users-systemfiles.yml # --- # --- # vars used by roles/common/tasks/webadmin-user.yml # --- # --- # vars used by roles/common/tasks/sudoers.yml # --- # # see: roles/common/tasks/vars # --- # vars used by roles/common/tasks/caching-nameserver.yml # --- install_bind_packages: true # --- # vars used by roles/common/tasks/git.yml # --- git_firewall_repository: name: ipt-gateway repo: https://git.oopen.de/firewall/ipt-gateway dest: /usr/local/src/ipt-gateway # ============================== # --- # vars used by scripts/reset_root_passwd.yml # --- root_user: name: root password: $6$J1ssJfdshf/$mknQEPDcW4HN5.wFfawbamamywI7F7fhdZmaR1abNrc4DA7DNRx766lz3ygf9YV3gcmRq3QhJ3fBVlkwGMCvq.