summaryrefslogtreecommitdiffstats
path: root/roles/common/tasks/sysctl.yml
diff options
context:
space:
mode:
authorGuilhem Moulin <guilhem@fripost.org>2016-03-30 21:46:59 +0300
committerGuilhem Moulin <guilhem@fripost.org>2016-03-30 21:46:59 +0300
commit40060b0ffec6f96e4e235e89da29567a6397b05b (patch)
tree17abf1150c8aa987ff4db50509669204f3decd98 /roles/common/tasks/sysctl.yml
parent54261953e711e67e4ee28f788ea35bcab0e86654 (diff)
sysctl: set net.ipv6.conf.all.accept_ra = 0.
Diffstat (limited to 'roles/common/tasks/sysctl.yml')
-rw-r--r--roles/common/tasks/sysctl.yml1
1 files changed, 1 insertions, 0 deletions
diff --git a/roles/common/tasks/sysctl.yml b/roles/common/tasks/sysctl.yml
index d3ae86f..3056ee6 100644
--- a/roles/common/tasks/sysctl.yml
+++ b/roles/common/tasks/sysctl.yml
@@ -9,40 +9,41 @@
# Address Verification in all interfaces to prevent some spoofing
# attacks.
- { name: 'net.ipv4.conf.default.rp_filter', value: 1 }
- { name: 'net.ipv4.conf.all.rp_filter', value: 1 }
# Enable TCP/IP SYN cookies to avoid TCP SYN flood attacks. We
# rate-limit not only the default ICMP types 3, 4, 11 and 12
# (0x1818), but also types 0 and 8. See icmp(7).
- { name: 'net.ipv4.tcp_syncookies', value: 1 }
- { name: 'net.ipv4.icmp_ratemask', value: 6425 }
- { name: 'net.ipv4.icmp_ratelimit', value: 1000 }
# Disable paquet forwarding between interfaces (we are not a router).
- { name: 'net.ipv4.ip_forward', value: 0 }
- { name: 'net.ipv6.conf.all.forwarding', value: 0 }
# Enable IPv6 Privacy Extensions.
- { name: 'net.ipv6.conf.default.use_tempaddr', value: 2 }
- { name: 'net.ipv6.conf.all.use_tempaddr', value: 2 }
- { name: 'net.ipv6.conf.all.autoconf', value: 0 }
+ - { name: 'net.ipv6.conf.all.accept_ra', value: 0 }
# Do not accept ICMP redirects (prevent MITM attacks).
- { name: 'net.ipv4.conf.all.accept_redirects', value: 0 }
- { name: 'net.ipv6.conf.all.accept_redirects', value: 0 }
# Do not send ICMP redirects (we are not a router).
- { name: 'net.ipv4.conf.default.send_redirects', value: 0 }
- { name: 'net.ipv4.conf.all.send_redirects', value: 0 }
# Do not accept IP source route packets (we are not a router).
- { name: 'net.ipv4.conf.all.accept_source_route', value: 0 }
- { name: 'net.ipv6.conf.all.accept_source_route', value: 0 }
# Log Martian Packets.
- { name: 'net.ipv4.conf.all.log_martians', value: 1 }
# Ignore ICMP broadcasts.
- { name: 'net.ipv4.icmp_echo_ignore_broadcasts', value: 1 }
# Ignore bogus ICMP errors.