aboutsummaryrefslogtreecommitdiff
path: root/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp
blob: c1f66508a92b3faf13656c0601e6738633c4a8b0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
# http://www.isssource.com/fixing-an-internet-security-threat/
# https://access.redhat.com/security/vulnerabilities/challengeack
# http://coolnerd.co/2016/08/researchers-announce-linux-kernel-network-snooping-bug-naked-security/
# https://nakedsecurity.sophos.com/2016/08/12/researchers-announce-linux-kernel-network-snooping-bug/
class nodo::subsystem::sysctl::tcp_challenge_ack_limit(
  $ensure = hiera('nodo::sysctl::tcp_challenge_ack_limit', 'present'),
) {
  file { "/etc/sysctl.d/tcp_challenge_ack_limit.conf":
    owner   => "root",
    group   => "root",
    mode    => '0644',
    ensure  => $ensure,
    content => "net.ipv4.tcp_challenge_ack_limit = 999999999\n",
  }

  exec { "sysctl-tcp_challenge_ack_limit":
    command     => '/sbin/sysctl -p',
    subscribe   => File["/etc/sysctl.d/tcp_challenge_ack_limit.conf"],
    refreshonly => true,
  }
}