hardening.yml 1.96 KB
---
- hosts: new-host
  become: true
  tasks:
        - name: Hardening Ubuntu OS Disable IPv6
          sysctl:
            name: "{{ item.parameter }}"
            state: present
            value: "{{ item.value }}"
          with_items:
            - { parameter: net.ipv6.conf.all.disable_ipv6, value: 1 }
            - { parameter: net.ipv6.conf.default.disable_ipv6, value: 1 }
            - { parameter: net.ipv6.conf.lo.disable_ipv6, value: 1 }
          
        - name: Hardening Ubuntu OS IP Spoofing protection
          sysctl:
            name: "{{ item.parameter }}"
            state: present
            value: "{{ item.value }}"
          with_items:
            - { parameter: net.ipv4.conf.all.rp_filter, value: 1 }
            - { parameter: net.ipv4.conf.default.rp_filter, value: 1 }
        
        - name: Hardening Ubuntu OS Block SYN attacks
          sysctl:
            name: "{{ item.parameter }}"
            state: present
            value: "{{ item.value }}"
          with_items:
            - { parameter: net.ipv4.tcp_syncookies, value: 1 }
            - { parameter: net.ipv4.tcp_max_syn_backlog, value: 2048 }
            - { parameter: net.ipv4.tcp_synack_retries, value: 2 }
            - { parameter: net.ipv4.tcp_syn_retries, value: 5 }
            
        - name: Hardening Ubuntu OS Ignore send redirects
          sysctl:
            name: "{{ item.parameter }}"
            state: present
            value: "{{ item.value }}"
          with_items:
            - { parameter: net.ipv4.conf.all.send_redirects, value: 0 }
            - { parameter: net.ipv4.conf.default.send_redirects, value: 0 }
            
        - name: Hardening Ubuntu OS Log Martians
          sysctl:
            name: "{{ item.parameter }}"
            state: present
            value: "{{ item.value }}"
          with_items:
            - { parameter: net.ipv4.conf.all.log_martians, value: 1 }
            - { parameter: net.ipv4.icmp_ignore_bogus_error_responses, value: 1 }