class nodo::subsystem::sysctl { class { 'nodo::subsystem::sysctl::panic': } class { 'nodo::subsystem::sysctl::disable_ipv6': } class { 'nodo::subsystem::sysctl::tcp_challenge_ack_limit': } class { 'nodo::subsystem::sysctl::unprivileged_bpf_disabled': } # Root exploit fix, see http://wiki.debian.org/mmap_min_addr # Maybe this can be remove in the future or included in a sysctl puppet module file { "/etc/sysctl.d/mmap_min_addr.conf": owner => "root", group => "root", mode => '0644', ensure => present, content => "vm.mmap_min_addr = 4096\n", } # See http://www.linux-vserver.org/Frequently_Asked_Questions file { "/etc/sysctl.d/net.ipv4.conf.all.promote_secondaries.conf": owner => "root", group => "root", mode => '0644', ensure => present, content => "net.ipv4.conf.all.promote_secondaries = 1\n", } exec { "/etc/init.d/procps restart": subscribe => File["/etc/sysctl.d/mmap_min_addr.conf", "/etc/sysctl.d/net.ipv4.conf.all.promote_secondaries.conf"], refreshonly => true, } $printk_levels = '3 4 1 3' file { "/etc/sysctl.d/kernel.printk.conf": owner => "root", group => "root", mode => '0644', ensure => present, content => "kernel.printk = ${printk_levels}\n", } exec { "/bin/echo '${printk_levels}' > /proc/sys/kernel/printk": subscribe => File["/etc/sysctl.d/kernel.printk.conf"], refreshonly => true, } }