From 585258e79d8c5a640905c1f05344ca52f614b112 Mon Sep 17 00:00:00 2001 From: Guilhem Moulin Date: Sat, 16 May 2020 02:53:06 +0200 Subject: typofix --- roles/common/templates/etc/nftables.conf.j2 | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'roles') diff --git a/roles/common/templates/etc/nftables.conf.j2 b/roles/common/templates/etc/nftables.conf.j2 index 3d2a23d..3104a4a 100755 --- a/roles/common/templates/etc/nftables.conf.j2 +++ b/roles/common/templates/etc/nftables.conf.j2 @@ -62,7 +62,7 @@ table inet filter { # https://blog.fraggod.net/2016/09/25/nftables-re-injected-ipsec-matching-without-xt_policy.html define IPsec.mark = 0x220 meta l4proto esp mark set mark | $IPsec.mark accept - ip saddr 172.16.0.0/24 ip daddr 172.16.0.7 mark & $IPsec.mark == $IPsec.mark accept + ip saddr 172.16.0.0/24 ip daddr {{ ipsec[inventory_hostname_short] }} mark & $IPsec.mark == $IPsec.mark accept # rate-limiting is done directly by the kernel (net.ipv4.icmp_{ratelimit,ratemask} runtime options) icmp type { echo-reply, echo-request, destination-unreachable } counter accept @@ -108,7 +108,7 @@ table inet filter { # because by the time we see a packet to 172.16.0.0/24 we don't # know if it'll be encapsulated meta l4proto esp accept - ip saddr 172.16.0.7 ip daddr 172.16.0.0/24 accept + ip saddr {{ ipsec[inventory_hostname_short] }} ip daddr 172.16.0.0/24 accept meta l4proto { icmp, icmpv6 } accept -- cgit v1.2.3