Puppet Class: toughen::network
- Defined in:
- manifests/network.pp
Overview
Class: toughen::network
Parameters
-
‘ignore_bogus_messages`
Whether to ignore bogus ICMP messages or not.
-
‘send_redirects`
Whether to send ICMP redirects or not.
-
‘accept_source_route`
Whether to accept packets with SSR/LSR set.
-
‘accept_redirects`
Whether to accept packets with redirects set.
-
‘secure_redirects`
Whether to allow redirects from gateways in our table.
-
‘log_martians`
Whether to log martian packets or not.
-
‘ignore_broadcasts`
Whether to ignore ping requests to broadcast addresses.
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 |
# File 'manifests/network.pp', line 26
class toughen::network (
$ignore_bogus_messages = '1',
$send_redirects = '0',
$accept_source_route = '0',
$accept_redirects = '0',
$secure_redirects = '0',
$log_martians = '1',
$ignore_broadcasts = '1'
){
validate_re($ignore_bogus_messages, '[0,1]')
validate_re($send_redirects, '[0,1]')
validate_re($accept_source_route, '[0,1]')
validate_re($accept_redirects, '[0,1]')
validate_re($secure_redirects, '[0,1]')
validate_re($log_martians, '[0,1]')
validate_re($ignore_broadcasts, '[0,1]')
case $::osfamily {
'redhat': {}
'darwin': {
fail("OS family ${::osfamily} is not supported")
}
default: {}
}
file { [ '/etc/hosts.allow', '/etc/hosts.deny' ]:
owner => root,
group => root,
mode => '0644',
}
if $::operatingsystemmajrelease == 6 {
sysctl{ 'kernel.exec-shield': value => '1' }
}
sysctl { 'net.ipv4.icmp_ignore_bogus_error_messages':
value => $ignore_bogus_messages
}
sysctl { 'net.ipv4.icmp_ignore_bogus_error_responses':
value => '1'
}
sysctl { 'kernel.randomize_va_space':
value => '2'
}
sysctl { 'net.ipv4.conf.all.send_redirects':
value => $send_redirects,
}
sysctl { 'net.ipv4.conf.default.send_redirects':
value => $send_redirects,
}
sysctl { 'net.ipv4.conf.all.accept_source_route':
value => $accept_source_route,
}
sysctl { 'net.ipv4.conf.all.accept_redirects':
value => $accept_redirects,
}
sysctl { 'net.ipv4.conf.default.accept_redirects':
value => $accept_redirects,
}
sysctl { 'net.ipv4.conf.all.secure_redirects':
value => $secure_redirects,
}
sysctl { 'net.ipv4.conf.default.secure_redirects':
value => $secure_redirects,
}
sysctl { 'net.ipv4.conf.all.log_martians':
value => $log_martians,
}
sysctl { 'fs.suid_dumpable':
value => '0'
}
sysctl { 'net.ipv4.icmp_echo_ignore_broadcasts':
value => $ignore_broadcasts,
}
sysctl { 'net.ipv4.conf.all.rp_filter':
value => '1'
}
sysctl { 'net.ipv4.tcp_max_syn_backlog':
value => '4096'
}
}
|