<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fripost-ansible/roles/common/templates/etc/fail2ban, branch master</title>
<subtitle>Fripost ansible scripts</subtitle>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/'/>
<entry>
<title>Send internal system mails to root@f.o.</title>
<updated>2025-09-10T13:14:45+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2025-09-10T13:14:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=4b48f1b6dd799d1a69f0c9e2a157a007fcdcbe25'/>
<id>4b48f1b6dd799d1a69f0c9e2a157a007fcdcbe25</id>
<content type='text'>
Instead of admin@f.o. Per msgid=&lt;ad724342-b3bb-48d9-9984-6d277714910d@fripost.org&gt;.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Instead of admin@f.o. Per msgid=&lt;ad724342-b3bb-48d9-9984-6d277714910d@fripost.org&gt;.
</pre>
</div>
</content>
</entry>
<entry>
<title>Improve Debian 11's fail2ban rules.</title>
<updated>2022-12-18T12:29:34+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2022-12-14T11:01:33+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=7ea3baad594b889f6f7f4e7e4ccc4dc7c0099bc6'/>
<id>7ea3baad594b889f6f7f4e7e4ccc4dc7c0099bc6</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Roundcube: Port to Debian 10.</title>
<updated>2020-05-17T03:21:32+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-05-17T02:25:36+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=aba1438a4d188ae4ba20d2ee264212622809afd1'/>
<id>aba1438a4d188ae4ba20d2ee264212622809afd1</id>
<content type='text'>
We use the version from buster-backports (currently 1.4.4+dfsg.1-1~bpo10+1)
for the elastic theme.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We use the version from buster-backports (currently 1.4.4+dfsg.1-1~bpo10+1)
for the elastic theme.
</pre>
</div>
</content>
</entry>
<entry>
<title>Improve/harden fail2ban configuration.</title>
<updated>2020-01-25T00:57:05+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-01-23T04:33:17+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=ee4e9e9836ad05279647b04eb1e8a3a4b0e16568'/>
<id>ee4e9e9836ad05279647b04eb1e8a3a4b0e16568</id>
<content type='text'>
 * Use nftables sets with a timeout
 * Start daemon with a hardened unit file and restricted Capability
   Bounding Set.  (This requires to change the log path to
   /var/log/fail2ban/*.)
 * Skip database as we don't care about persistence.
 * Refactor jail.local
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
 * Use nftables sets with a timeout
 * Start daemon with a hardened unit file and restricted Capability
   Bounding Set.  (This requires to change the log path to
   /var/log/fail2ban/*.)
 * Skip database as we don't care about persistence.
 * Refactor jail.local
</pre>
</div>
</content>
</entry>
<entry>
<title>MSA: Open 465/TCP for Email Submission over TLS.</title>
<updated>2019-03-19T01:27:42+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2019-03-19T01:27:42+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=b16aa5bd33e5ca4bdc8a0734e8db1f42611aa75b'/>
<id>b16aa5bd33e5ca4bdc8a0734e8db1f42611aa75b</id>
<content type='text'>
See RFC 8314 sec. 3.3 "Cleartext Considered Obsolete".
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
See RFC 8314 sec. 3.3 "Cleartext Considered Obsolete".
</pre>
</div>
</content>
</entry>
<entry>
<title>Update 'IMAP', 'MSA' and 'LDAP-provider' roles to Debian Stretch.</title>
<updated>2018-12-09T19:25:40+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2018-12-09T17:41:06+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=e2ddcfc51f66c2a52a401064eab005e793f148ee'/>
<id>e2ddcfc51f66c2a52a401064eab005e793f148ee</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Set up IPSec tunnels between each pair of hosts.</title>
<updated>2016-05-22T15:53:52+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2016-05-19T23:19:27+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=3fafa03aeb3640a86d9cd8c639d085df6a8d085d'/>
<id>3fafa03aeb3640a86d9cd8c639d085df6a8d085d</id>
<content type='text'>
We use a dedicated, non-routable, IPv4 subnet for IPSec.  Furthermore
the subnet is nullrouted in the absence of xfrm lookup (i.e., when there
is no matching IPSec Security Association) to avoid data leaks.

Each host is associated with an IP in that subnet (thus only reachble
within that subnet, either by the host itself or by its IPSec peers).

The peers authenticate each other using RSA public key authentication.
Kernel traps are used to ensure that connections are only established
when traffic is detected between the peers; after 30m of inactivity
(this value needs to be less than the rekeying period) the connection is
brought down and a kernel trap is installed.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We use a dedicated, non-routable, IPv4 subnet for IPSec.  Furthermore
the subnet is nullrouted in the absence of xfrm lookup (i.e., when there
is no matching IPSec Security Association) to avoid data leaks.

Each host is associated with an IP in that subnet (thus only reachble
within that subnet, either by the host itself or by its IPSec peers).

The peers authenticate each other using RSA public key authentication.
Kernel traps are used to ensure that connections are only established
when traffic is detected between the peers; after 30m of inactivity
(this value needs to be less than the rekeying period) the connection is
brought down and a kernel trap is installed.
</pre>
</div>
</content>
</entry>
<entry>
<title>s/ansible_ssh_/ansible_/</title>
<updated>2016-02-12T19:57:16+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2016-02-12T19:57:16+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=5e66e9db4c19058769ab49b8064d6c3cedbd59aa'/>
<id>5e66e9db4c19058769ab49b8064d6c3cedbd59aa</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>typo</title>
<updated>2015-06-07T00:53:48+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2015-05-17T11:29:48+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=87e658e7acc8e61611442703ba4dca8ba6dd4cde'/>
<id>87e658e7acc8e61611442703ba4dca8ba6dd4cde</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>typo</title>
<updated>2015-06-07T00:53:20+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-12-18T14:03:22+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=bf3747dcf42909980c37caf7d70aeac6d2048d7a'/>
<id>bf3747dcf42909980c37caf7d70aeac6d2048d7a</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
