Compare commits

...

2 commits

Author SHA1 Message Date
caeb23ee45
new default: coredump hardening sysctl.d; better swappiness default 2024-10-04 19:49:25 +02:00
Claudio Maradonna
8630677457
fix problem with zoreide iptables 2024-03-06 08:58:28 +01:00
3 changed files with 10 additions and 12 deletions

View file

@ -7,7 +7,7 @@ hardening_sshd_tcp_forward: false
hardening_sshd_legal_banner: false
hardening_sshd_permissions_set_sticky_bit: true
hardening_sysctl_vm_swappiness: 15
hardening_sysctl_vm_swappiness: 0
hardening_sysctl_disable_ipv6: false
hardening_modprobe_disable_list:

View file

@ -0,0 +1 @@
kernel.core_pattern=|/bin/false

View file

@ -84,18 +84,15 @@
- name: Configure iptables
when:
- "zoreide_enabled is true"
- 'zoreide_enabled is true'
- "ansible_facts.services['iptables.service'] is defined"
block:
- name: Allow related and established connections
ansible.builtin.iptables:
chain: INPUT
protocol: udp
destination_port: "{{ zoreide_ha_port }}"
ctstate: NEW
syn: match
jump: ACCEPT
comment: Zoreide HA Port
ansible.builtin.iptables:
chain: INPUT
protocol: udp
destination_port: "{{ zoreide_ha_port }}"
ctstate: NEW
jump: ACCEPT
comment: Zoreide HA Port
- name: Save rules with iptables-persistent v6
ansible.builtin.shell: iptables-save > /etc/iptables/rules.v4