]> git.donarmstrong.com Git - dsa-puppet.git/blob - modules/ferm/manifests/per-host.pp
add dns and finger rules for draghi
[dsa-puppet.git] / modules / ferm / manifests / per-host.pp
1 class ferm::per-host {
2
3     case $hostname {
4         ancina,zandonai,zelenka: {
5            include ferm::zivit
6         }
7     }
8     case $hostname {
9         franck,gluck,kaufmann,klecker,lobos,morricone,raff,ries,rietz,saens,schein,senfl,steffani,valente,villa,wieck: {
10            include ferm::rsync
11         }
12     }
13
14     case $hostname {
15         chopin,saens,villa,lobos,raff,gluck,schein,wieck,steffani,ries,rietz,franck,morricone,valente,klecker: {
16            include ferm::ftp
17         }
18     }
19
20     case $hostname {
21         piatti: {
22            @ferm::rule { "dsa-udd-stunnel":
23                description  => "port 8080 for udd stunnel",
24                rule         => "&SERVICE_RANGE(tcp, http-alt, ( 192.25.206.16 70.103.162.29 217.196.43.134 ))"
25            }
26         }
27
28         handel: {
29            @ferm::rule { "dsa-puppet":
30                     description     => "Allow puppet access",
31                     rule            => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V4)"
32            }
33            @ferm::rule { "dsa-puppet-v6":
34                     domain          => 'ip6',
35                     description     => "Allow puppet access",
36                     rule            => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V6)"
37            }
38         }
39         powell: {
40            @ferm::rule { "dsa-powell-v6-tunnel":
41                     description     => "Allow powell to use V6 tunnel broker",
42                     rule            => "proto ipv6 saddr 212.227.117.6 jump ACCEPT"
43            }
44            @ferm::rule { "dsa-powell-btseed":
45                     domain          => "(ip ip6)",
46                     description     => "Allow powell to seed BT",
47                     rule            => "proto tcp dport 8000:8100 jump ACCEPT"
48            }
49            @ferm::rule { "dsa-powell-rsync":
50                     description     => "Hoster wants to sync from here, and why not",
51                     rule            => "&SERVICE_RANGE(tcp, rsync, ( 195.20.242.90 192.25.206.33 82.195.75.106 206.12.19.118 ))"
52            }
53         }
54         beethoven: {
55            @ferm::rule { "dsa-merikanto-beethoven":
56                     description     => "Allow merikanto",  # for nfs, and that uses all kind of ports by default.
57                     rule            => "source 172.22.127.147 interface bond0 jump ACCEPT",
58            }
59         }
60         heininen: {
61            @ferm::rule { "dsa-syslog":
62                     description     => "Allow syslog access",
63                     rule            => "&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V4)"
64            }
65            @ferm::rule { "dsa-syslog-v6":
66                     domain          => 'ip6',
67                     description     => "Allow syslog access",
68                     rule            => "&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V6)"
69            }
70         }
71         kaufmann: {
72            @ferm::rule { "dsa-hkp":
73                     domain          => "(ip ip6)",
74                     description     => "Allow hkp access",
75                     rule            => "&SERVICE(tcp, 11371)"
76            }
77         }
78         liszt: {
79            @ferm::rule { "smtp":
80                     domain          => "(ip ip6)",
81                     description     => "Allow smtp access",
82                     rule            => "&SERVICE(tcp, 25)"
83            }
84         }
85         draghi: {
86             @ferm::rule { "dsa-bind":
87                     domain          => "(ip ip6)",
88                     description     => "Allow nameserver access",
89                     rule            => "&TCP_UDP_SERVICE(53)"
90             }
91             @ferm::rule { "dsa-finger":
92                     domain          => "(ip ip6)",
93                     description     => "Allow finger access",
94                     rule            => "&SERVICE(tcp, 79)"
95             }
96         }
97     }
98 }