asbestos 0.0.1 → 0.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,15 +1,15 @@
1
1
  ---
2
2
  !binary "U0hBMQ==":
3
3
  metadata.gz: !binary |-
4
- ZDQ2N2U5NmUwMzg1NDdjMTBlNjYxNzM1MjNlY2E3MGM1MTBkNTM3ZA==
4
+ ZDJiNGMwMTZkMTAxYzY5OTdhODA4NzllOGNkMTk1ZDNjZTM1MDM5YQ==
5
5
  data.tar.gz: !binary |-
6
- ZDVhODYyOGIxMzRmMDcwOGY3ODE4MDExZmU4YWE0OGUwNDg2MzJmNA==
6
+ NWE0ZmFiOTJjNzA2MjVhMGRlOTU3NDEzYzFiMGNkZjY2MjFiMmU2Mw==
7
7
  !binary "U0hBNTEy":
8
8
  metadata.gz: !binary |-
9
- MzQ4MjIwOTYxYTFlY2ZmYTk2NjljOWJjZjM3MWJhMmFhZDYwNjE5OWIyMDlh
10
- MzAxZTZjMDA1Zjk1Mzg0YzY4M2M5NjRiMDRkMjU3ODRmNzVkZmJhMjUyZmZm
11
- NjMxNzEyYjBlMjRkNWRlN2I2Zjg4MGNlZTU3NTUwYjhlN2I1NTE=
9
+ ZGEzNWRiNjc3ZjZmZDk5NzFiODkyZTdjMGViMTM0OGM3MGU0NDUzNDdmZWRk
10
+ NGUzMjE3YTQ5ZWU4NDA4NTNlODQ5MjM4ZWQ0NzJmMmE3ZmM3MzBiN2NiNzg5
11
+ MGFjZmQ4ODliMjRkOTVlNzI2ZGM0MTNlZjJjNTIzZjExMmQ0ZjU=
12
12
  data.tar.gz: !binary |-
13
- ZWI5MGVlZjY4YjY3YzZmNGExMGE5YzUyN2JiNWI0N2VlMjAxNjBiM2MxNmU4
14
- YzJiZjU0ZGU2MzI4ZjYyZWExNDE0NWU1MTY4OWViMjVjMzQ3ZGVhMGE0ZTA3
15
- YTRlYTIxYWZhZDY4MDg4ZGExNGY2MDgxMjY0NmMzZDYzMmEzMGU=
13
+ NDcxNGVlMzUyMGI2MGI3NzAwOGY5NGU5ZWYwNDI2NmQ2ZmZiY2YzMDNiZmMz
14
+ YTg1NWM3MjIzZTYxN2ZiYWYwNjc4ZjY4MzBkMDM3MTczNmFiNjI2MmVhYzBh
15
+ NmEyYjEyZTQ1MWI2ZWE0NTM1ZDk5YmVlYTA3ODNiN2JiMGY2NTE=
data/.travis.yml ADDED
@@ -0,0 +1,4 @@
1
+ rvm:
2
+ - 1.9.3
3
+ script:
4
+ - RAILS_ENV=test bundle exec rspec
data/README.md CHANGED
@@ -6,6 +6,10 @@ Trying to maintain a set of interconnected firewall rules is pretty annoying, ho
6
6
 
7
7
  At the moment, Asbestos only supports IPTables (the filter table, specifically), but it can be easily expanded for other firewall types.
8
8
 
9
+
10
+ [![Build Status](https://travis-ci.org/koudelka/asbestos.png)](https://travis-ci.org/koudelka/asbestos)
11
+
12
+
9
13
  ## Installation
10
14
 
11
15
  Simply:
@@ -333,7 +337,7 @@ rule_set :icmp_protection do
333
337
  :icmp_type => 'echo-request',
334
338
  :interface => interface,
335
339
  :remote_address => address,
336
- :limit => '22s',
340
+ :limit => '1/s',
337
341
  :comment => "allow icmp from #{address}"
338
342
  end
339
343
 
@@ -359,9 +363,9 @@ Results in:
359
363
  # Begin [icmp_protection]
360
364
  -A OUTPUT -j ACCEPT -p icmp --icmp-type echo-request -m comment --comment "allow us to ping others"
361
365
  -A INPUT -j ACCEPT -p icmp --icmp-type echo-reply -m comment --comment "allow us to receive ping responses"
362
- -A INPUT -j ACCEPT -i eth1 -p icmp -s pinger.monitoringservice.com -m limit --limit 22s --icmp-type echo-request -m comment --comment "allow icmp from pinger.monitoringservice.com on eth1"
366
+ -A INPUT -j ACCEPT -i eth1 -p icmp -s pinger.monitoringservice.com -m limit --limit 1/s --icmp-type echo-request -m comment --comment "allow icmp from pinger.monitoringservice.com on eth1"
363
367
  -A INPUT -j DROP -i eth1 -p icmp -m comment --comment "drop any icmp packets that haven't been explicitly allowed on eth1"
364
- -A INPUT -j ACCEPT -i eth1:0 -p icmp -s pinger.monitoringservice.com -m limit --limit 22s --icmp-type echo-request -m comment --comment "allow icmp from pinger.monitoringservice.com on eth1:0"
368
+ -A INPUT -j ACCEPT -i eth1:0 -p icmp -s pinger.monitoringservice.com -m limit --limit 1/s --icmp-type echo-request -m comment --comment "allow icmp from pinger.monitoringservice.com on eth1:0"
365
369
  -A INPUT -j DROP -i eth1:0 -p icmp -m comment --comment "drop any icmp packets that haven't been explicitly allowed on eth1:0"
366
370
  # End [icmp_protection]
367
371
  ```
@@ -15,7 +15,7 @@ rule_set :icmp_protection do
15
15
  :icmp_type => 'echo-request',
16
16
  :interface => interface,
17
17
  :remote_address => address,
18
- :limit => '22s',
18
+ :limit => '1/s',
19
19
  :comment => "allow icmp from #{address}"
20
20
  end
21
21
 
@@ -1,4 +1,4 @@
1
1
  module Asbestos
2
- VERSION = "0.0.1"
2
+ VERSION = "0.0.3"
3
3
  HOMEPAGE = "http://www.github.com/koudelka/asbestos"
4
4
  end
@@ -17,7 +17,7 @@ rule_set :icmp_protection do
17
17
  :icmp_type => 'echo-request',
18
18
  :interface => interface,
19
19
  :remote_address => address,
20
- :limit => '22s',
20
+ :limit => '1/s',
21
21
  :comment => "allow icmp from #{address}"
22
22
  end
23
23
 
@@ -3,7 +3,7 @@ rule_set :sanity_check do
3
3
  chain 'valid-dst'
4
4
 
5
5
  # Require all packets to or from the internet to go through sanity checks.
6
- interfaces[:external].each do |iface|
6
+ interfaces[:external].each do |interface|
7
7
  rule :chain => :input,
8
8
  :action => 'valid-src',
9
9
  :interface => interface,
@@ -12,7 +12,7 @@ rule_set :sanity_check do
12
12
  rule :chain => :output,
13
13
  :action => 'valid-dst',
14
14
  :interface => interface,
15
- :comment => "all traffic from internet goes through sanity check"
15
+ :comment => "all traffic to internet goes through sanity check"
16
16
  end
17
17
 
18
18
  # Private interface addresses should never be talking to our external IP.
@@ -25,9 +25,9 @@ rule_set :sanity_check do
25
25
  '192.168.0.0/16',
26
26
  '224.0.0.0/4',
27
27
  '240.0.0.0/5'
28
- ].each do |interal_ip_range|
28
+ ].each do |internal_ip_range|
29
29
  drop :chain => 'valid-src',
30
- :local_address => interal_ip_range,
30
+ :local_address => internal_ip_range,
31
31
  :comment => "drop private ip talking to external interface"
32
32
  end
33
33
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: asbestos
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.1
4
+ version: 0.0.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - Michael Shapiro
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2013-06-21 00:00:00.000000000 Z
11
+ date: 2014-01-07 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
@@ -77,6 +77,7 @@ extra_rdoc_files: []
77
77
  files:
78
78
  - .gitignore
79
79
  - .rspec
80
+ - .travis.yml
80
81
  - Gemfile
81
82
  - Guardfile
82
83
  - LICENSE.txt