Go to file
Major Hayden 31823b7647 Implemented: V-38548.
This patch disables ICMPv6 redirects feature on the host.
Accepting ICMP redirects has few legitimate uses.
It should be disabled unless it is absolutely required.

It is configurable by ``security_disable_icmpv6_redirects`` variable.
This feature is disabled by default.

Change-Id: I12049973d351aee76b95153779c6545e4c7cf00c
2016-08-23 16:07:48 +00:00
2016-08-23 16:07:48 +00:00
2016-08-23 16:07:48 +00:00
2016-08-23 16:07:48 +00:00
2016-08-23 16:07:48 +00:00
2016-08-22 16:09:31 -05:00
2016-08-18 15:12:36 +00:00
2015-10-05 17:37:21 +00:00
2016-08-22 21:29:21 +00:00
2016-07-15 11:26:50 +00:00
2016-08-22 21:29:21 +00:00

openstack-ansible-security

The goal of the openstack-ansible-security role is to improve security within openstack-ansible deployments. The role is based on the Security Technical Implementation Guide (STIG) for Red Hat Enterprise Linux 6.

Requirements

This role can be used with or without the openstack-ansible role. It requires Ansible 1.8.3 at a minimum.

Role Variables

All of the variables for this role are in defaults/main.yml.

Dependencies

This role has no dependencies.

Example Playbook

Using the role is fairly straightforward:

- hosts: servers
  roles:
     - openstack-ansible-security

Running with Vagrant

This role can be tested easily on multiple platforms using Vagrant.

The Vagrantfile supports testing on:

  • Ubuntu 14.04
  • Ubuntu 16.04
  • CentOS 7

To test on all platforms:

vagrant destroy --force && vagrant up

To test on Ubuntu 14.04 only:

vagrant destroy ubuntu1404 --force && vagrant up ubuntu1404

To test on Ubuntu 16.04 only:

vagrant destroy ubuntu1604 --force && vagrant up ubuntu1604

To test on CentOS 7 only:

vagrant destroy centos7 --force && vagrant up centos7

License

Apache 2.0

Author Information

For more information, join #openstack-ansible on Freenode.

Description
Ansible role for security hardening
Readme 5.6 MiB
Languages
Jinja 51.9%
Python 47.9%
Shell 0.2%