summaryrefslogtreecommitdiffstats
path: root/roles/common/templates
diff options
context:
space:
mode:
Diffstat (limited to 'roles/common/templates')
-rw-r--r--roles/common/templates/etc/fail2ban/jail.local.j24
-rw-r--r--roles/common/templates/etc/iptables/services.j22
2 files changed, 3 insertions, 3 deletions
diff --git a/roles/common/templates/etc/fail2ban/jail.local.j2 b/roles/common/templates/etc/fail2ban/jail.local.j2
index a34cb70..f1c9833 100644
--- a/roles/common/templates/etc/fail2ban/jail.local.j2
+++ b/roles/common/templates/etc/fail2ban/jail.local.j2
@@ -6,49 +6,49 @@
# Destination email address used solely for the interpolations in
# jail.{conf,local} configuration files.
destemail = admin@fripost.org
# Specify chain where jumps would need to be added in iptables-* actions
chain = fail2ban
# Choose default action.
action = %(action_)s
# Don't ban ourselves.
ignoreip = 127.0.0.0/8 {{ groups.all | sort | join(' ') }}
#
# JAILS
#
[ssh]
enabled = true
-port = {{ ansible_ssh_port|default('22') }}
+port = {{ ansible_port|default('22') }}
filter = sshd
logpath = /var/log/auth.log
maxretry = 5
[ssh-ddos]
enabled = true
-port = {{ ansible_ssh_port|default('22') }}
+port = {{ ansible_port|default('22') }}
filter = sshd-ddos
logpath = /var/log/auth.log
maxretry = 2
# Generic filter for pam. Has to be used with action which bans all ports
# such as iptables-allports, shorewall
[pam-generic]
enabled = true
# pam-generic filter can be customized to monitor specific subset of 'tty's
filter = pam-generic
# port actually must be irrelevant but lets leave it all for some possible uses
port = anyport
banaction = iptables-allports
logpath = /var/log/auth.log
maxretry = 6
{% if 'MX' in group_names %}
[postfix]
diff --git a/roles/common/templates/etc/iptables/services.j2 b/roles/common/templates/etc/iptables/services.j2
index 8792771..303fa06 100644
--- a/roles/common/templates/etc/iptables/services.j2
+++ b/roles/common/templates/etc/iptables/services.j2
@@ -1,39 +1,39 @@
# {{ ansible_managed }}
# Do NOT edit this file directly!
#
# direction protocol destination port source port
# (in|out|inout)[46]? (tcp|udp|..) (port|port:port|port,port) (port|port:port|port,port)
out tcp 80,443 # HTTP/HTTPS
out tcp 9418 # GIT
out udp 53 # DNS
out udp 67 # DHCP
out tcp 22 # SSH
{% if 'NTP-master' in group_names %}
in udp 123 # NTP
out udp 123 # NTP
{% else %}
out udp 123 123 # NTP
{% endif %}
-in tcp {{ ansible_ssh_port|default('22') }} # SSH
+in tcp {{ ansible_port|default('22') }} # SSH
{% if 'LDAP-provider' in group_names %}
in tcp 636 # LDAPS
{% elif 'MX' in group_names or 'lists' in group_names %}
out tcp 636 # LDAPS
{% endif %}
{% if 'MX' in group_names %}
in tcp 25 # SMTP
{% if 'MDA' not in group_names %}
out tcp {{ postfix_instance.IMAP.port }}
{% endif %}
{% if 'lists' not in group_names %}
out tcp {{ postfix_instance.lists.port }}
{% endif %}
{% endif %}
{% if 'out' in group_names %}
{% if groups.all | difference([inventory_hostname]) %}
in tcp {{ postfix_instance.out.port }}
{% endif %}
out tcp 25 # SMTP
{% else %}