ubuntu.yml 1.56 KB
- name: Hardening Ubuntu OS Disable IPv6
  sysctl:
    name: "{{ item.parameter }}"
    state: present
    value: "{{ item.value }}"
  with_items:
    - { parameter: net.ipv6.conf.all.disable_ipv6, value: 1 }
    - { parameter: net.ipv6.conf.default.disable_ipv6, value: 1 }
    - { parameter: net.ipv6.conf.lo.disable_ipv6, value: 1 }
  
- name: Hardening Ubuntu OS IP Spoofing protection
  sysctl:
    name: "{{ item.parameter }}"
    state: present
    value: "{{ item.value }}"
  with_items:
    - { parameter: net.ipv4.conf.all.rp_filter, value: 1 }
    - { parameter: net.ipv4.conf.default.rp_filter, value: 1 }

- name: Hardening Ubuntu OS Block SYN attacks
  sysctl:
    name: "{{ item.parameter }}"
    state: present
    value: "{{ item.value }}"
  with_items:
    - { parameter: net.ipv4.tcp_syncookies, value: 1 }
    - { parameter: net.ipv4.tcp_max_syn_backlog, value: 2048 }
    - { parameter: net.ipv4.tcp_synack_retries, value: 2 }
    - { parameter: net.ipv4.tcp_syn_retries, value: 5 }
    
- name: Hardening Ubuntu OS Ignore send redirects
  sysctl:
    name: "{{ item.parameter }}"
    state: present
    value: "{{ item.value }}"
  with_items:
    - { parameter: net.ipv4.conf.all.send_redirects, value: 0 }
    - { parameter: net.ipv4.conf.default.send_redirects, value: 0 }
    
- name: Hardening Ubuntu OS Log Martians
  sysctl:
    name: "{{ item.parameter }}"
    state: present
    value: "{{ item.value }}"
  with_items:
    - { parameter: net.ipv4.conf.all.log_martians, value: 1 }
    - { parameter: net.ipv4.icmp_ignore_bogus_error_responses, value: 1 }