2014-08-16 23:35:57 +02:00
|
|
|
---
|
2015-06-07 11:42:03 +02:00
|
|
|
|
2018-04-26 15:58:35 +02:00
|
|
|
- block:
|
2019-10-26 16:36:07 +02:00
|
|
|
- name: Set Debian firewall packages
|
|
|
|
set_fact:
|
|
|
|
debian_firewall_packages:
|
|
|
|
- firewalld
|
|
|
|
- tidy
|
|
|
|
- fail2ban
|
|
|
|
- python3-systemd # for fail2ban systemd backend
|
|
|
|
|
2018-04-26 15:58:35 +02:00
|
|
|
- name: Install firewalld and deps
|
|
|
|
when: ansible_distribution_major_version is version_compare('8', '>=')
|
2019-10-26 16:36:07 +02:00
|
|
|
apt: pkg={{ debian_firewall_packages }} state=present
|
2018-04-26 15:58:35 +02:00
|
|
|
|
2019-10-18 18:02:17 +02:00
|
|
|
- name: Use nftables backend in firewalld
|
|
|
|
when: ansible_distribution_major_version is version_compare('10', '>=')
|
|
|
|
lineinfile:
|
|
|
|
dest: /etc/firewalld/firewalld.conf
|
|
|
|
regexp: '^FirewallBackend=iptables$'
|
|
|
|
line: 'FirewallBackend=nftables'
|
|
|
|
notify:
|
|
|
|
- restart firewalld
|
|
|
|
|
2019-10-18 21:49:29 +02:00
|
|
|
# firewalld seems to have an issue with iptables 1.8.2 when using the nftables
|
|
|
|
# backend. Using individual calls seems to work around it.
|
|
|
|
# See: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931722
|
|
|
|
- name: Use individual iptables calls
|
|
|
|
when: ansible_distribution_major_version is version_compare('10', '>=')
|
|
|
|
lineinfile:
|
|
|
|
dest: /etc/firewalld/firewalld.conf
|
|
|
|
regexp: '^IndividualCalls=no$'
|
|
|
|
line: 'IndividualCalls=yes'
|
|
|
|
notify:
|
|
|
|
- restart firewalld
|
|
|
|
|
2018-04-26 15:58:35 +02:00
|
|
|
- name: Copy firewalld public zone file
|
|
|
|
when: ansible_distribution_major_version is version_compare('8', '>=')
|
|
|
|
template: src=public.xml.j2 dest=/etc/firewalld/zones/public.xml owner=root mode=0600
|
2015-06-07 11:42:03 +02:00
|
|
|
|
2018-04-26 15:58:35 +02:00
|
|
|
- name: Format public.xml firewalld zone file
|
|
|
|
when: ansible_distribution_major_version is version_compare('8', '>=')
|
|
|
|
command: tidy -xml -iq -m -w 0 /etc/firewalld/zones/public.xml
|
|
|
|
notify:
|
2019-10-05 11:29:30 +02:00
|
|
|
- restart firewalld
|
2019-10-05 11:28:30 +02:00
|
|
|
|
|
|
|
- name: Copy ipsets of abusive IPs
|
|
|
|
when: ansible_distribution_major_version is version_compare('8', '>=')
|
|
|
|
copy: src={{ item }} dest=/etc/firewalld/ipsets/{{ item }} owner=root group=root mode=0600
|
|
|
|
loop:
|
|
|
|
- abusers-ipv4.xml
|
|
|
|
- abusers-ipv6.xml
|
|
|
|
notify:
|
2019-10-05 11:29:30 +02:00
|
|
|
- restart firewalld
|
2019-10-26 16:36:07 +02:00
|
|
|
|
|
|
|
- include_tasks: fail2ban.yml
|
|
|
|
when: ansible_distribution_major_version is version_compare('9', '>=')
|
2018-04-25 17:58:31 +02:00
|
|
|
tags: firewall
|
2018-04-25 17:55:22 +02:00
|
|
|
|
|
|
|
# vim: set sw=2 ts=2:
|