Convert setup_iptables to ansible role + Fix usertwist group don't exist error + Hardened Systemd unit #5
@@ -24,7 +24,7 @@ sudo apt install git git-lfs -y
|
||||
git lfs install
|
||||
|
||||
# Clone ansible_playbooks repo
|
||||
git clone https://git.athelas-conseils.fr/Stage/ansible_playbooks.git
|
||||
git clone -b dev https://git.athelas-conseils.fr/Stage/ansible_playbooks.git
|
||||
|
||||
|
||||
~/.local/bin/ansible-playbook ansible_playbooks/tasks/full_setup.yml -i ansible_playbooks/inventory.ini --extra-vars "ansible_ssh_pass=$password ansible_ssh_common_args='-o StrictHostKeyChecking=no'"
|
||||
@@ -5,6 +5,17 @@ Description=Simple Web Service
|
||||
User=usertwist
|
||||
Group=usertwist
|
||||
ExecStart=/usr/local/bin/usertwist
|
||||
PrivateTmp=yes
|
||||
NoNewPrivileges=true
|
||||
RestrictNamespaces=uts ipc pid user cgroup
|
||||
ProtectSystem=strict
|
||||
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
|
||||
ProtectKernelTunables=yes
|
||||
ProtectKernelModules=yes
|
||||
ProtectControlGroups=yes
|
||||
PrivateDevices=yes
|
||||
RestrictSUIDSGID=true
|
||||
|
Mateo marked this conversation as resolved
|
||||
ProtectHome=true
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
WantedBy=multi-user.target
|
||||
@@ -29,11 +29,16 @@
|
||||
src: ../templates/Caddyfile.j2
|
||||
dest: /etc/caddy/Caddyfile
|
||||
|
||||
- name: Create the usertwist group
|
||||
ansible.builtin.group:
|
||||
name: usertwist
|
||||
|
||||
- name: Create the usertwist user
|
||||
ansible.builtin.user:
|
||||
name: usertwist
|
||||
|
Mateo marked this conversation as resolved
Corwin
commented
Is this user able to login ? Is this user able to login ?
If so please use No Login https://man7.org/linux/man-pages/man8/nologin.8.html
|
||||
group: usertwist
|
||||
system: true
|
||||
shell: /usr/sbin/nologin
|
||||
|
||||
- name: Put the service binary on the remote server
|
||||
ansible.builtin.copy:
|
||||
|
||||
22
tasks/roles/setup_iptables/README.md
Normal file
22
tasks/roles/setup_iptables/README.md
Normal file
@@ -0,0 +1,22 @@
|
||||
Setup IPTables
|
||||
|
Mateo marked this conversation as resolved
Outdated
papey
commented
This looks a bit generic ! This looks a bit generic !
|
||||
=========
|
||||
|
||||
Create iptables rules on the remote server to allow connection on WEB and SSH ports only
|
||||
|
||||
Example Playbook
|
||||
----------------
|
||||
|
||||
- hosts: servers
|
||||
roles:
|
||||
- setup_iptables
|
||||
|
||||
License
|
||||
-------
|
||||
|
||||
BSD
|
||||
|
||||
Author Information
|
||||
------------------
|
||||
|
||||
Motysten
|
||||
E-Mail : mdm@athelas.fr
|
||||
34
tasks/roles/setup_iptables/meta/main.yml
Normal file
34
tasks/roles/setup_iptables/meta/main.yml
Normal file
@@ -0,0 +1,34 @@
|
||||
galaxy_info:
|
||||
author: Motysten
|
||||
description: Dev
|
||||
company: Athelas
|
||||
|
||||
# If the issue tracker for your role is not on github, uncomment the
|
||||
# next line and provide a value
|
||||
# issue_tracker_url: http://example.com/issue/tracker
|
||||
|
||||
# Choose a valid license ID from https://spdx.org - some suggested licenses:
|
||||
# - BSD-3-Clause (default)
|
||||
# - MIT
|
||||
# - GPL-2.0-or-later
|
||||
# - GPL-3.0-only
|
||||
# - Apache-2.0
|
||||
# - CC-BY-4.0
|
||||
license: license (GPL-2.0-or-later, MIT, etc)
|
||||
|
Mateo marked this conversation as resolved
Corwin
commented
Which license should we pick ? Which license should we pick ?
|
||||
|
||||
min_ansible_version: 2.1
|
||||
|
||||
# If this a Container Enabled role, provide the minimum Ansible Container version.
|
||||
# min_ansible_container_version:
|
||||
|
||||
galaxy_tags: []
|
||||
# List tags for your role here, one per line. A tag is a keyword that describes
|
||||
# and categorizes the role. Users find roles by searching for tags. Be sure to
|
||||
# remove the '[]' above, if you add tags to this list.
|
||||
#
|
||||
# NOTE: A tag is limited to a single word comprised of alphanumeric characters.
|
||||
# Maximum 20 tags per role.
|
||||
|
||||
dependencies: []
|
||||
# List your role dependencies here, one per line. Be sure to remove the '[]' above,
|
||||
# if you add dependencies to this list.
|
||||
38
tasks/roles/setup_iptables/tasks/main.yml
Normal file
38
tasks/roles/setup_iptables/tasks/main.yml
Normal file
@@ -0,0 +1,38 @@
|
||||
---
|
||||
|
Mateo marked this conversation as resolved
papey
commented
Required change : i'm pretty sure this iptables config does not survive a reboot. Can you check ? What should you do to ensure this config is applied at boot time ? **Required change** : i'm pretty sure this iptables config does not survive a reboot. Can you check ? What should you do to ensure this config is applied at boot time ?
|
||||
# tasks file for setup_iptables
|
||||
- name: Open needed ports
|
||||
ansible.builtin.iptables:
|
||||
chain: INPUT
|
||||
protocol: tcp
|
||||
in_interface: eth0
|
||||
jump: ACCEPT
|
||||
destination_ports:
|
||||
- "22"
|
||||
- "443"
|
||||
- "80"
|
||||
|
||||
- name: Set INPUT policy to DROP
|
||||
ansible.builtin.iptables:
|
||||
chain: INPUT
|
||||
policy: DROP
|
||||
|
||||
- name: Create iptables folder in /etc
|
||||
ansible.builtin.file:
|
||||
path: /etc/ansible
|
||||
state: directory
|
||||
mode: '0755'
|
||||
|
||||
- name: Install iptables-persistent for rules persistence
|
||||
ansible.builtin.package:
|
||||
name: iptables-persistent
|
||||
update_cache: true
|
||||
|
||||
- name: Save IPv4 rules to keep them on reboot
|
||||
community.general.iptables_state:
|
||||
state: saved
|
||||
path: /etc/iptables/rules.v4
|
||||
|
||||
- name: Save IPv6 rules to keep them on reboot
|
||||
community.general.iptables_state:
|
||||
state: saved
|
||||
path: /etc/iptables/rules.v6
|
||||
@@ -1,20 +1,6 @@
|
||||
- name: Edit iptables settings
|
||||
hosts: athelas
|
||||
become: true
|
||||
tasks:
|
||||
|
||||
- name: Open needed ports
|
||||
ansible.builtin.iptables:
|
||||
chain: INPUT
|
||||
protocol: tcp
|
||||
in_interface: eth0
|
||||
jump: ACCEPT
|
||||
destination_ports:
|
||||
- "22"
|
||||
- "443"
|
||||
- "80"
|
||||
|
||||
- name: Set INPUT policy to DROP
|
||||
ansible.builtin.iptables:
|
||||
chain: INPUT
|
||||
policy: DROP
|
||||
|
||||
roles:
|
||||
- setup_iptables
|
||||
|
||||
Reference in New Issue
Block a user
What about
ProtectHome?