asbestos 0.0.1 → 0.0.3

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,15 +1,15 @@
1
1
  ---
2
2
  !binary "U0hBMQ==":
3
3
  metadata.gz: !binary |-
4
- ZDQ2N2U5NmUwMzg1NDdjMTBlNjYxNzM1MjNlY2E3MGM1MTBkNTM3ZA==
4
+ ZDJiNGMwMTZkMTAxYzY5OTdhODA4NzllOGNkMTk1ZDNjZTM1MDM5YQ==
5
5
  data.tar.gz: !binary |-
6
- ZDVhODYyOGIxMzRmMDcwOGY3ODE4MDExZmU4YWE0OGUwNDg2MzJmNA==
6
+ NWE0ZmFiOTJjNzA2MjVhMGRlOTU3NDEzYzFiMGNkZjY2MjFiMmU2Mw==
7
7
  !binary "U0hBNTEy":
8
8
  metadata.gz: !binary |-
9
- MzQ4MjIwOTYxYTFlY2ZmYTk2NjljOWJjZjM3MWJhMmFhZDYwNjE5OWIyMDlh
10
- MzAxZTZjMDA1Zjk1Mzg0YzY4M2M5NjRiMDRkMjU3ODRmNzVkZmJhMjUyZmZm
11
- NjMxNzEyYjBlMjRkNWRlN2I2Zjg4MGNlZTU3NTUwYjhlN2I1NTE=
9
+ ZGEzNWRiNjc3ZjZmZDk5NzFiODkyZTdjMGViMTM0OGM3MGU0NDUzNDdmZWRk
10
+ NGUzMjE3YTQ5ZWU4NDA4NTNlODQ5MjM4ZWQ0NzJmMmE3ZmM3MzBiN2NiNzg5
11
+ MGFjZmQ4ODliMjRkOTVlNzI2ZGM0MTNlZjJjNTIzZjExMmQ0ZjU=
12
12
  data.tar.gz: !binary |-
13
- ZWI5MGVlZjY4YjY3YzZmNGExMGE5YzUyN2JiNWI0N2VlMjAxNjBiM2MxNmU4
14
- YzJiZjU0ZGU2MzI4ZjYyZWExNDE0NWU1MTY4OWViMjVjMzQ3ZGVhMGE0ZTA3
15
- YTRlYTIxYWZhZDY4MDg4ZGExNGY2MDgxMjY0NmMzZDYzMmEzMGU=
13
+ NDcxNGVlMzUyMGI2MGI3NzAwOGY5NGU5ZWYwNDI2NmQ2ZmZiY2YzMDNiZmMz
14
+ YTg1NWM3MjIzZTYxN2ZiYWYwNjc4ZjY4MzBkMDM3MTczNmFiNjI2MmVhYzBh
15
+ NmEyYjEyZTQ1MWI2ZWE0NTM1ZDk5YmVlYTA3ODNiN2JiMGY2NTE=
data/.travis.yml ADDED
@@ -0,0 +1,4 @@
1
+ rvm:
2
+ - 1.9.3
3
+ script:
4
+ - RAILS_ENV=test bundle exec rspec
data/README.md CHANGED
@@ -6,6 +6,10 @@ Trying to maintain a set of interconnected firewall rules is pretty annoying, ho
6
6
 
7
7
  At the moment, Asbestos only supports IPTables (the filter table, specifically), but it can be easily expanded for other firewall types.
8
8
 
9
+
10
+ [![Build Status](https://travis-ci.org/koudelka/asbestos.png)](https://travis-ci.org/koudelka/asbestos)
11
+
12
+
9
13
  ## Installation
10
14
 
11
15
  Simply:
@@ -333,7 +337,7 @@ rule_set :icmp_protection do
333
337
  :icmp_type => 'echo-request',
334
338
  :interface => interface,
335
339
  :remote_address => address,
336
- :limit => '22s',
340
+ :limit => '1/s',
337
341
  :comment => "allow icmp from #{address}"
338
342
  end
339
343
 
@@ -359,9 +363,9 @@ Results in:
359
363
  # Begin [icmp_protection]
360
364
  -A OUTPUT -j ACCEPT -p icmp --icmp-type echo-request -m comment --comment "allow us to ping others"
361
365
  -A INPUT -j ACCEPT -p icmp --icmp-type echo-reply -m comment --comment "allow us to receive ping responses"
362
- -A INPUT -j ACCEPT -i eth1 -p icmp -s pinger.monitoringservice.com -m limit --limit 22s --icmp-type echo-request -m comment --comment "allow icmp from pinger.monitoringservice.com on eth1"
366
+ -A INPUT -j ACCEPT -i eth1 -p icmp -s pinger.monitoringservice.com -m limit --limit 1/s --icmp-type echo-request -m comment --comment "allow icmp from pinger.monitoringservice.com on eth1"
363
367
  -A INPUT -j DROP -i eth1 -p icmp -m comment --comment "drop any icmp packets that haven't been explicitly allowed on eth1"
364
- -A INPUT -j ACCEPT -i eth1:0 -p icmp -s pinger.monitoringservice.com -m limit --limit 22s --icmp-type echo-request -m comment --comment "allow icmp from pinger.monitoringservice.com on eth1:0"
368
+ -A INPUT -j ACCEPT -i eth1:0 -p icmp -s pinger.monitoringservice.com -m limit --limit 1/s --icmp-type echo-request -m comment --comment "allow icmp from pinger.monitoringservice.com on eth1:0"
365
369
  -A INPUT -j DROP -i eth1:0 -p icmp -m comment --comment "drop any icmp packets that haven't been explicitly allowed on eth1:0"
366
370
  # End [icmp_protection]
367
371
  ```
@@ -15,7 +15,7 @@ rule_set :icmp_protection do
15
15
  :icmp_type => 'echo-request',
16
16
  :interface => interface,
17
17
  :remote_address => address,
18
- :limit => '22s',
18
+ :limit => '1/s',
19
19
  :comment => "allow icmp from #{address}"
20
20
  end
21
21
 
@@ -1,4 +1,4 @@
1
1
  module Asbestos
2
- VERSION = "0.0.1"
2
+ VERSION = "0.0.3"
3
3
  HOMEPAGE = "http://www.github.com/koudelka/asbestos"
4
4
  end
@@ -17,7 +17,7 @@ rule_set :icmp_protection do
17
17
  :icmp_type => 'echo-request',
18
18
  :interface => interface,
19
19
  :remote_address => address,
20
- :limit => '22s',
20
+ :limit => '1/s',
21
21
  :comment => "allow icmp from #{address}"
22
22
  end
23
23
 
@@ -3,7 +3,7 @@ rule_set :sanity_check do
3
3
  chain 'valid-dst'
4
4
 
5
5
  # Require all packets to or from the internet to go through sanity checks.
6
- interfaces[:external].each do |iface|
6
+ interfaces[:external].each do |interface|
7
7
  rule :chain => :input,
8
8
  :action => 'valid-src',
9
9
  :interface => interface,
@@ -12,7 +12,7 @@ rule_set :sanity_check do
12
12
  rule :chain => :output,
13
13
  :action => 'valid-dst',
14
14
  :interface => interface,
15
- :comment => "all traffic from internet goes through sanity check"
15
+ :comment => "all traffic to internet goes through sanity check"
16
16
  end
17
17
 
18
18
  # Private interface addresses should never be talking to our external IP.
@@ -25,9 +25,9 @@ rule_set :sanity_check do
25
25
  '192.168.0.0/16',
26
26
  '224.0.0.0/4',
27
27
  '240.0.0.0/5'
28
- ].each do |interal_ip_range|
28
+ ].each do |internal_ip_range|
29
29
  drop :chain => 'valid-src',
30
- :local_address => interal_ip_range,
30
+ :local_address => internal_ip_range,
31
31
  :comment => "drop private ip talking to external interface"
32
32
  end
33
33
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: asbestos
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.1
4
+ version: 0.0.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - Michael Shapiro
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2013-06-21 00:00:00.000000000 Z
11
+ date: 2014-01-07 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
@@ -77,6 +77,7 @@ extra_rdoc_files: []
77
77
  files:
78
78
  - .gitignore
79
79
  - .rspec
80
+ - .travis.yml
80
81
  - Gemfile
81
82
  - Guardfile
82
83
  - LICENSE.txt