ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = [u'/root/.ansible/plugins/modules', u'/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python2.7/site-packages/ansible executable location = /usr/bin/ansible-playbook python version = 2.7.5 (default, Nov 14 2023, 16:14:06) [GCC 4.8.5 20150623 (Red Hat 4.8.5-44)] Using /etc/ansible/ansible.cfg as config file [WARNING]: running playbook inside collection fedora.linux_system_roles Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_firewall_fact.yml ********************************************** 1 plays in /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml PLAY [Test firewall ansible fact] ********************************************** TASK [Gathering Facts] ********************************************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:2 Monday 11 November 2024 20:44:41 -0500 (0:00:00.024) 0:00:00.024 ******* ok: [managed-node1] META: ran handlers TASK [Start with default configuration] **************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:8 Monday 11 November 2024 20:44:42 -0500 (0:00:01.181) 0:00:01.206 ******* TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Monday 11 November 2024 20:44:42 -0500 (0:00:00.109) 0:00:01.315 ******* included: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for managed-node1 TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Monday 11 November 2024 20:44:42 -0500 (0:00:00.034) 0:00:01.350 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Monday 11 November 2024 20:44:42 -0500 (0:00:00.044) 0:00:01.394 ******* ok: [managed-node1] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Monday 11 November 2024 20:44:42 -0500 (0:00:00.480) 0:00:01.874 ******* ok: [managed-node1] => { "ansible_facts": { "__firewall_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Monday 11 November 2024 20:44:43 -0500 (0:00:00.068) 0:00:01.943 ******* ok: [managed-node1] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Monday 11 November 2024 20:44:43 -0500 (0:00:00.364) 0:00:02.308 ******* ok: [managed-node1] => { "ansible_facts": { "__firewall_is_transactional": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Monday 11 November 2024 20:44:43 -0500 (0:00:00.059) 0:00:02.367 ******* ok: [managed-node1] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Monday 11 November 2024 20:44:44 -0500 (0:00:00.739) 0:00:03.107 ******* skipping: [managed-node1] => {} TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Monday 11 November 2024 20:44:44 -0500 (0:00:00.041) 0:00:03.148 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Monday 11 November 2024 20:44:44 -0500 (0:00:00.041) 0:00:03.190 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Monday 11 November 2024 20:44:44 -0500 (0:00:00.042) 0:00:03.232 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Monday 11 November 2024 20:44:44 -0500 (0:00:00.041) 0:00:03.274 ******* skipping: [managed-node1] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Monday 11 November 2024 20:44:44 -0500 (0:00:00.054) 0:00:03.329 ******* ok: [managed-node1] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target system.slice dbus.service polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ipset.service iptables.service ip6tables.service shutdown.target ebtables.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Monday 11 November 2024 20:44:45 -0500 (0:00:00.979) 0:00:04.308 ******* changed: [managed-node1] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target system.slice dbus.service polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ipset.service ip6tables.service ebtables.service iptables.service shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Monday 11 November 2024 20:44:46 -0500 (0:00:00.907) 0:00:05.216 ******* ok: [managed-node1] => { "ansible_facts": { "__firewall_previous_replaced": true, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Monday 11 November 2024 20:44:46 -0500 (0:00:00.079) 0:00:05.296 ******* ok: [managed-node1] => { "changed": false, "rc": 0 } STDOUT: 8697e89439a0fde2df034ef3bfeb3a9558529194c459826162be809a2f08e773 /etc/firewalld/lockdown-whitelist.xml STDERR: Shared connection to 10.31.14.230 closed. TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Monday 11 November 2024 20:44:47 -0500 (0:00:01.044) 0:00:06.340 ******* ok: [managed-node1] => { "ansible_facts": { "__firewall_report_changed": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Monday 11 November 2024 20:44:47 -0500 (0:00:00.142) 0:00:06.483 ******* TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Monday 11 November 2024 20:44:47 -0500 (0:00:00.100) 0:00:06.583 ******* TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Monday 11 November 2024 20:44:47 -0500 (0:00:00.058) 0:00:06.641 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Monday 11 November 2024 20:44:47 -0500 (0:00:00.056) 0:00:06.698 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Monday 11 November 2024 20:44:47 -0500 (0:00:00.052) 0:00:06.750 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Monday 11 November 2024 20:44:47 -0500 (0:00:00.043) 0:00:06.794 ******* ok: [managed-node1] => { "changed": false, "rc": 0 } STDERR: Shared connection to 10.31.14.230 closed. TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Monday 11 November 2024 20:44:48 -0500 (0:00:00.419) 0:00:07.214 ******* changed: [managed-node1] => { "ansible_facts": { "firewall_lib_result": { "changed": true } }, "changed": true } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Monday 11 November 2024 20:44:48 -0500 (0:00:00.058) 0:00:07.273 ******* skipping: [managed-node1] => {} TASK [Get default zone] ******************************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:15 Monday 11 November 2024 20:44:48 -0500 (0:00:00.047) 0:00:07.320 ******* ok: [managed-node1] => { "changed": false, "cmd": [ "firewall-cmd", "--get-default-zone" ], "delta": "0:00:00.262111", "end": "2024-11-11 20:44:49.095356", "rc": 0, "start": "2024-11-11 20:44:48.833245" } STDOUT: public TASK [Get default ansible fact] ************************************************ task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:22 Monday 11 November 2024 20:44:49 -0500 (0:00:00.755) 0:00:08.075 ******* TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Monday 11 November 2024 20:44:49 -0500 (0:00:00.101) 0:00:08.176 ******* included: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for managed-node1 TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Monday 11 November 2024 20:44:49 -0500 (0:00:00.044) 0:00:08.221 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Monday 11 November 2024 20:44:49 -0500 (0:00:00.069) 0:00:08.290 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Monday 11 November 2024 20:44:49 -0500 (0:00:00.076) 0:00:08.367 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Monday 11 November 2024 20:44:49 -0500 (0:00:00.075) 0:00:08.443 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Monday 11 November 2024 20:44:49 -0500 (0:00:00.077) 0:00:08.520 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Monday 11 November 2024 20:44:49 -0500 (0:00:00.087) 0:00:08.608 ******* ok: [managed-node1] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Monday 11 November 2024 20:44:50 -0500 (0:00:00.756) 0:00:09.364 ******* skipping: [managed-node1] => {} TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Monday 11 November 2024 20:44:50 -0500 (0:00:00.069) 0:00:09.434 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Monday 11 November 2024 20:44:50 -0500 (0:00:00.063) 0:00:09.498 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Monday 11 November 2024 20:44:50 -0500 (0:00:00.054) 0:00:09.552 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Monday 11 November 2024 20:44:50 -0500 (0:00:00.054) 0:00:09.607 ******* skipping: [managed-node1] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Monday 11 November 2024 20:44:50 -0500 (0:00:00.092) 0:00:09.700 ******* ok: [managed-node1] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Mon 2024-11-11 20:44:46 EST", "ActiveEnterTimestampMonotonic": "214457365", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service basic.target dbus.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Mon 2024-11-11 20:44:45 EST", "AssertTimestampMonotonic": "214213564", "Before": "multi-user.target network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Mon 2024-11-11 20:44:45 EST", "ConditionTimestampMonotonic": "214213562", "Conflicts": "iptables.service shutdown.target ipset.service ip6tables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "9521", "ExecMainStartTimestamp": "Mon 2024-11-11 20:44:45 EST", "ExecMainStartTimestampMonotonic": "214214751", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Mon 2024-11-11 20:44:45 EST] ; stop_time=[n/a] ; pid=9521 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Mon 2024-11-11 20:44:45 EST", "InactiveExitTimestampMonotonic": "214214780", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "9521", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Mon 2024-11-11 20:44:46 EST", "WatchdogTimestampMonotonic": "214457310", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Monday 11 November 2024 20:44:51 -0500 (0:00:00.428) 0:00:10.128 ******* ok: [managed-node1] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Mon 2024-11-11 20:44:46 EST", "ActiveEnterTimestampMonotonic": "214457365", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service basic.target dbus.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Mon 2024-11-11 20:44:45 EST", "AssertTimestampMonotonic": "214213564", "Before": "multi-user.target network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Mon 2024-11-11 20:44:45 EST", "ConditionTimestampMonotonic": "214213562", "Conflicts": "iptables.service shutdown.target ipset.service ip6tables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "9521", "ExecMainStartTimestamp": "Mon 2024-11-11 20:44:45 EST", "ExecMainStartTimestampMonotonic": "214214751", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Mon 2024-11-11 20:44:45 EST] ; stop_time=[n/a] ; pid=9521 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Mon 2024-11-11 20:44:45 EST", "InactiveExitTimestampMonotonic": "214214780", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "9521", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Mon 2024-11-11 20:44:46 EST", "WatchdogTimestampMonotonic": "214457310", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Monday 11 November 2024 20:44:51 -0500 (0:00:00.417) 0:00:10.546 ******* ok: [managed-node1] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Monday 11 November 2024 20:44:51 -0500 (0:00:00.064) 0:00:10.611 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Monday 11 November 2024 20:44:51 -0500 (0:00:00.062) 0:00:10.673 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Monday 11 November 2024 20:44:51 -0500 (0:00:00.068) 0:00:10.741 ******* TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Monday 11 November 2024 20:44:51 -0500 (0:00:00.055) 0:00:10.796 ******* TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Monday 11 November 2024 20:44:51 -0500 (0:00:00.051) 0:00:10.847 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Monday 11 November 2024 20:44:51 -0500 (0:00:00.053) 0:00:10.901 ******* ok: [managed-node1] => { "changed": false, "firewall_config": { "default": { "helpers": [ "snmp", "amanda", "ftp", "proto-gre", "h323", "irc", "pptp", "sane", "netbios-ns", "RAS", "Q.931", "sip", "tftp" ], "icmptypes": [ "redirect", "failed-policy", "precedence-cutoff", "bad-header", "required-option-missing", "tos-host-unreachable", "host-unknown", "time-exceeded", "port-unreachable", "tos-network-unreachable", "parameter-problem", "tos-host-redirect", "destination-unreachable", "no-route", "fragmentation-needed", "unknown-option", "address-unreachable", "echo-reply", "host-unreachable", "ttl-zero-during-reassembly", "router-advertisement", "network-prohibited", "source-quench", "communication-prohibited", "protocol-unreachable", "router-solicitation", "network-unreachable", "network-unknown", "host-redirect", "timestamp-reply", "packet-too-big", "timestamp-request", "neighbour-solicitation", "tos-network-redirect", "ttl-zero-during-transit", "network-redirect", "host-prohibited", "reject-route", "ip-header-bad", "unknown-header-type", "echo-request", "source-route-failed", "host-precedence-violation", "neighbour-advertisement", "beyond-scope" ], "services": [ "rsh", "kprop", "pmwebapis", "libvirt", "snmp", "kpasswd", "pop3s", "imap", "jenkins", "dropbox-lansync", "docker-registry", "etcd-client", "mongodb", "tor-socks", "samba-dc", "vdsm", "ganglia-master", "iscsi-target", "proxy-dhcp", "high-availability", "RH-Satellite-6-capsule", "condor-collector", "ftp", "kibana", "freeipa-ldaps", "freeipa-ldap", "smtp-submission", "kshell", "amqps", "libvirt-tls", "nfs3", "ptp", "bitcoin-testnet-rpc", "managesieve", "mssql", "xmpp-local", "synergy", "bacula", "mqtt", "amanda-k5-client", "ipp-client", "matrix", "ntp", "amanda-client", "nut", "bitcoin", "privoxy", "RH-Satellite-6", "syncthing", "mountd", "distcc", "postgresql", "nrpe", "svdrp", "wbem-https", "bgp", "pmproxy", "murmur", "etcd-server", "mqtt-tls", "sips", "irc", "bitcoin-testnet", "apcupsd", "tinc", "kerberos", "radius", "transmission-client", "pmwebapi", "ovirt-vmconsole", "steam-streaming", "isns", "dhcpv6", "lightning-network", "git", "rtsp", "squid", "openvpn", "smtps", "cfengine", "zabbix-agent", "samba-client", "rsyncd", "ovirt-storageconsole", "ircs", "llmnr", "gre", "ldaps", "xmpp-client", "dhcp", "xmpp-server", "sane", "vnc-server", "ceph", "freeipa-replication", "dns", "docker-swarm", "mosh", "xmpp-bosh", "klogin", "slp", "snmptrap", "upnp-client", "ceph-mon", "samba", "rpc-bind", "salt-master", "wsmans", "bitcoin-rpc", "minidlna", "tftp-client", "freeipa-trust", "syslog-tls", "ipsec", "dhcpv6-client", "telnet", "https", "audit", "ssh", "pop3", "nmea-0183", "zabbix-server", "wsman", "xdmcp", "puppetmaster", "finger", "ipp", "ms-wbt", "syncthing-gui", "redis", "syslog", "ganglia-client", "ovirt-imageio", "pmcd", "ldap", "nfs", "kadmin", "sip", "ctdb", "spideroak-lansync", "amqp", "mdns", "http", "quassel", "imaps", "mysql", "elasticsearch", "bacula-client", "smtp", "tftp", "svn", "plex", "wbem-http", "pulseaudio" ], "zones": [ "block", "internal", "drop", "public", "work", "trusted", "external", "home", "dmz" ] }, "default_zone": "public" } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Monday 11 November 2024 20:44:52 -0500 (0:00:00.619) 0:00:11.521 ******* ok: [managed-node1] => { "ansible_facts": { "firewall_config": { "default": { "helpers": [ "snmp", "amanda", "ftp", "proto-gre", "h323", "irc", "pptp", "sane", "netbios-ns", "RAS", "Q.931", "sip", "tftp" ], "icmptypes": [ "redirect", "failed-policy", "precedence-cutoff", "bad-header", "required-option-missing", "tos-host-unreachable", "host-unknown", "time-exceeded", "port-unreachable", "tos-network-unreachable", "parameter-problem", "tos-host-redirect", "destination-unreachable", "no-route", "fragmentation-needed", "unknown-option", "address-unreachable", "echo-reply", "host-unreachable", "ttl-zero-during-reassembly", "router-advertisement", "network-prohibited", "source-quench", "communication-prohibited", "protocol-unreachable", "router-solicitation", "network-unreachable", "network-unknown", "host-redirect", "timestamp-reply", "packet-too-big", "timestamp-request", "neighbour-solicitation", "tos-network-redirect", "ttl-zero-during-transit", "network-redirect", "host-prohibited", "reject-route", "ip-header-bad", "unknown-header-type", "echo-request", "source-route-failed", "host-precedence-violation", "neighbour-advertisement", "beyond-scope" ], "services": [ "rsh", "kprop", "pmwebapis", "libvirt", "snmp", "kpasswd", "pop3s", "imap", "jenkins", "dropbox-lansync", "docker-registry", "etcd-client", "mongodb", "tor-socks", "samba-dc", "vdsm", "ganglia-master", "iscsi-target", "proxy-dhcp", "high-availability", "RH-Satellite-6-capsule", "condor-collector", "ftp", "kibana", "freeipa-ldaps", "freeipa-ldap", "smtp-submission", "kshell", "amqps", "libvirt-tls", "nfs3", "ptp", "bitcoin-testnet-rpc", "managesieve", "mssql", "xmpp-local", "synergy", "bacula", "mqtt", "amanda-k5-client", "ipp-client", "matrix", "ntp", "amanda-client", "nut", "bitcoin", "privoxy", "RH-Satellite-6", "syncthing", "mountd", "distcc", "postgresql", "nrpe", "svdrp", "wbem-https", "bgp", "pmproxy", "murmur", "etcd-server", "mqtt-tls", "sips", "irc", "bitcoin-testnet", "apcupsd", "tinc", "kerberos", "radius", "transmission-client", "pmwebapi", "ovirt-vmconsole", "steam-streaming", "isns", "dhcpv6", "lightning-network", "git", "rtsp", "squid", "openvpn", "smtps", "cfengine", "zabbix-agent", "samba-client", "rsyncd", "ovirt-storageconsole", "ircs", "llmnr", "gre", "ldaps", "xmpp-client", "dhcp", "xmpp-server", "sane", "vnc-server", "ceph", "freeipa-replication", "dns", "docker-swarm", "mosh", "xmpp-bosh", "klogin", "slp", "snmptrap", "upnp-client", "ceph-mon", "samba", "rpc-bind", "salt-master", "wsmans", "bitcoin-rpc", "minidlna", "tftp-client", "freeipa-trust", "syslog-tls", "ipsec", "dhcpv6-client", "telnet", "https", "audit", "ssh", "pop3", "nmea-0183", "zabbix-server", "wsman", "xdmcp", "puppetmaster", "finger", "ipp", "ms-wbt", "syncthing-gui", "redis", "syslog", "ganglia-client", "ovirt-imageio", "pmcd", "ldap", "nfs", "kadmin", "sip", "ctdb", "spideroak-lansync", "amqp", "mdns", "http", "quassel", "imaps", "mysql", "elasticsearch", "bacula-client", "smtp", "tftp", "svn", "plex", "wbem-http", "pulseaudio" ], "zones": [ "block", "internal", "drop", "public", "work", "trusted", "external", "home", "dmz" ] }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Monday 11 November 2024 20:44:52 -0500 (0:00:00.075) 0:00:11.596 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Monday 11 November 2024 20:44:52 -0500 (0:00:00.060) 0:00:11.657 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Monday 11 November 2024 20:44:52 -0500 (0:00:00.059) 0:00:11.716 ******* skipping: [managed-node1] => {} TASK [Fail if firewall_config is undefined] ************************************ task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:28 Monday 11 November 2024 20:44:52 -0500 (0:00:00.060) 0:00:11.776 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Fail if firewall_config custom exists] *********************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:33 Monday 11 November 2024 20:44:52 -0500 (0:00:00.060) 0:00:11.837 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Fail if firewall_config defaults do not have attributes] ***************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:38 Monday 11 November 2024 20:44:52 -0500 (0:00:00.061) 0:00:11.899 ******* skipping: [managed-node1] => (item={u'key': u'zones', u'value': [u'block', u'internal', u'drop', u'public', u'work', u'trusted', u'external', u'home', u'dmz']}) => { "ansible_loop_var": "item", "changed": false, "item": { "key": "zones", "value": [ "block", "internal", "drop", "public", "work", "trusted", "external", "home", "dmz" ] }, "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item={u'key': u'services', u'value': [u'rsh', u'kprop', u'pmwebapis', u'libvirt', u'snmp', u'kpasswd', u'pop3s', u'imap', u'jenkins', u'dropbox-lansync', u'docker-registry', u'etcd-client', u'mongodb', u'tor-socks', u'samba-dc', u'vdsm', u'ganglia-master', u'iscsi-target', u'proxy-dhcp', u'high-availability', u'RH-Satellite-6-capsule', u'condor-collector', u'ftp', u'kibana', u'freeipa-ldaps', u'freeipa-ldap', u'smtp-submission', u'kshell', u'amqps', u'libvirt-tls', u'nfs3', u'ptp', u'bitcoin-testnet-rpc', u'managesieve', u'mssql', u'xmpp-local', u'synergy', u'bacula', u'mqtt', u'amanda-k5-client', u'ipp-client', u'matrix', u'ntp', u'amanda-client', u'nut', u'bitcoin', u'privoxy', u'RH-Satellite-6', u'syncthing', u'mountd', u'distcc', u'postgresql', u'nrpe', u'svdrp', u'wbem-https', u'bgp', u'pmproxy', u'murmur', u'etcd-server', u'mqtt-tls', u'sips', u'irc', u'bitcoin-testnet', u'apcupsd', u'tinc', u'kerberos', u'radius', u'transmission-client', u'pmwebapi', u'ovirt-vmconsole', u'steam-streaming', u'isns', u'dhcpv6', u'lightning-network', u'git', u'rtsp', u'squid', u'openvpn', u'smtps', u'cfengine', u'zabbix-agent', u'samba-client', u'rsyncd', u'ovirt-storageconsole', u'ircs', u'llmnr', u'gre', u'ldaps', u'xmpp-client', u'dhcp', u'xmpp-server', u'sane', u'vnc-server', u'ceph', u'freeipa-replication', u'dns', u'docker-swarm', u'mosh', u'xmpp-bosh', u'klogin', u'slp', u'snmptrap', u'upnp-client', u'ceph-mon', u'samba', u'rpc-bind', u'salt-master', u'wsmans', u'bitcoin-rpc', u'minidlna', u'tftp-client', u'freeipa-trust', u'syslog-tls', u'ipsec', u'dhcpv6-client', u'telnet', u'https', u'audit', u'ssh', u'pop3', u'nmea-0183', u'zabbix-server', u'wsman', u'xdmcp', u'puppetmaster', u'finger', u'ipp', u'ms-wbt', u'syncthing-gui', u'redis', u'syslog', u'ganglia-client', u'ovirt-imageio', u'pmcd', u'ldap', u'nfs', u'kadmin', u'sip', u'ctdb', u'spideroak-lansync', u'amqp', u'mdns', u'http', u'quassel', u'imaps', u'mysql', u'elasticsearch', u'bacula-client', u'smtp', u'tftp', u'svn', u'plex', u'wbem-http', u'pulseaudio']}) => { "ansible_loop_var": "item", "changed": false, "item": { "key": "services", "value": [ "rsh", "kprop", "pmwebapis", "libvirt", "snmp", "kpasswd", "pop3s", "imap", "jenkins", "dropbox-lansync", "docker-registry", "etcd-client", "mongodb", "tor-socks", "samba-dc", "vdsm", "ganglia-master", "iscsi-target", "proxy-dhcp", "high-availability", "RH-Satellite-6-capsule", "condor-collector", "ftp", "kibana", "freeipa-ldaps", "freeipa-ldap", "smtp-submission", "kshell", "amqps", "libvirt-tls", "nfs3", "ptp", "bitcoin-testnet-rpc", "managesieve", "mssql", "xmpp-local", "synergy", "bacula", "mqtt", "amanda-k5-client", "ipp-client", "matrix", "ntp", "amanda-client", "nut", "bitcoin", "privoxy", "RH-Satellite-6", "syncthing", "mountd", "distcc", "postgresql", "nrpe", "svdrp", "wbem-https", "bgp", "pmproxy", "murmur", "etcd-server", "mqtt-tls", "sips", "irc", "bitcoin-testnet", "apcupsd", "tinc", "kerberos", "radius", "transmission-client", "pmwebapi", "ovirt-vmconsole", "steam-streaming", "isns", "dhcpv6", "lightning-network", "git", "rtsp", "squid", "openvpn", "smtps", "cfengine", "zabbix-agent", "samba-client", "rsyncd", "ovirt-storageconsole", "ircs", "llmnr", "gre", "ldaps", "xmpp-client", "dhcp", "xmpp-server", "sane", "vnc-server", "ceph", "freeipa-replication", "dns", "docker-swarm", "mosh", "xmpp-bosh", "klogin", "slp", "snmptrap", "upnp-client", "ceph-mon", "samba", "rpc-bind", "salt-master", "wsmans", "bitcoin-rpc", "minidlna", "tftp-client", "freeipa-trust", "syslog-tls", "ipsec", "dhcpv6-client", "telnet", "https", "audit", "ssh", "pop3", "nmea-0183", "zabbix-server", "wsman", "xdmcp", "puppetmaster", "finger", "ipp", "ms-wbt", "syncthing-gui", "redis", "syslog", "ganglia-client", "ovirt-imageio", "pmcd", "ldap", "nfs", "kadmin", "sip", "ctdb", "spideroak-lansync", "amqp", "mdns", "http", "quassel", "imaps", "mysql", "elasticsearch", "bacula-client", "smtp", "tftp", "svn", "plex", "wbem-http", "pulseaudio" ] }, "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item={u'key': u'helpers', u'value': [u'snmp', u'amanda', u'ftp', u'proto-gre', u'h323', u'irc', u'pptp', u'sane', u'netbios-ns', u'RAS', u'Q.931', u'sip', u'tftp']}) => { "ansible_loop_var": "item", "changed": false, "item": { "key": "helpers", "value": [ "snmp", "amanda", "ftp", "proto-gre", "h323", "irc", "pptp", "sane", "netbios-ns", "RAS", "Q.931", "sip", "tftp" ] }, "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item={u'key': u'icmptypes', u'value': [u'redirect', u'failed-policy', u'precedence-cutoff', u'bad-header', u'required-option-missing', u'tos-host-unreachable', u'host-unknown', u'time-exceeded', u'port-unreachable', u'tos-network-unreachable', u'parameter-problem', u'tos-host-redirect', u'destination-unreachable', u'no-route', u'fragmentation-needed', u'unknown-option', u'address-unreachable', u'echo-reply', u'host-unreachable', u'ttl-zero-during-reassembly', u'router-advertisement', u'network-prohibited', u'source-quench', u'communication-prohibited', u'protocol-unreachable', u'router-solicitation', u'network-unreachable', u'network-unknown', u'host-redirect', u'timestamp-reply', u'packet-too-big', u'timestamp-request', u'neighbour-solicitation', u'tos-network-redirect', u'ttl-zero-during-transit', u'network-redirect', u'host-prohibited', u'reject-route', u'ip-header-bad', u'unknown-header-type', u'echo-request', u'source-route-failed', u'host-precedence-violation', u'neighbour-advertisement', u'beyond-scope']}) => { "ansible_loop_var": "item", "changed": false, "item": { "key": "icmptypes", "value": [ "redirect", "failed-policy", "precedence-cutoff", "bad-header", "required-option-missing", "tos-host-unreachable", "host-unknown", "time-exceeded", "port-unreachable", "tos-network-unreachable", "parameter-problem", "tos-host-redirect", "destination-unreachable", "no-route", "fragmentation-needed", "unknown-option", "address-unreachable", "echo-reply", "host-unreachable", "ttl-zero-during-reassembly", "router-advertisement", "network-prohibited", "source-quench", "communication-prohibited", "protocol-unreachable", "router-solicitation", "network-unreachable", "network-unknown", "host-redirect", "timestamp-reply", "packet-too-big", "timestamp-request", "neighbour-solicitation", "tos-network-redirect", "ttl-zero-during-transit", "network-redirect", "host-prohibited", "reject-route", "ip-header-bad", "unknown-header-type", "echo-request", "source-route-failed", "host-precedence-violation", "neighbour-advertisement", "beyond-scope" ] }, "skip_reason": "Conditional result was False" } TASK [Fail if default zone is not correct] ************************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:44 Monday 11 November 2024 20:44:53 -0500 (0:00:00.172) 0:00:12.071 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Save default ansible fact value] ***************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:49 Monday 11 November 2024 20:44:53 -0500 (0:00:00.060) 0:00:12.132 ******* ok: [managed-node1] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Modify firewalld configuration] ****************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:56 Monday 11 November 2024 20:44:53 -0500 (0:00:00.069) 0:00:12.202 ******* ok: [managed-node1] => { "changed": false, "cmd": "firewall-cmd --permanent --add-service https\nfirewall-cmd --permanent --new-service custom\n", "delta": "0:00:00.517684", "end": "2024-11-11 20:44:54.051766", "rc": 0, "start": "2024-11-11 20:44:53.534082" } STDOUT: success success TASK [Refetch firewall_config] ************************************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:63 Monday 11 November 2024 20:44:54 -0500 (0:00:00.815) 0:00:13.017 ******* TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Monday 11 November 2024 20:44:54 -0500 (0:00:00.079) 0:00:13.097 ******* included: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for managed-node1 TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Monday 11 November 2024 20:44:54 -0500 (0:00:00.040) 0:00:13.138 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Monday 11 November 2024 20:44:54 -0500 (0:00:00.105) 0:00:13.244 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Monday 11 November 2024 20:44:54 -0500 (0:00:00.064) 0:00:13.308 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Monday 11 November 2024 20:44:54 -0500 (0:00:00.096) 0:00:13.405 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Monday 11 November 2024 20:44:54 -0500 (0:00:00.066) 0:00:13.471 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Monday 11 November 2024 20:44:54 -0500 (0:00:00.064) 0:00:13.536 ******* ok: [managed-node1] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Monday 11 November 2024 20:44:55 -0500 (0:00:00.741) 0:00:14.278 ******* skipping: [managed-node1] => {} TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Monday 11 November 2024 20:44:55 -0500 (0:00:00.051) 0:00:14.329 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Monday 11 November 2024 20:44:55 -0500 (0:00:00.046) 0:00:14.376 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Monday 11 November 2024 20:44:55 -0500 (0:00:00.043) 0:00:14.419 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Monday 11 November 2024 20:44:55 -0500 (0:00:00.042) 0:00:14.461 ******* skipping: [managed-node1] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Monday 11 November 2024 20:44:55 -0500 (0:00:00.055) 0:00:14.517 ******* ok: [managed-node1] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Mon 2024-11-11 20:44:46 EST", "ActiveEnterTimestampMonotonic": "214457365", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service basic.target dbus.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Mon 2024-11-11 20:44:45 EST", "AssertTimestampMonotonic": "214213564", "Before": "multi-user.target network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Mon 2024-11-11 20:44:45 EST", "ConditionTimestampMonotonic": "214213562", "Conflicts": "iptables.service shutdown.target ipset.service ip6tables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "9521", "ExecMainStartTimestamp": "Mon 2024-11-11 20:44:45 EST", "ExecMainStartTimestampMonotonic": "214214751", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Mon 2024-11-11 20:44:45 EST] ; stop_time=[n/a] ; pid=9521 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Mon 2024-11-11 20:44:45 EST", "InactiveExitTimestampMonotonic": "214214780", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "9521", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Mon 2024-11-11 20:44:46 EST", "WatchdogTimestampMonotonic": "214457310", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Monday 11 November 2024 20:44:56 -0500 (0:00:00.429) 0:00:14.946 ******* ok: [managed-node1] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Mon 2024-11-11 20:44:46 EST", "ActiveEnterTimestampMonotonic": "214457365", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service basic.target dbus.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Mon 2024-11-11 20:44:45 EST", "AssertTimestampMonotonic": "214213564", "Before": "multi-user.target network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Mon 2024-11-11 20:44:45 EST", "ConditionTimestampMonotonic": "214213562", "Conflicts": "iptables.service shutdown.target ipset.service ip6tables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "9521", "ExecMainStartTimestamp": "Mon 2024-11-11 20:44:45 EST", "ExecMainStartTimestampMonotonic": "214214751", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Mon 2024-11-11 20:44:45 EST] ; stop_time=[n/a] ; pid=9521 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Mon 2024-11-11 20:44:45 EST", "InactiveExitTimestampMonotonic": "214214780", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "9521", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Mon 2024-11-11 20:44:46 EST", "WatchdogTimestampMonotonic": "214457310", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Monday 11 November 2024 20:44:56 -0500 (0:00:00.493) 0:00:15.440 ******* ok: [managed-node1] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Monday 11 November 2024 20:44:56 -0500 (0:00:00.065) 0:00:15.506 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Monday 11 November 2024 20:44:56 -0500 (0:00:00.056) 0:00:15.562 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Monday 11 November 2024 20:44:56 -0500 (0:00:00.044) 0:00:15.606 ******* TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Monday 11 November 2024 20:44:56 -0500 (0:00:00.042) 0:00:15.649 ******* TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Monday 11 November 2024 20:44:56 -0500 (0:00:00.055) 0:00:15.704 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Monday 11 November 2024 20:44:56 -0500 (0:00:00.071) 0:00:15.775 ******* ok: [managed-node1] => { "changed": false, "firewall_config": { "custom": { "services": { "custom": { "description": "", "modules": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": [ "snmp", "amanda", "ftp", "proto-gre", "h323", "irc", "pptp", "sane", "netbios-ns", "RAS", "Q.931", "sip", "tftp" ], "icmptypes": [ "redirect", "failed-policy", "precedence-cutoff", "bad-header", "required-option-missing", "tos-host-unreachable", "host-unknown", "time-exceeded", "port-unreachable", "tos-network-unreachable", "parameter-problem", "tos-host-redirect", "destination-unreachable", "no-route", "fragmentation-needed", "unknown-option", "address-unreachable", "echo-reply", "host-unreachable", "ttl-zero-during-reassembly", "router-advertisement", "network-prohibited", "source-quench", "communication-prohibited", "protocol-unreachable", "router-solicitation", "network-unreachable", "network-unknown", "host-redirect", "timestamp-reply", "packet-too-big", "timestamp-request", "neighbour-solicitation", "tos-network-redirect", "ttl-zero-during-transit", "network-redirect", "host-prohibited", "reject-route", "ip-header-bad", "unknown-header-type", "echo-request", "source-route-failed", "host-precedence-violation", "neighbour-advertisement", "beyond-scope" ], "services": [ "rsh", "kprop", "pmwebapis", "libvirt", "snmp", "kpasswd", "pop3s", "imap", "jenkins", "dropbox-lansync", "docker-registry", "etcd-client", "mongodb", "tor-socks", "samba-dc", "vdsm", "ganglia-master", "iscsi-target", "proxy-dhcp", "high-availability", "RH-Satellite-6-capsule", "condor-collector", "ftp", "kibana", "freeipa-ldaps", "freeipa-ldap", "smtp-submission", "kshell", "amqps", "libvirt-tls", "nfs3", "ptp", "bitcoin-testnet-rpc", "managesieve", "mssql", "xmpp-local", "synergy", "bacula", "mqtt", "amanda-k5-client", "ipp-client", "matrix", "ntp", "amanda-client", "nut", "bitcoin", "privoxy", "RH-Satellite-6", "syncthing", "mountd", "distcc", "postgresql", "nrpe", "svdrp", "wbem-https", "bgp", "pmproxy", "murmur", "etcd-server", "mqtt-tls", "sips", "irc", "bitcoin-testnet", "apcupsd", "tinc", "kerberos", "radius", "transmission-client", "pmwebapi", "ovirt-vmconsole", "steam-streaming", "isns", "dhcpv6", "lightning-network", "git", "rtsp", "squid", "openvpn", "smtps", "cfengine", "zabbix-agent", "samba-client", "rsyncd", "ovirt-storageconsole", "ircs", "llmnr", "gre", "ldaps", "xmpp-client", "dhcp", "xmpp-server", "sane", "vnc-server", "ceph", "freeipa-replication", "dns", "docker-swarm", "mosh", "xmpp-bosh", "klogin", "slp", "snmptrap", "upnp-client", "ceph-mon", "samba", "rpc-bind", "salt-master", "wsmans", "bitcoin-rpc", "minidlna", "tftp-client", "freeipa-trust", "syslog-tls", "ipsec", "dhcpv6-client", "telnet", "https", "audit", "ssh", "pop3", "nmea-0183", "zabbix-server", "wsman", "xdmcp", "puppetmaster", "finger", "ipp", "ms-wbt", "syncthing-gui", "redis", "syslog", "ganglia-client", "ovirt-imageio", "pmcd", "ldap", "nfs", "kadmin", "sip", "ctdb", "spideroak-lansync", "amqp", "mdns", "http", "quassel", "imaps", "mysql", "elasticsearch", "bacula-client", "smtp", "tftp", "svn", "plex", "wbem-http", "pulseaudio" ], "zones": [ "block", "internal", "drop", "public", "work", "trusted", "external", "home", "dmz" ] }, "default_zone": "public" } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Monday 11 November 2024 20:44:57 -0500 (0:00:00.634) 0:00:16.410 ******* ok: [managed-node1] => { "ansible_facts": { "firewall_config": { "custom": { "services": { "custom": { "description": "", "modules": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": [ "snmp", "amanda", "ftp", "proto-gre", "h323", "irc", "pptp", "sane", "netbios-ns", "RAS", "Q.931", "sip", "tftp" ], "icmptypes": [ "redirect", "failed-policy", "precedence-cutoff", "bad-header", "required-option-missing", "tos-host-unreachable", "host-unknown", "time-exceeded", "port-unreachable", "tos-network-unreachable", "parameter-problem", "tos-host-redirect", "destination-unreachable", "no-route", "fragmentation-needed", "unknown-option", "address-unreachable", "echo-reply", "host-unreachable", "ttl-zero-during-reassembly", "router-advertisement", "network-prohibited", "source-quench", "communication-prohibited", "protocol-unreachable", "router-solicitation", "network-unreachable", "network-unknown", "host-redirect", "timestamp-reply", "packet-too-big", "timestamp-request", "neighbour-solicitation", "tos-network-redirect", "ttl-zero-during-transit", "network-redirect", "host-prohibited", "reject-route", "ip-header-bad", "unknown-header-type", "echo-request", "source-route-failed", "host-precedence-violation", "neighbour-advertisement", "beyond-scope" ], "services": [ "rsh", "kprop", "pmwebapis", "libvirt", "snmp", "kpasswd", "pop3s", "imap", "jenkins", "dropbox-lansync", "docker-registry", "etcd-client", "mongodb", "tor-socks", "samba-dc", "vdsm", "ganglia-master", "iscsi-target", "proxy-dhcp", "high-availability", "RH-Satellite-6-capsule", "condor-collector", "ftp", "kibana", "freeipa-ldaps", "freeipa-ldap", "smtp-submission", "kshell", "amqps", "libvirt-tls", "nfs3", "ptp", "bitcoin-testnet-rpc", "managesieve", "mssql", "xmpp-local", "synergy", "bacula", "mqtt", "amanda-k5-client", "ipp-client", "matrix", "ntp", "amanda-client", "nut", "bitcoin", "privoxy", "RH-Satellite-6", "syncthing", "mountd", "distcc", "postgresql", "nrpe", "svdrp", "wbem-https", "bgp", "pmproxy", "murmur", "etcd-server", "mqtt-tls", "sips", "irc", "bitcoin-testnet", "apcupsd", "tinc", "kerberos", "radius", "transmission-client", "pmwebapi", "ovirt-vmconsole", "steam-streaming", "isns", "dhcpv6", "lightning-network", "git", "rtsp", "squid", "openvpn", "smtps", "cfengine", "zabbix-agent", "samba-client", "rsyncd", "ovirt-storageconsole", "ircs", "llmnr", "gre", "ldaps", "xmpp-client", "dhcp", "xmpp-server", "sane", "vnc-server", "ceph", "freeipa-replication", "dns", "docker-swarm", "mosh", "xmpp-bosh", "klogin", "slp", "snmptrap", "upnp-client", "ceph-mon", "samba", "rpc-bind", "salt-master", "wsmans", "bitcoin-rpc", "minidlna", "tftp-client", "freeipa-trust", "syslog-tls", "ipsec", "dhcpv6-client", "telnet", "https", "audit", "ssh", "pop3", "nmea-0183", "zabbix-server", "wsman", "xdmcp", "puppetmaster", "finger", "ipp", "ms-wbt", "syncthing-gui", "redis", "syslog", "ganglia-client", "ovirt-imageio", "pmcd", "ldap", "nfs", "kadmin", "sip", "ctdb", "spideroak-lansync", "amqp", "mdns", "http", "quassel", "imaps", "mysql", "elasticsearch", "bacula-client", "smtp", "tftp", "svn", "plex", "wbem-http", "pulseaudio" ], "zones": [ "block", "internal", "drop", "public", "work", "trusted", "external", "home", "dmz" ] }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Monday 11 November 2024 20:44:57 -0500 (0:00:00.062) 0:00:16.472 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Monday 11 November 2024 20:44:57 -0500 (0:00:00.049) 0:00:16.522 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Monday 11 November 2024 20:44:57 -0500 (0:00:00.064) 0:00:16.586 ******* skipping: [managed-node1] => {} TASK [Fail if firewall_config not changed] ************************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:69 Monday 11 November 2024 20:44:57 -0500 (0:00:00.056) 0:00:16.643 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Fail if config defaults changed] ***************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:76 Monday 11 November 2024 20:44:57 -0500 (0:00:00.062) 0:00:16.706 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Fail if custom config unchanged] ***************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:81 Monday 11 November 2024 20:44:57 -0500 (0:00:00.077) 0:00:16.784 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Store previous firewall_config] ****************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:89 Monday 11 November 2024 20:44:58 -0500 (0:00:00.143) 0:00:16.927 ******* ok: [managed-node1] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Get firewall_config with detailed on] ************************************ task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:96 Monday 11 November 2024 20:44:58 -0500 (0:00:00.083) 0:00:17.011 ******* TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Monday 11 November 2024 20:44:58 -0500 (0:00:00.166) 0:00:17.177 ******* included: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for managed-node1 TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Monday 11 November 2024 20:44:58 -0500 (0:00:00.082) 0:00:17.260 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Monday 11 November 2024 20:44:58 -0500 (0:00:00.076) 0:00:17.337 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Monday 11 November 2024 20:44:58 -0500 (0:00:00.063) 0:00:17.400 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Monday 11 November 2024 20:44:58 -0500 (0:00:00.059) 0:00:17.460 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Monday 11 November 2024 20:44:58 -0500 (0:00:00.061) 0:00:17.522 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Monday 11 November 2024 20:44:58 -0500 (0:00:00.062) 0:00:17.584 ******* ok: [managed-node1] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Monday 11 November 2024 20:44:59 -0500 (0:00:00.766) 0:00:18.350 ******* skipping: [managed-node1] => {} TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Monday 11 November 2024 20:44:59 -0500 (0:00:00.063) 0:00:18.413 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Monday 11 November 2024 20:44:59 -0500 (0:00:00.068) 0:00:18.482 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Monday 11 November 2024 20:44:59 -0500 (0:00:00.047) 0:00:18.529 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Monday 11 November 2024 20:44:59 -0500 (0:00:00.056) 0:00:18.585 ******* skipping: [managed-node1] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Monday 11 November 2024 20:44:59 -0500 (0:00:00.094) 0:00:18.680 ******* ok: [managed-node1] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Mon 2024-11-11 20:44:46 EST", "ActiveEnterTimestampMonotonic": "214457365", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service basic.target dbus.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Mon 2024-11-11 20:44:45 EST", "AssertTimestampMonotonic": "214213564", "Before": "multi-user.target network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Mon 2024-11-11 20:44:45 EST", "ConditionTimestampMonotonic": "214213562", "Conflicts": "iptables.service shutdown.target ipset.service ip6tables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "9521", "ExecMainStartTimestamp": "Mon 2024-11-11 20:44:45 EST", "ExecMainStartTimestampMonotonic": "214214751", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Mon 2024-11-11 20:44:45 EST] ; stop_time=[n/a] ; pid=9521 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Mon 2024-11-11 20:44:45 EST", "InactiveExitTimestampMonotonic": "214214780", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "9521", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Mon 2024-11-11 20:44:46 EST", "WatchdogTimestampMonotonic": "214457310", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Monday 11 November 2024 20:45:00 -0500 (0:00:00.445) 0:00:19.126 ******* ok: [managed-node1] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Mon 2024-11-11 20:44:46 EST", "ActiveEnterTimestampMonotonic": "214457365", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service basic.target dbus.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Mon 2024-11-11 20:44:45 EST", "AssertTimestampMonotonic": "214213564", "Before": "multi-user.target network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Mon 2024-11-11 20:44:45 EST", "ConditionTimestampMonotonic": "214213562", "Conflicts": "iptables.service shutdown.target ipset.service ip6tables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "9521", "ExecMainStartTimestamp": "Mon 2024-11-11 20:44:45 EST", "ExecMainStartTimestampMonotonic": "214214751", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Mon 2024-11-11 20:44:45 EST] ; stop_time=[n/a] ; pid=9521 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Mon 2024-11-11 20:44:45 EST", "InactiveExitTimestampMonotonic": "214214780", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "9521", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Mon 2024-11-11 20:44:46 EST", "WatchdogTimestampMonotonic": "214457310", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Monday 11 November 2024 20:45:00 -0500 (0:00:00.418) 0:00:19.544 ******* ok: [managed-node1] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Monday 11 November 2024 20:45:00 -0500 (0:00:00.066) 0:00:19.611 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Monday 11 November 2024 20:45:00 -0500 (0:00:00.057) 0:00:19.668 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Monday 11 November 2024 20:45:00 -0500 (0:00:00.056) 0:00:19.724 ******* TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Monday 11 November 2024 20:45:00 -0500 (0:00:00.073) 0:00:19.797 ******* ok: [managed-node1] => (item={u'detailed': True}) => { "ansible_loop_var": "item", "changed": false, "firewall_config": { "custom": { "services": { "custom": { "description": "", "modules": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "icmptypes": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package whould cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "services": { "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "modules": [], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "modules": [], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "modules": [], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "modules": [], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "modules": [], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "modules": [], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "modules": [], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "modules": [], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "modules": [], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "modules": [], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "modules": [], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "modules": [], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "modules": [], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "modules": [], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "modules": [], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "modules": [], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "modules": [], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "modules": [], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "modules": [], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "modules": [], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "modules": [], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "modules": [], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "modules": [], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAP protocol. You can also enable the 'freeipa-ldaps' service if you want to provide the LDAPS protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAP", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAPS protocol. You can also enable the 'freeipa-ldap' service if you want to provide the LDAP protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAPS", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you want to enable LDAP replication between FreeIPA servers.", "modules": [], "protocols": [], "short": "FreeIPA replication", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "modules": [], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "modules": [ "ftp" ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "modules": [], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "modules": [], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "modules": [], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gre": { "description": "", "modules": [ "proto-gre" ], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "modules": [], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "modules": [], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "modules": [], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "modules": [], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.", "modules": [], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "modules": [], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "modules": [], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "modules": [], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "modules": [], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "modules": [], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "modules": [], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "modules": [], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "modules": [], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "modules": [], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "modules": [], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "modules": [], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "modules": [], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "modules": [], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": "LLMNR allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link.", "modules": [], "protocols": [], "short": "Link-Local Multicast Name Resolution (LLMNR)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "modules": [], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "modules": [], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "modules": [], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "modules": [], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "modules": [], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "modules": [], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "modules": [], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "modules": [], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "modules": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "modules": [], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "modules": [], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "modules": [], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "modules": [], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "modules": [], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "modules": [], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "modules": [], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "modules": [], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "modules": [], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "modules": [], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": " Plex Media Server (PMS) is the back-end media server component of Plex. It organizes audio (music) and visual (photos and videos) content from personal media libraries and streams it to their player counterparts, either on the same machine, the same local area network, or over the Internet. ", "modules": [], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "modules": [], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "modules": [], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "modules": [], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "modules": [], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "modules": [], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "modules": [], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "modules": [], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "modules": [], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "modules": [], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "modules": [], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "modules": [], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "modules": [], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "modules": [], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "modules": [ "sane" ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "modules": [ "sip" ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "modules": [], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "modules": [], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "modules": [], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "modules": [], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "modules": [], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "modules": [], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "modules": [], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "modules": [], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "modules": [], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "modules": [], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a Peer-to-Peer file synchronization service. Enable this option, if you plan to run the Synthing service.", "modules": [], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "modules": [], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "modules": [], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "modules": [], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "modules": [], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "modules": [ "tftp" ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tftp-client": { "description": "This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.", "modules": [ "tftp" ], "protocols": [], "short": "TFTP Client", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "modules": [], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "modules": [], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "modules": [], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "modules": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "modules": [], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "modules": [], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "modules": [], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "modules": [], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "modules": [], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "modules": [], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "modules": [], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "modules": [], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "modules": [], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "modules": [], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-server": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" } }, "zones": { "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default_zone": "public" }, "item": { "detailed": true } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Monday 11 November 2024 20:45:04 -0500 (0:00:03.461) 0:00:23.259 ******* ok: [managed-node1] => { "ansible_facts": { "firewall_config": { "custom": { "services": { "custom": { "description": "", "modules": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "icmptypes": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package whould cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "services": { "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "modules": [], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "modules": [], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "modules": [], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "modules": [], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "modules": [], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "modules": [], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "modules": [], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "modules": [], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "modules": [], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "modules": [], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "modules": [], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "modules": [], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "modules": [], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "modules": [], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "modules": [], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "modules": [], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "modules": [], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "modules": [], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "modules": [], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "modules": [], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "modules": [], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "modules": [], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "modules": [], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAP protocol. You can also enable the 'freeipa-ldaps' service if you want to provide the LDAPS protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAP", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAPS protocol. You can also enable the 'freeipa-ldap' service if you want to provide the LDAP protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAPS", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you want to enable LDAP replication between FreeIPA servers.", "modules": [], "protocols": [], "short": "FreeIPA replication", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "modules": [], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "modules": [ "ftp" ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "modules": [], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "modules": [], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "modules": [], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gre": { "description": "", "modules": [ "proto-gre" ], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "modules": [], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "modules": [], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "modules": [], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "modules": [], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.", "modules": [], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "modules": [], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "modules": [], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "modules": [], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "modules": [], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "modules": [], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "modules": [], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "modules": [], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "modules": [], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "modules": [], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "modules": [], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "modules": [], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "modules": [], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "modules": [], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": "LLMNR allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link.", "modules": [], "protocols": [], "short": "Link-Local Multicast Name Resolution (LLMNR)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "modules": [], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "modules": [], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "modules": [], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "modules": [], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "modules": [], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "modules": [], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "modules": [], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "modules": [], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "modules": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "modules": [], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "modules": [], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "modules": [], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "modules": [], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "modules": [], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "modules": [], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "modules": [], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "modules": [], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "modules": [], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "modules": [], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": " Plex Media Server (PMS) is the back-end media server component of Plex. It organizes audio (music) and visual (photos and videos) content from personal media libraries and streams it to their player counterparts, either on the same machine, the same local area network, or over the Internet. ", "modules": [], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "modules": [], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "modules": [], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "modules": [], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "modules": [], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "modules": [], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "modules": [], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "modules": [], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "modules": [], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "modules": [], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "modules": [], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "modules": [], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "modules": [], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "modules": [], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "modules": [ "sane" ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "modules": [ "sip" ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "modules": [], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "modules": [], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "modules": [], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "modules": [], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "modules": [], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "modules": [], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "modules": [], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "modules": [], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "modules": [], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "modules": [], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a Peer-to-Peer file synchronization service. Enable this option, if you plan to run the Synthing service.", "modules": [], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "modules": [], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "modules": [], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "modules": [], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "modules": [], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "modules": [ "tftp" ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tftp-client": { "description": "This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.", "modules": [ "tftp" ], "protocols": [], "short": "TFTP Client", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "modules": [], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "modules": [], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "modules": [], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "modules": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "modules": [], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "modules": [], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "modules": [], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "modules": [], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "modules": [], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "modules": [], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "modules": [], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "modules": [], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "modules": [], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "modules": [], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-server": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" } }, "zones": { "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Monday 11 November 2024 20:45:04 -0500 (0:00:00.283) 0:00:23.542 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Monday 11 November 2024 20:45:04 -0500 (0:00:00.071) 0:00:23.614 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Monday 11 November 2024 20:45:04 -0500 (0:00:00.097) 0:00:23.712 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Monday 11 November 2024 20:45:04 -0500 (0:00:00.062) 0:00:23.774 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Monday 11 November 2024 20:45:04 -0500 (0:00:00.080) 0:00:23.855 ******* skipping: [managed-node1] => {} TASK [Fail if default settings values not dictionaries] ************************ task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:103 Monday 11 November 2024 20:45:04 -0500 (0:00:00.058) 0:00:23.914 ******* skipping: [managed-node1] => (item={u'block': {u'masqerade': False, u'short': u'Block', u'description': u'Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'%%REJECT%%', u'services': [], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}, u'work': {u'masqerade': False, u'short': u'Work', u'description': u'For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'default', u'services': [u'ssh', u'dhcpv6-client'], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}, u'drop': {u'masqerade': False, u'short': u'Drop', u'description': u'Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'DROP', u'services': [], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}, u'internal': {u'masqerade': False, u'short': u'Internal', u'description': u'For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'default', u'services': [u'ssh', u'mdns', u'samba-client', u'dhcpv6-client'], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}, u'external': {u'masqerade': True, u'short': u'External', u'description': u'For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'default', u'services': [u'ssh'], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}, u'home': {u'masqerade': False, u'short': u'Home', u'description': u'For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'default', u'services': [u'ssh', u'mdns', u'samba-client', u'dhcpv6-client'], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}, u'dmz': {u'masqerade': False, u'short': u'DMZ', u'description': u'For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'default', u'services': [u'ssh'], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}, u'public': {u'masqerade': False, u'short': u'Public', u'description': u'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'default', u'services': [u'ssh', u'dhcpv6-client', u'https'], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}, u'trusted': {u'masqerade': False, u'short': u'Trusted', u'description': u'All network connections are accepted.', u'source_ports': [], u'interfaces': [], u'sources': [], u'icmp_block_inversion': False, u'rules_str': [], u'version': u'', u'target': u'ACCEPT', u'services': [], u'icmp_blocks': [], u'ports': [], u'protocols': [], u'forward_ports': []}}) => { "ansible_loop_var": "item", "changed": false, "item": { "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item={u'xmpp-server': {u'short': u'XMPP (Jabber) server', u'description': u'Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'bacula-client': {u'short': u'Bacula Client', u'description': u'This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ganglia-client': {u'short': u'ganglia-client', u'description': u'Ganglia monitoring daemon', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'isns': {u'short': u'iSNS', u'description': u'The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ovirt-imageio': {u'short': u'oVirt Image I/O', u'description': u'oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'pmproxy': {u'short': u'Performance metrics proxy (pmproxy)', u'description': u'This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'xdmcp': {u'short': u'XDMCP', u'description': u'The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'transmission-client': {u'short': u'Transmission', u'description': u'Transmission is a lightweight BitTorrent client.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'syslog-tls': {u'short': u'syslog-tls', u'description': u'Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'samba': {u'short': u'Samba', u'description': u'This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [u'netbios-ns'], u'protocols': []}, u'upnp-client': {u'short': u'UPnP Client', u'description': u'Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).', u'source_ports': [[u'1900', u'udp']], u'version': u'', u'modules': [], u'protocols': []}, u'mqtt': {u'short': u'mqtt', u'description': u'The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'openvpn': {u'short': u'OpenVPN', u'description': u'OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'kshell': {u'short': u'kshell', u'description': u'Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ipsec': {u'short': u'IPsec', u'description': u'Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': [u'ah', u'esp']}, u'imaps': {u'short': u'IMAP over SSL', u'description': u'The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'kpasswd': {u'short': u'Kpasswd', u'description': u'Kerberos password (Kpasswd) server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'RH-Satellite-6-capsule': {u'short': u'Red Hat Satellite 6 Capsule', u'description': u'Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'wbem-http': {u'short': u'wbem-http', u'description': u'Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'dropbox-lansync': {u'short': u'dropboxlansync', u'description': u'Dropbox LAN sync', u'source_ports': [], u'version': u'1.0', u'modules': [], u'protocols': []}, u'iscsi-target': {u'short': u'iSCSI target', u'description': u'Internet SCSI target is a storage resource located on an iSCSI server.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'pop3': {u'short': u'POP-3', u'description': u'The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'kprop': {u'short': u'kprop', u'description': u'Kerberos KDC Propagation Protocol', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ssh': {u'short': u'SSH', u'description': u'Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'dhcp': {u'short': u'DHCP', u'description': u'This allows a DHCP server to accept messages from DHCP clients and relay agents.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ircs': {u'short': u'IRC TLS/SSL', u'description': u'An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'nrpe': {u'short': u'NRPE', u'description': u'NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'nfs3': {u'short': u'NFS3', u'description': u'The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'tor-socks': {u'short': u'Tor - SOCKS Proxy', u'description': u"Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'mountd': {u'short': u'mountd', u'description': u'NFS Mount Lock Daemon', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'sane': {u'short': u'SANE network daemon (saned)', u'description': u'The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.', u'source_ports': [], u'version': u'', u'modules': [u'sane'], u'protocols': []}, u'nfs': {u'short': u'NFS4', u'description': u'The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'libvirt-tls': {u'short': u'Virtual Machine Management (TLS)', u'description': u'Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'bitcoin-testnet': {u'short': u'Bitcoin testnet', u'description': u'The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'managesieve': {u'short': u'ManageSieve', u'description': u'The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'xmpp-bosh': {u'short': u'XMPP (Jabber) web client', u'description': u'Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'amanda-k5-client': {u'short': u'Amanda Backup Client (kerberized)', u'description': u'The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication', u'source_ports': [], u'version': u'', u'modules': [u'amanda'], u'protocols': []}, u'nut': {u'short': u'NUT', u'description': u'Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'mysql': {u'short': u'MySQL', u'description': u'MySQL Database Server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'xmpp-local': {u'short': u'XMPP Link-Local Messaging', u'description': u'Serverless XMPP-like communication over local networks based on zero-configuration networking.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'kibana': {u'short': u'Kibana', u'description': u'Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'synergy': {u'short': u'Synergy', u'description': u'Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'syslog': {u'short': u'syslog', u'description': u'Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ganglia-master': {u'short': u'ganglia-master', u'description': u'Ganglia collector', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'radius': {u'short': u'RADIUS', u'description': u'The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'sips': {u'short': u'SIP-TLS (SIPS)', u'description': u'SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ms-wbt': {u'short': u'ms-wbt', u'description': u'Microsoft Windows-based Terminal Server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'spideroak-lansync': {u'short': u'SpiderOak ONE LAN-Sync', u'description': u'SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ftp': {u'short': u'FTP', u'description': u'FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [u'ftp'], u'protocols': []}, u'xmpp-client': {u'short': u'XMPP (Jabber) client', u'description': u'Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'matrix': {u'short': u'Matrix', u'description': u"Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'zabbix-agent': {u'short': u'Zabbix Agent', u'description': u'Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'mosh': {u'short': u'Mobile shell that supports roaming and intelligent local echo.', u'description': u'Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of "network lag" on high-latency connections.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'redis': {u'short': u'redis', u'description': u'Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ovirt-storageconsole': {u'short': u'oVirt Storage-Console', u'description': u"oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'svdrp': {u'short': u'SVDRP', u'description': u'The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'apcupsd': {u'short': u'apcupsd', u'description': u'The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'finger': {u'short': u'finger', u'description': u'Finger is a protocol for obtaining information about users on remote hosts.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'kadmin': {u'short': u'kadmin', u'description': u'Kerberos Administration Protocol', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ntp': {u'short': u'Network Time Protocol (NTP) Server', u'description': u'The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ceph-mon': {u'short': u'ceph-mon', u'description': u"Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'irc': {u'short': u'IRC', u'description': u'An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'nmea-0183': {u'short': u'nmea-0183', u'description': u'NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'pmwebapi': {u'short': u'Performance metrics web API (pmwebapi)', u'description': u'This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'etcd-server': {u'short': u'etcd Server', u'description': u'etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'vnc-server': {u'short': u'Virtual Network Computing Server (VNC)', u'description': u'A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'plex': {u'short': u'PLEX', u'description': u' Plex Media Server (PMS) is the back-end media server component of Plex. It organizes audio (music) and visual (photos and videos) content from personal media libraries and streams it to their player counterparts, either on the same machine, the same local area network, or over the Internet. ', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'bitcoin-testnet-rpc': {u'short': u'Bitcoin testnet RPC', u'description': u'Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'minidlna': {u'short': u'MiniDLNA', u'description': u'MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'murmur': {u'short': u'Murmur', u'description': u'Murmur is the server of the Mumble VoIP chat system.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'syncthing': {u'short': u'Syncthing', u'description': u'Syncthing is a Peer-to-Peer file synchronization service. Enable this option, if you plan to run the Synthing service.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'docker-registry': {u'short': u'Docker Registry', u'description': u'Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'pmcd': {u'short': u'Performance metrics collector (pmcd)', u'description': u'This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'mssql': {u'short': u'mssql', u'description': u'Microsoft SQL Server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'postgresql': {u'short': u'PostgreSQL', u'description': u'PostgreSQL Database Server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'condor-collector': {u'short': u'HT Condor Collector', u'description': u'The HT Condor Collector is needed to organize the condor worker nodes.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'smtps': {u'short': u'Mail (SMTP over SSL)', u'description': u"This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'bgp': {u'short': u'BGP service listen', u'description': u'Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'tftp-client': {u'short': u'TFTP Client', u'description': u'This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [u'tftp'], u'protocols': []}, u'elasticsearch': {u'short': u'Elasticsearch', u'description': u'Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'tftp': {u'short': u'TFTP', u'description': u'The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).', u'source_ports': [], u'version': u'', u'modules': [u'tftp'], u'protocols': []}, u'llmnr': {u'short': u'Link-Local Multicast Name Resolution (LLMNR)', u'description': u'LLMNR allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'vdsm': {u'short': u"oVirt's Virtual Desktop and Server Manager", u'description': u"The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'rtsp': {u'short': u'RTSP', u'description': u'The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'quassel': {u'short': u'Quassel IRC', u'description': u'Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'snmptrap': {u'short': u'SNMPTRAP', u'description': u'SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ipp': {u'short': u'Network Printing Server (IPP)', u'description': u'The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ldaps': {u'short': u'LDAPS', u'description': u'Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ovirt-vmconsole': {u'short': u'oVirt VM Console', u'description': u'oVirt VM Consoles enables secure access to virtual machine serial console.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'puppetmaster': {u'short': u'Puppet Master', u'description': u'Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'mdns': {u'short': u'Multicast DNS (mDNS)', u'description': u'mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'git': {u'short': u'git', u'description': u'The git daemon for supporting git:// access to git repositories.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ptp': {u'short': u'Precision Time Protocol (PTP) Master', u'description': u'The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'dhcpv6-client': {u'short': u'DHCPv6 Client', u'description': u'This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'rpc-bind': {u'short': u'rpc-bind', u'description': u'Remote Procedure Call Bind', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'snmp': {u'short': u'SNMP', u'description': u'Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks". Enable this service if you run SNMP agent (server).', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'bitcoin': {u'short': u'Bitcoin', u'description': u'The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'wsman': {u'short': u'wsman', u'description': u'Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'docker-swarm': {u'short': u'Docker integrated swarm mode', u'description': u'Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': [u'esp']}, u'tinc': {u'short': u'tinc VPN', u'description': u'tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'salt-master': {u'short': u'Salt Master', u'description': u'Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'freeipa-trust': {u'short': u'FreeIPA trust setup', u'description': u'FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'audit': {u'short': u'Audit', u'description': u'The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'squid': {u'short': u'squid', u'description': u'Squid HTTP proxy server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'rsh': {u'short': u'rsh', u'description': u'Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'dns': {u'short': u'DNS', u'description': u'The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'distcc': {u'short': u'distcc', u'description': u'Distcc is a protocol used for distributed compilation.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ldap': {u'short': u'LDAP', u'description': u'Lightweight Directory Access Protocol (LDAP) server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'telnet': {u'short': u'Telnet', u'description': u'Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'freeipa-ldaps': {u'short': u'FreeIPA with LDAPS', u'description': u"FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAPS protocol. You can also enable the 'freeipa-ldap' service if you want to provide the LDAP protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'amqps': {u'short': u'amqps', u'description': u'The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'imap': {u'short': u'IMAP', u'description': u'The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'etcd-client': {u'short': u'etcd Client', u'description': u'etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'freeipa-ldap': {u'short': u'FreeIPA with LDAP', u'description': u"FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAP protocol. You can also enable the 'freeipa-ldaps' service if you want to provide the LDAPS protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ipp-client': {u'short': u'Network Printing Client (IPP)', u'description': u'The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'proxy-dhcp': {u'short': u'Proxy DHCP', u'description': u'PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'amanda-client': {u'short': u'Amanda Backup Client', u'description': u'The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [u'amanda'], u'protocols': []}, u'slp': {u'short': u'SLP', u'description': u'The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'dhcpv6': {u'short': u'DHCPv6', u'description': u'This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'klogin': {u'short': u'klogin', u'description': u'The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'privoxy': {u'short': u'Privoxy - A Privacy Enhancing Proxy Server', u'description': u'Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'lightning-network': {u'short': u'Lightning Network', u'description': u'The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'samba-dc': {u'short': u'Samba DC', u'description': u'This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [u'netbios-ns'], u'protocols': []}, u'syncthing-gui': {u'short': u'Syncthing GUI', u'description': u'Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'pop3s': {u'short': u'POP-3 over SSL', u'description': u'The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'wsmans': {u'short': u'wsmans', u'description': u'Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'smtp': {u'short': u'Mail (SMTP)', u'description': u"This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'mqtt-tls': {u'short': u'mqtt-tls', u'description': u'The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'RH-Satellite-6': {u'short': u'Red Hat Satellite 6', u'description': u'Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ceph': {u'short': u'ceph', u'description': u"Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'pmwebapis': {u'short': u'Secure performance metrics web API (pmwebapis)', u'description': u'This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'bacula': {u'short': u'Bacula', u'description': u'Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'freeipa-replication': {u'short': u'FreeIPA replication', u'description': u'FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you want to enable LDAP replication between FreeIPA servers.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'https': {u'short': u'Secure WWW (HTTPS)', u'description': u'HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'amqp': {u'short': u'amqp', u'description': u'The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'high-availability': {u'short': u'Red Hat High Availability', u'description': u'This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'gre': {u'short': u'', u'description': u'', u'source_ports': [], u'version': u'', u'modules': [u'proto-gre'], u'protocols': [u'gre']}, u'cfengine': {u'short': u'CFEngine', u'description': u'CFEngine server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'samba-client': {u'short': u'Samba Client', u'description': u'This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [u'netbios-ns'], u'protocols': []}, u'kerberos': {u'short': u'Kerberos', u'description': u'Kerberos network authentication protocol server', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'http': {u'short': u'WWW (HTTP)', u'description': u'HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'mongodb': {u'short': u'mongodb', u'description': u'MongoDB is a free and open-source cross-platform document-oriented database program.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'zabbix-server': {u'short': u'Zabbix Server', u'description': u'Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'smtp-submission': {u'short': u'Mail (SMTP-Submission)', u'description': u'SMTP-Submission allows remote users to submit mail over port 587.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'libvirt': {u'short': u'Virtual Machine Management', u'description': u'Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'sip': {u'short': u'SIP', u'description': u'The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.', u'source_ports': [], u'version': u'', u'modules': [u'sip'], u'protocols': []}, u'rsyncd': {u'short': u'Rsync in daemon mode', u'description': u'Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'bitcoin-rpc': {u'short': u'Bitcoin RPC', u'description': u'Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'svn': {u'short': u'Subversion', u'description': u'The custom, unencrypted protocol used the Subversion Version Control System.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'pulseaudio': {u'short': u'PulseAudio', u'description': u'A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'jenkins': {u'short': u'jenkins', u'description': u'Jenkins is an open source automation server written in Java.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'wbem-https': {u'short': u'wbem-https', u'description': u'Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'steam-streaming': {u'short': u'Steam In-Home Streaming', u'description': u"Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}, u'ctdb': {u'short': u'CTDB', u'description': u'CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.', u'source_ports': [], u'version': u'', u'modules': [], u'protocols': []}}) => { "ansible_loop_var": "item", "changed": false, "item": { "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "modules": [], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "modules": [], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "modules": [], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "modules": [], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "modules": [], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "modules": [], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "modules": [], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "modules": [], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "modules": [], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "modules": [], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "modules": [], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "modules": [], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "modules": [], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "modules": [], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "modules": [], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "modules": [], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "modules": [], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "modules": [], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "modules": [], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "modules": [], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "modules": [], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "modules": [], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "modules": [], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAP protocol. You can also enable the 'freeipa-ldaps' service if you want to provide the LDAPS protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAP", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAPS protocol. You can also enable the 'freeipa-ldap' service if you want to provide the LDAP protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAPS", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you want to enable LDAP replication between FreeIPA servers.", "modules": [], "protocols": [], "short": "FreeIPA replication", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "modules": [], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "modules": [ "ftp" ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "modules": [], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "modules": [], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "modules": [], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gre": { "description": "", "modules": [ "proto-gre" ], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "modules": [], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "modules": [], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "modules": [], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "modules": [], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.", "modules": [], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "modules": [], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "modules": [], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "modules": [], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "modules": [], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "modules": [], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "modules": [], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "modules": [], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "modules": [], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "modules": [], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "modules": [], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "modules": [], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "modules": [], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "modules": [], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": "LLMNR allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link.", "modules": [], "protocols": [], "short": "Link-Local Multicast Name Resolution (LLMNR)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "modules": [], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "modules": [], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "modules": [], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "modules": [], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "modules": [], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "modules": [], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "modules": [], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "modules": [], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "modules": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "modules": [], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "modules": [], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "modules": [], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "modules": [], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "modules": [], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "modules": [], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "modules": [], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "modules": [], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "modules": [], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "modules": [], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": " Plex Media Server (PMS) is the back-end media server component of Plex. It organizes audio (music) and visual (photos and videos) content from personal media libraries and streams it to their player counterparts, either on the same machine, the same local area network, or over the Internet. ", "modules": [], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "modules": [], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "modules": [], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "modules": [], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "modules": [], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "modules": [], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "modules": [], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "modules": [], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "modules": [], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "modules": [], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "modules": [], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "modules": [], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "modules": [], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "modules": [], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "modules": [ "sane" ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "modules": [ "sip" ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "modules": [], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "modules": [], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "modules": [], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "modules": [], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "modules": [], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "modules": [], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "modules": [], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "modules": [], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "modules": [], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "modules": [], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a Peer-to-Peer file synchronization service. Enable this option, if you plan to run the Synthing service.", "modules": [], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "modules": [], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "modules": [], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "modules": [], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "modules": [], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "modules": [ "tftp" ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tftp-client": { "description": "This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.", "modules": [ "tftp" ], "protocols": [], "short": "TFTP Client", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "modules": [], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "modules": [], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "modules": [], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "modules": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "modules": [], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "modules": [], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "modules": [], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "modules": [], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "modules": [], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "modules": [], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "modules": [], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "modules": [], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "modules": [], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "modules": [], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-server": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item={u'ftp': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [[u'21', u'tcp']], u'module': u'nf_conntrack_ftp'}, u'sip': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [[u'5060', u'tcp'], [u'5060', u'udp']], u'module': u'nf_conntrack_sip'}, u'pptp': {u'short': u'', u'description': u'', u'family': u'ipv4', u'version': u'', u'port': [[u'1723', u'tcp']], u'module': u'nf_conntrack_pptp'}, u'proto-gre': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [], u'module': u'nf_conntrack_proto_gre'}, u'snmp': {u'short': u'', u'description': u'', u'family': u'ipv4', u'version': u'', u'port': [[u'161', u'udp']], u'module': u'nf_conntrack_snmp'}, u'h323': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [], u'module': u'nf_conntrack_h323'}, u'sane': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [[u'6566', u'tcp']], u'module': u'nf_conntrack_sane'}, u'RAS': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [[u'1719', u'udp']], u'module': u'nf_conntrack_h323'}, u'netbios-ns': {u'short': u'', u'description': u'', u'family': u'ipv4', u'version': u'', u'port': [[u'137', u'udp']], u'module': u'nf_conntrack_netbios_ns'}, u'irc': {u'short': u'', u'description': u'', u'family': u'ipv4', u'version': u'', u'port': [[u'194', u'tcp']], u'module': u'nf_conntrack_irc'}, u'amanda': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [[u'10080', u'udp']], u'module': u'nf_conntrack_amanda'}, u'tftp': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [[u'69', u'udp']], u'module': u'nf_conntrack_tftp'}, u'Q.931': {u'short': u'', u'description': u'', u'family': u'', u'version': u'', u'port': [[u'1720', u'tcp']], u'module': u'nf_conntrack_h323'}}) => { "ansible_loop_var": "item", "changed": false, "item": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item={u'ip-header-bad': {u'destination': [u'ipv4'], u'description': u'This error message is sent if the IP header is bad.', u'version': u'', u'short': u'Ip Header Bad'}, u'protocol-unreachable': {u'destination': [u'ipv4'], u'description': u'This message is sent if the destination protocol is unreachable.', u'version': u'', u'short': u'Protocol Unreachable'}, u'unknown-header-type': {u'destination': [u'ipv6'], u'description': u'This error message is sent if an unrecognized Next Header type encountered.', u'version': u'', u'short': u'Unknown Header Type'}, u'timestamp-request': {u'destination': [u'ipv4'], u'description': u'This message is used for time synchronization.', u'version': u'', u'short': u'Timestamp Request'}, u'neighbour-advertisement': {u'destination': [u'ipv6'], u'description': u'This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.', u'version': u'', u'short': u'Neighbour Advertisement (Neighbor Advertisement)'}, u'router-solicitation': {u'destination': [], u'description': u'This message is used by a host attached to a multicast link to request a Router Advertisement.', u'version': u'', u'short': u'Router Solicitation'}, u'tos-network-unreachable': {u'destination': [u'ipv4'], u'description': u'This error message is sent if the network is unreachable for the type of service.', u'version': u'', u'short': u'TOS Network Unreachable'}, u'destination-unreachable': {u'destination': [], u'description': u'This error message is generated by a host or gateway if the destination is not reachable.', u'version': u'', u'short': u'Destination Unreachable'}, u'fragmentation-needed': {u'destination': [u'ipv4'], u'description': u'This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.', u'version': u'', u'short': u'Fragmentation Needed'}, u'echo-reply': {u'destination': [], u'description': u'This message is the answer to an Echo Request.', u'version': u'', u'short': u'Echo Reply (pong)'}, u'bad-header': {u'destination': [u'ipv6'], u'description': u'This error message is created if there has been an error in the header of a packet.', u'version': u'', u'short': u'Bad Header'}, u'host-redirect': {u'destination': [u'ipv4'], u'description': u'This message is sent if the datagram is redirected for the host.', u'version': u'', u'short': u'Host Redirect'}, u'redirect': {u'destination': [], u'description': u'This error message informs a host to send packets on another route.', u'version': u'', u'short': u'Redirect'}, u'source-quench': {u'destination': [u'ipv4'], u'description': u'This error message is generated to tell a host to reduce the pace at which it is sending packets.', u'version': u'', u'short': u'Source Quench'}, u'packet-too-big': {u'destination': [u'ipv6'], u'description': u'This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.', u'version': u'', u'short': u'Packet Too Big'}, u'ttl-zero-during-reassembly': {u'destination': [u'ipv4', u'ipv6'], u'description': u'This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.', u'version': u'', u'short': u'TTL Zero During Reassembly'}, u'host-prohibited': {u'destination': [u'ipv4'], u'description': u'This error message is sent if access from a host administratively prohibited.', u'version': u'', u'short': u'Host Prohibited'}, u'tos-host-redirect': {u'destination': [u'ipv4'], u'description': u'This message is the datagram is redirected for the type of service and host.', u'version': u'', u'short': u'TOS Host Redirect'}, u'network-unreachable': {u'destination': [u'ipv4'], u'description': u'This message is sent if the destination network is unreachable.', u'version': u'', u'short': u'Network Unreachable'}, u'network-prohibited': {u'destination': [u'ipv4'], u'description': u'This message is sent if the network is administratively prohibited.', u'version': u'', u'short': u'Network Prohibited'}, u'port-unreachable': {u'destination': [u'ipv4', u'ipv6'], u'description': u'This error message is sent if the port unreachable.', u'version': u'', u'short': u'Port Unreachable'}, u'time-exceeded': {u'destination': [], u'description': u'This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.', u'version': u'', u'short': u'Time Exceeded'}, u'tos-network-redirect': {u'destination': [u'ipv4'], u'description': u'This message is sent if the datagram is redirected for the type of service and network.', u'version': u'', u'short': u'TOS Network Redirect'}, u'no-route': {u'destination': [u'ipv6'], u'description': u'This error message is set if there is no route to the destination.', u'version': u'', u'short': u'No Route'}, u'host-precedence-violation': {u'destination': [u'ipv4'], u'description': u'This error message is sent if the communication administratively prohibited.', u'version': u'', u'short': u'Host Precedence Violation'}, u'host-unreachable': {u'destination': [u'ipv4'], u'description': u'This error message is sent if the destination host is unreachable.', u'version': u'', u'short': u'Host Unreachable'}, u'echo-request': {u'destination': [], u'description': u'This message is used to test if a host is reachable mostly with the ping utility.', u'version': u'', u'short': u'Echo Request (ping)'}, u'failed-policy': {u'destination': [u'ipv6'], u'description': u'This error message is generated if the source address failed ingress/egress policy.', u'version': u'', u'short': u'Failed Policy'}, u'network-unknown': {u'destination': [u'ipv4'], u'description': u'This message is sent if the destination network is unknown.', u'version': u'', u'short': u'Network Unknown'}, u'unknown-option': {u'destination': [u'ipv6'], u'description': u'This error message is sent if an unrecognized IPv6 option encountered.', u'version': u'', u'short': u'Unknown Option'}, u'timestamp-reply': {u'destination': [u'ipv4'], u'description': u'This message is used to reply to a timestamp message.', u'version': u'', u'short': u'Timestamp Reply'}, u'network-redirect': {u'destination': [u'ipv4'], u'description': u'This message is sent if the datagram is redirected for the network.', u'version': u'', u'short': u'Network Redirect'}, u'ttl-zero-during-transit': {u'destination': [u'ipv4', u'ipv6'], u'description': u'This error message is sent if the time to live exceeded in transit.', u'version': u'', u'short': u'TTL Zero During Transit'}, u'neighbour-solicitation': {u'destination': [u'ipv6'], u'description': u'This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.', u'version': u'', u'short': u'Neighbour Solicitation (Neighbor Solicitation)'}, u'reject-route': {u'destination': [u'ipv6'], u'description': u'This error message is sent if the route to destination is rejected.', u'version': u'', u'short': u'Reject Route'}, u'host-unknown': {u'destination': [u'ipv4'], u'description': u'This error message is sent if the destination host is unknown.', u'version': u'', u'short': u'Host Unknown'}, u'precedence-cutoff': {u'destination': [u'ipv4'], u'description': u'This message is sent if the precedence is lower than the required minimum.', u'version': u'', u'short': u'Precedence Cutoff'}, u'source-route-failed': {u'destination': [u'ipv4'], u'description': u'This message is sent if the source route has failed.', u'version': u'', u'short': u'Source Route Failed'}, u'beyond-scope': {u'destination': [u'ipv6'], u'description': u'This error message is sent if transmitting a package whould cross a zone boundary of the scope of the source address.', u'version': u'', u'short': u'Beyond Scope'}, u'parameter-problem': {u'destination': [], u'description': u'This error message is generated if the IP header is bad, either by a missing option or bad length.', u'version': u'', u'short': u'Parameter Problem'}, u'required-option-missing': {u'destination': [u'ipv4'], u'description': u'This message is sent if a required option is missing.', u'version': u'', u'short': u'Required Option Missing'}, u'tos-host-unreachable': {u'destination': [u'ipv4'], u'description': u'This message is sent if the host is unreachable for the type of service.', u'version': u'', u'short': u'TOS Host Unreachable'}, u'communication-prohibited': {u'destination': [u'ipv4', u'ipv6'], u'description': u'This error message is sent if communication with destination administratively prohibited.', u'version': u'', u'short': u'Communication Prohibited'}, u'address-unreachable': {u'destination': [u'ipv6'], u'description': u'This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.', u'version': u'', u'short': u'Address Unreachable'}, u'router-advertisement': {u'destination': [], u'description': u'This message is used by routers to periodically announce the IP address of a multicast interface.', u'version': u'', u'short': u'Router Advertisement'}}) => { "ansible_loop_var": "item", "changed": false, "item": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package whould cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "skip_reason": "Conditional result was False" } TASK [Fail if custom firewall_config is not its previous value] **************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:111 Monday 11 November 2024 20:45:05 -0500 (0:00:00.374) 0:00:24.288 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Fail if default zone differs] ******************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:116 Monday 11 November 2024 20:45:05 -0500 (0:00:00.072) 0:00:24.360 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Cleanup] ***************************************************************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:122 Monday 11 November 2024 20:45:05 -0500 (0:00:00.068) 0:00:24.429 ******* TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Monday 11 November 2024 20:45:05 -0500 (0:00:00.209) 0:00:24.639 ******* included: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for managed-node1 TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Monday 11 November 2024 20:45:05 -0500 (0:00:00.060) 0:00:24.699 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Monday 11 November 2024 20:45:05 -0500 (0:00:00.076) 0:00:24.775 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Monday 11 November 2024 20:45:05 -0500 (0:00:00.062) 0:00:24.838 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Monday 11 November 2024 20:45:05 -0500 (0:00:00.058) 0:00:24.897 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Monday 11 November 2024 20:45:06 -0500 (0:00:00.062) 0:00:24.959 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Monday 11 November 2024 20:45:06 -0500 (0:00:00.069) 0:00:25.028 ******* ok: [managed-node1] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Monday 11 November 2024 20:45:06 -0500 (0:00:00.755) 0:00:25.784 ******* skipping: [managed-node1] => {} TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Monday 11 November 2024 20:45:06 -0500 (0:00:00.084) 0:00:25.868 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Monday 11 November 2024 20:45:07 -0500 (0:00:00.111) 0:00:25.980 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Monday 11 November 2024 20:45:07 -0500 (0:00:00.083) 0:00:26.064 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Monday 11 November 2024 20:45:07 -0500 (0:00:00.064) 0:00:26.128 ******* skipping: [managed-node1] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [managed-node1] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Monday 11 November 2024 20:45:07 -0500 (0:00:00.070) 0:00:26.198 ******* ok: [managed-node1] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Mon 2024-11-11 20:44:46 EST", "ActiveEnterTimestampMonotonic": "214457365", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service basic.target dbus.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Mon 2024-11-11 20:44:45 EST", "AssertTimestampMonotonic": "214213564", "Before": "multi-user.target network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Mon 2024-11-11 20:44:45 EST", "ConditionTimestampMonotonic": "214213562", "Conflicts": "iptables.service shutdown.target ipset.service ip6tables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "9521", "ExecMainStartTimestamp": "Mon 2024-11-11 20:44:45 EST", "ExecMainStartTimestampMonotonic": "214214751", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Mon 2024-11-11 20:44:45 EST] ; stop_time=[n/a] ; pid=9521 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Mon 2024-11-11 20:44:45 EST", "InactiveExitTimestampMonotonic": "214214780", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "9521", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Mon 2024-11-11 20:44:46 EST", "WatchdogTimestampMonotonic": "214457310", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Monday 11 November 2024 20:45:07 -0500 (0:00:00.418) 0:00:26.617 ******* ok: [managed-node1] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Mon 2024-11-11 20:44:46 EST", "ActiveEnterTimestampMonotonic": "214457365", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service basic.target dbus.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Mon 2024-11-11 20:44:45 EST", "AssertTimestampMonotonic": "214213564", "Before": "multi-user.target network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Mon 2024-11-11 20:44:45 EST", "ConditionTimestampMonotonic": "214213562", "Conflicts": "iptables.service shutdown.target ipset.service ip6tables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "9521", "ExecMainStartTimestamp": "Mon 2024-11-11 20:44:45 EST", "ExecMainStartTimestampMonotonic": "214214751", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Mon 2024-11-11 20:44:45 EST] ; stop_time=[n/a] ; pid=9521 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Mon 2024-11-11 20:44:45 EST", "InactiveExitTimestampMonotonic": "214214780", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "9521", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Mon 2024-11-11 20:44:46 EST", "WatchdogTimestampMonotonic": "214457310", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Monday 11 November 2024 20:45:08 -0500 (0:00:00.526) 0:00:27.143 ******* ok: [managed-node1] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Monday 11 November 2024 20:45:08 -0500 (0:00:00.058) 0:00:27.201 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Monday 11 November 2024 20:45:08 -0500 (0:00:00.095) 0:00:27.297 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Monday 11 November 2024 20:45:08 -0500 (0:00:00.068) 0:00:27.365 ******* TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Monday 11 November 2024 20:45:08 -0500 (0:00:00.079) 0:00:27.445 ******* TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Monday 11 November 2024 20:45:08 -0500 (0:00:00.060) 0:00:27.506 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Monday 11 November 2024 20:45:08 -0500 (0:00:00.063) 0:00:27.570 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Monday 11 November 2024 20:45:08 -0500 (0:00:00.046) 0:00:27.617 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Monday 11 November 2024 20:45:08 -0500 (0:00:00.052) 0:00:27.669 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Monday 11 November 2024 20:45:08 -0500 (0:00:00.061) 0:00:27.731 ******* skipping: [managed-node1] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Monday 11 November 2024 20:45:08 -0500 (0:00:00.097) 0:00:27.829 ******* skipping: [managed-node1] => {} META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* managed-node1 : ok=44 changed=2 unreachable=0 failed=0 skipped=96 rescued=0 ignored=0 Monday 11 November 2024 20:45:08 -0500 (0:00:00.056) 0:00:27.885 ******* =============================================================================== fedora.linux_system_roles.firewall : Gather firewall config information --- 3.46s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Gathering Facts --------------------------------------------------------- 1.18s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:2 fedora.linux_system_roles.firewall : Get config files, checksums before and remove --- 1.04s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.98s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.91s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Modify firewalld configuration ------------------------------------------ 0.82s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:56 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.77s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.76s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Get default zone -------------------------------------------------------- 0.76s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/tests/firewall/tests_firewall_fact.yml:15 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.76s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.74s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.74s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 fedora.linux_system_roles.firewall : Gather firewall config if no arguments --- 0.63s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.53s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.49s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Check if system is ostree ---------- 0.48s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.45s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.43s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Get config files, checksums after --- 0.42s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.42s /tmp/collections-gWK/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22