# STDOUT: ---v---v---v---v---v--- ansible-playbook [core 2.16.0] config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.16/lib/python3.11/site-packages/ansible ansible collection location = /WORKDIR/git-weekly-cixjrs7z3g/.collection executable location = /opt/ansible-2.16/bin/ansible-playbook python version = 3.11.5 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] (/opt/ansible-2.16/bin/python) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_firewall_fact.yml ********************************************** 1 plays in /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml PLAY [Test firewall ansible fact] ********************************************** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:2 Saturday 25 May 2024 06:19:14 +0000 (0:00:00.012) 0:00:00.012 ********** ok: [sut] TASK [Start with default configuration] **************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:8 Saturday 25 May 2024 06:19:15 +0000 (0:00:00.918) 0:00:00.930 ********** TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 25 May 2024 06:19:15 +0000 (0:00:00.023) 0:00:00.954 ********** included: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 25 May 2024 06:19:15 +0000 (0:00:00.013) 0:00:00.967 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 25 May 2024 06:19:15 +0000 (0:00:00.018) 0:00:00.986 ********** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 25 May 2024 06:19:16 +0000 (0:00:00.185) 0:00:01.172 ********** ok: [sut] => { "ansible_facts": { "__firewall_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 Saturday 25 May 2024 06:19:16 +0000 (0:00:00.014) 0:00:01.186 ********** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 25 May 2024 06:19:16 +0000 (0:00:00.564) 0:00:01.751 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 25 May 2024 06:19:16 +0000 (0:00:00.016) 0:00:01.768 ********** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 25 May 2024 06:19:16 +0000 (0:00:00.020) 0:00:01.788 ********** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target dbus.service polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ip6tables.service ebtables.service iptables.service shutdown.target ipset.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 25 May 2024 06:19:17 +0000 (0:00:00.399) 0:00:02.188 ********** changed: [sut] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target dbus.service polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ipset.service iptables.service ebtables.service ip6tables.service shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 25 May 2024 06:19:18 +0000 (0:00:00.929) 0:00:03.117 ********** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": true, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 25 May 2024 06:19:18 +0000 (0:00:00.026) 0:00:03.143 ********** ok: [sut] => { "changed": false, "rc": 0 } STDOUT: 8697e89439a0fde2df034ef3bfeb3a9558529194c459826162be809a2f08e773 /etc/firewalld/lockdown-whitelist.xml STDERR: Shared connection to 10.31.46.74 closed. TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 25 May 2024 06:19:19 +0000 (0:00:01.639) 0:00:04.782 ********** ok: [sut] => { "ansible_facts": { "__firewall_report_changed": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 25 May 2024 06:19:19 +0000 (0:00:00.022) 0:00:04.805 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 25 May 2024 06:19:19 +0000 (0:00:00.021) 0:00:04.826 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 25 May 2024 06:19:19 +0000 (0:00:00.021) 0:00:04.847 ********** skipping: [sut] => { "changed": false, "false_condition": "'detailed' in fw[0]", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 25 May 2024 06:19:19 +0000 (0:00:00.022) 0:00:04.869 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 25 May 2024 06:19:19 +0000 (0:00:00.016) 0:00:04.886 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 25 May 2024 06:19:19 +0000 (0:00:00.017) 0:00:04.904 ********** ok: [sut] => { "changed": false, "rc": 0 } STDERR: Shared connection to 10.31.46.74 closed. TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.261) 0:00:05.165 ********** changed: [sut] => { "ansible_facts": { "firewall_lib_result": { "changed": true } }, "changed": true } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.022) 0:00:05.187 ********** skipping: [sut] => { "false_condition": "__firewall_debug | d(false)" } TASK [Get default zone] ******************************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:15 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.020) 0:00:05.208 ********** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--get-default-zone" ], "delta": "0:00:00.294467", "end": "2024-05-25 06:19:20.568521", "rc": 0, "start": "2024-05-25 06:19:20.274054" } STDOUT: public TASK [Get default ansible fact] ************************************************ task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:22 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.475) 0:00:05.683 ********** TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.027) 0:00:05.711 ********** included: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.012) 0:00:05.723 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.018) 0:00:05.742 ********** skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.012) 0:00:05.754 ********** skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.011) 0:00:05.766 ********** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.309) 0:00:06.076 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 25 May 2024 06:19:20 +0000 (0:00:00.017) 0:00:06.093 ********** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.021) 0:00:06.114 ********** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ActiveEnterTimestampMonotonic": "2775005940", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "dbus.service basic.target polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-05-25 06:19:17 UTC", "AssertTimestampMonotonic": "2774474209", "Before": "network-pre.target multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ConditionTimestampMonotonic": "2774474208", "Conflicts": "shutdown.target ebtables.service ipset.service iptables.service ip6tables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11823", "ExecMainStartTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ExecMainStartTimestampMonotonic": "2774476162", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-05-25 06:19:17 UTC] ; stop_time=[n/a] ; pid=11823 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-05-25 06:19:17 UTC", "InactiveExitTimestampMonotonic": "2774476202", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11823", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-05-25 06:19:17 UTC", "WatchdogTimestampMonotonic": "2775005883", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.204) 0:00:06.318 ********** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ActiveEnterTimestampMonotonic": "2775005940", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "dbus.service basic.target polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-05-25 06:19:17 UTC", "AssertTimestampMonotonic": "2774474209", "Before": "network-pre.target multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ConditionTimestampMonotonic": "2774474208", "Conflicts": "shutdown.target ebtables.service ipset.service iptables.service ip6tables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11823", "ExecMainStartTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ExecMainStartTimestampMonotonic": "2774476162", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-05-25 06:19:17 UTC] ; stop_time=[n/a] ; pid=11823 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-05-25 06:19:17 UTC", "InactiveExitTimestampMonotonic": "2774476202", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11823", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-05-25 06:19:17 UTC", "WatchdogTimestampMonotonic": "2775005883", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.201) 0:00:06.520 ********** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.025) 0:00:06.545 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.018) 0:00:06.564 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.016) 0:00:06.581 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.022) 0:00:06.604 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.021) 0:00:06.626 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall != None", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.009) 0:00:06.635 ********** ok: [sut] => { "changed": false, "firewall_config": { "default": { "helpers": [ "h323", "pptp", "ftp", "RAS", "snmp", "sane", "proto-gre", "irc", "Q.931", "amanda", "netbios-ns", "tftp", "sip" ], "icmptypes": [ "failed-policy", "tos-network-redirect", "port-unreachable", "network-redirect", "address-unreachable", "parameter-problem", "host-precedence-violation", "echo-request", "network-unreachable", "network-unknown", "communication-prohibited", "protocol-unreachable", "redirect", "host-unknown", "unknown-header-type", "unknown-option", "required-option-missing", "source-quench", "reject-route", "host-prohibited", "fragmentation-needed", "precedence-cutoff", "router-advertisement", "timestamp-reply", "tos-host-unreachable", "router-solicitation", "time-exceeded", "bad-header", "ttl-zero-during-transit", "neighbour-solicitation", "beyond-scope", "tos-host-redirect", "packet-too-big", "tos-network-unreachable", "host-redirect", "echo-reply", "timestamp-request", "neighbour-advertisement", "no-route", "destination-unreachable", "ttl-zero-during-reassembly", "network-prohibited", "ip-header-bad", "source-route-failed", "host-unreachable" ], "services": [ "bitcoin-rpc", "nut", "RH-Satellite-6-capsule", "pulseaudio", "nfs", "mdns", "postgresql", "ceph", "smtp-submission", "ldaps", "smtps", "nrpe", "mysql", "etcd-server", "finger", "lightning-network", "rtsp", "minidlna", "libvirt", "xmpp-client", "docker-registry", "pop3s", "syncthing-gui", "salt-master", "ftp", "snmptrap", "mqtt-tls", "dns", "wsmans", "puppetmaster", "tor-socks", "distcc", "xmpp-server", "telnet", "synergy", "freeipa-trust", "syncthing", "elasticsearch", "ganglia-master", "bitcoin-testnet", "llmnr", "high-availability", "git", "kerberos", "amanda-client", "ldap", "snmp", "tftp-client", "ovirt-storageconsole", "xdmcp", "plex", "rsh", "libvirt-tls", "audit", "bacula-client", "freeipa-replication", "sane", "radius", "syslog", "ntp", "ganglia-client", "pmwebapis", "zabbix-server", "pmwebapi", "bitcoin", "dropbox-lansync", "ptp", "ipp", "jenkins", "ssh", "samba-client", "rpc-bind", "ovirt-imageio", "iscsi-target", "spideroak-lansync", "wbem-http", "sips", "samba", "ceph-mon", "kpasswd", "privoxy", "ms-wbt", "amqp", "irc", "managesieve", "slp", "pop3", "wsman", "kibana", "ipsec", "pmcd", "etcd-client", "bacula", "zabbix-agent", "imap", "murmur", "svn", "pmproxy", "http", "quassel", "amqps", "condor-collector", "mongodb", "amanda-k5-client", "imaps", "freeipa-ldaps", "vnc-server", "ctdb", "nfs3", "isns", "gre", "ircs", "bitcoin-testnet-rpc", "openvpn", "upnp-client", "kshell", "https", "ipp-client", "kprop", "mqtt", "wbem-https", "kadmin", "dhcpv6", "RH-Satellite-6", "proxy-dhcp", "syslog-tls", "ovirt-vmconsole", "matrix", "freeipa-ldap", "smtp", "steam-streaming", "nmea-0183", "svdrp", "mountd", "docker-swarm", "transmission-client", "samba-dc", "dhcpv6-client", "tftp", "tinc", "dhcp", "sip", "klogin", "apcupsd", "squid", "redis", "mosh", "bgp", "rsyncd", "vdsm", "xmpp-local", "xmpp-bosh", "cfengine", "mssql" ], "zones": [ "home", "work", "public", "trusted", "internal", "block", "external", "dmz", "drop" ] }, "default_zone": "public" } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.396) 0:00:07.032 ********** ok: [sut] => { "ansible_facts": { "firewall_config": { "default": { "helpers": [ "h323", "pptp", "ftp", "RAS", "snmp", "sane", "proto-gre", "irc", "Q.931", "amanda", "netbios-ns", "tftp", "sip" ], "icmptypes": [ "failed-policy", "tos-network-redirect", "port-unreachable", "network-redirect", "address-unreachable", "parameter-problem", "host-precedence-violation", "echo-request", "network-unreachable", "network-unknown", "communication-prohibited", "protocol-unreachable", "redirect", "host-unknown", "unknown-header-type", "unknown-option", "required-option-missing", "source-quench", "reject-route", "host-prohibited", "fragmentation-needed", "precedence-cutoff", "router-advertisement", "timestamp-reply", "tos-host-unreachable", "router-solicitation", "time-exceeded", "bad-header", "ttl-zero-during-transit", "neighbour-solicitation", "beyond-scope", "tos-host-redirect", "packet-too-big", "tos-network-unreachable", "host-redirect", "echo-reply", "timestamp-request", "neighbour-advertisement", "no-route", "destination-unreachable", "ttl-zero-during-reassembly", "network-prohibited", "ip-header-bad", "source-route-failed", "host-unreachable" ], "services": [ "bitcoin-rpc", "nut", "RH-Satellite-6-capsule", "pulseaudio", "nfs", "mdns", "postgresql", "ceph", "smtp-submission", "ldaps", "smtps", "nrpe", "mysql", "etcd-server", "finger", "lightning-network", "rtsp", "minidlna", "libvirt", "xmpp-client", "docker-registry", "pop3s", "syncthing-gui", "salt-master", "ftp", "snmptrap", "mqtt-tls", "dns", "wsmans", "puppetmaster", "tor-socks", "distcc", "xmpp-server", "telnet", "synergy", "freeipa-trust", "syncthing", "elasticsearch", "ganglia-master", "bitcoin-testnet", "llmnr", "high-availability", "git", "kerberos", "amanda-client", "ldap", "snmp", "tftp-client", "ovirt-storageconsole", "xdmcp", "plex", "rsh", "libvirt-tls", "audit", "bacula-client", "freeipa-replication", "sane", "radius", "syslog", "ntp", "ganglia-client", "pmwebapis", "zabbix-server", "pmwebapi", "bitcoin", "dropbox-lansync", "ptp", "ipp", "jenkins", "ssh", "samba-client", "rpc-bind", "ovirt-imageio", "iscsi-target", "spideroak-lansync", "wbem-http", "sips", "samba", "ceph-mon", "kpasswd", "privoxy", "ms-wbt", "amqp", "irc", "managesieve", "slp", "pop3", "wsman", "kibana", "ipsec", "pmcd", "etcd-client", "bacula", "zabbix-agent", "imap", "murmur", "svn", "pmproxy", "http", "quassel", "amqps", "condor-collector", "mongodb", "amanda-k5-client", "imaps", "freeipa-ldaps", "vnc-server", "ctdb", "nfs3", "isns", "gre", "ircs", "bitcoin-testnet-rpc", "openvpn", "upnp-client", "kshell", "https", "ipp-client", "kprop", "mqtt", "wbem-https", "kadmin", "dhcpv6", "RH-Satellite-6", "proxy-dhcp", "syslog-tls", "ovirt-vmconsole", "matrix", "freeipa-ldap", "smtp", "steam-streaming", "nmea-0183", "svdrp", "mountd", "docker-swarm", "transmission-client", "samba-dc", "dhcpv6-client", "tftp", "tinc", "dhcp", "sip", "klogin", "apcupsd", "squid", "redis", "mosh", "bgp", "rsyncd", "vdsm", "xmpp-local", "xmpp-bosh", "cfengine", "mssql" ], "zones": [ "home", "work", "public", "trusted", "internal", "block", "external", "dmz", "drop" ] }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.023) 0:00:07.055 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.016) 0:00:07.072 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 25 May 2024 06:19:21 +0000 (0:00:00.016) 0:00:07.089 ********** skipping: [sut] => { "false_condition": "__firewall_previous_replaced | bool" } TASK [Fail if firewall_config is undefined] ************************************ task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:28 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.018) 0:00:07.107 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_config is undefined", "skip_reason": "Conditional result was False" } TASK [Fail if firewall_config custom exists] *********************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:33 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.011) 0:00:07.118 ********** skipping: [sut] => { "changed": false, "false_condition": "'custom' in firewall_config", "skip_reason": "Conditional result was False" } TASK [Fail if firewall_config defaults do not have attributes] ***************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:38 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.007) 0:00:07.126 ********** skipping: [sut] => (item={'key': 'zones', 'value': ['home', 'work', 'public', 'trusted', 'internal', 'block', 'external', 'dmz', 'drop']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "zones", "value": [ "home", "work", "public", "trusted", "internal", "block", "external", "dmz", "drop" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'key': 'services', 'value': ['bitcoin-rpc', 'nut', 'RH-Satellite-6-capsule', 'pulseaudio', 'nfs', 'mdns', 'postgresql', 'ceph', 'smtp-submission', 'ldaps', 'smtps', 'nrpe', 'mysql', 'etcd-server', 'finger', 'lightning-network', 'rtsp', 'minidlna', 'libvirt', 'xmpp-client', 'docker-registry', 'pop3s', 'syncthing-gui', 'salt-master', 'ftp', 'snmptrap', 'mqtt-tls', 'dns', 'wsmans', 'puppetmaster', 'tor-socks', 'distcc', 'xmpp-server', 'telnet', 'synergy', 'freeipa-trust', 'syncthing', 'elasticsearch', 'ganglia-master', 'bitcoin-testnet', 'llmnr', 'high-availability', 'git', 'kerberos', 'amanda-client', 'ldap', 'snmp', 'tftp-client', 'ovirt-storageconsole', 'xdmcp', 'plex', 'rsh', 'libvirt-tls', 'audit', 'bacula-client', 'freeipa-replication', 'sane', 'radius', 'syslog', 'ntp', 'ganglia-client', 'pmwebapis', 'zabbix-server', 'pmwebapi', 'bitcoin', 'dropbox-lansync', 'ptp', 'ipp', 'jenkins', 'ssh', 'samba-client', 'rpc-bind', 'ovirt-imageio', 'iscsi-target', 'spideroak-lansync', 'wbem-http', 'sips', 'samba', 'ceph-mon', 'kpasswd', 'privoxy', 'ms-wbt', 'amqp', 'irc', 'managesieve', 'slp', 'pop3', 'wsman', 'kibana', 'ipsec', 'pmcd', 'etcd-client', 'bacula', 'zabbix-agent', 'imap', 'murmur', 'svn', 'pmproxy', 'http', 'quassel', 'amqps', 'condor-collector', 'mongodb', 'amanda-k5-client', 'imaps', 'freeipa-ldaps', 'vnc-server', 'ctdb', 'nfs3', 'isns', 'gre', 'ircs', 'bitcoin-testnet-rpc', 'openvpn', 'upnp-client', 'kshell', 'https', 'ipp-client', 'kprop', 'mqtt', 'wbem-https', 'kadmin', 'dhcpv6', 'RH-Satellite-6', 'proxy-dhcp', 'syslog-tls', 'ovirt-vmconsole', 'matrix', 'freeipa-ldap', 'smtp', 'steam-streaming', 'nmea-0183', 'svdrp', 'mountd', 'docker-swarm', 'transmission-client', 'samba-dc', 'dhcpv6-client', 'tftp', 'tinc', 'dhcp', 'sip', 'klogin', 'apcupsd', 'squid', 'redis', 'mosh', 'bgp', 'rsyncd', 'vdsm', 'xmpp-local', 'xmpp-bosh', 'cfengine', 'mssql']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "services", "value": [ "bitcoin-rpc", "nut", "RH-Satellite-6-capsule", "pulseaudio", "nfs", "mdns", "postgresql", "ceph", "smtp-submission", "ldaps", "smtps", "nrpe", "mysql", "etcd-server", "finger", "lightning-network", "rtsp", "minidlna", "libvirt", "xmpp-client", "docker-registry", "pop3s", "syncthing-gui", "salt-master", "ftp", "snmptrap", "mqtt-tls", "dns", "wsmans", "puppetmaster", "tor-socks", "distcc", "xmpp-server", "telnet", "synergy", "freeipa-trust", "syncthing", "elasticsearch", "ganglia-master", "bitcoin-testnet", "llmnr", "high-availability", "git", "kerberos", "amanda-client", "ldap", "snmp", "tftp-client", "ovirt-storageconsole", "xdmcp", "plex", "rsh", "libvirt-tls", "audit", "bacula-client", "freeipa-replication", "sane", "radius", "syslog", "ntp", "ganglia-client", "pmwebapis", "zabbix-server", "pmwebapi", "bitcoin", "dropbox-lansync", "ptp", "ipp", "jenkins", "ssh", "samba-client", "rpc-bind", "ovirt-imageio", "iscsi-target", "spideroak-lansync", "wbem-http", "sips", "samba", "ceph-mon", "kpasswd", "privoxy", "ms-wbt", "amqp", "irc", "managesieve", "slp", "pop3", "wsman", "kibana", "ipsec", "pmcd", "etcd-client", "bacula", "zabbix-agent", "imap", "murmur", "svn", "pmproxy", "http", "quassel", "amqps", "condor-collector", "mongodb", "amanda-k5-client", "imaps", "freeipa-ldaps", "vnc-server", "ctdb", "nfs3", "isns", "gre", "ircs", "bitcoin-testnet-rpc", "openvpn", "upnp-client", "kshell", "https", "ipp-client", "kprop", "mqtt", "wbem-https", "kadmin", "dhcpv6", "RH-Satellite-6", "proxy-dhcp", "syslog-tls", "ovirt-vmconsole", "matrix", "freeipa-ldap", "smtp", "steam-streaming", "nmea-0183", "svdrp", "mountd", "docker-swarm", "transmission-client", "samba-dc", "dhcpv6-client", "tftp", "tinc", "dhcp", "sip", "klogin", "apcupsd", "squid", "redis", "mosh", "bgp", "rsyncd", "vdsm", "xmpp-local", "xmpp-bosh", "cfengine", "mssql" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'key': 'helpers', 'value': ['h323', 'pptp', 'ftp', 'RAS', 'snmp', 'sane', 'proto-gre', 'irc', 'Q.931', 'amanda', 'netbios-ns', 'tftp', 'sip']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "helpers", "value": [ "h323", "pptp", "ftp", "RAS", "snmp", "sane", "proto-gre", "irc", "Q.931", "amanda", "netbios-ns", "tftp", "sip" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'key': 'icmptypes', 'value': ['failed-policy', 'tos-network-redirect', 'port-unreachable', 'network-redirect', 'address-unreachable', 'parameter-problem', 'host-precedence-violation', 'echo-request', 'network-unreachable', 'network-unknown', 'communication-prohibited', 'protocol-unreachable', 'redirect', 'host-unknown', 'unknown-header-type', 'unknown-option', 'required-option-missing', 'source-quench', 'reject-route', 'host-prohibited', 'fragmentation-needed', 'precedence-cutoff', 'router-advertisement', 'timestamp-reply', 'tos-host-unreachable', 'router-solicitation', 'time-exceeded', 'bad-header', 'ttl-zero-during-transit', 'neighbour-solicitation', 'beyond-scope', 'tos-host-redirect', 'packet-too-big', 'tos-network-unreachable', 'host-redirect', 'echo-reply', 'timestamp-request', 'neighbour-advertisement', 'no-route', 'destination-unreachable', 'ttl-zero-during-reassembly', 'network-prohibited', 'ip-header-bad', 'source-route-failed', 'host-unreachable']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "icmptypes", "value": [ "failed-policy", "tos-network-redirect", "port-unreachable", "network-redirect", "address-unreachable", "parameter-problem", "host-precedence-violation", "echo-request", "network-unreachable", "network-unknown", "communication-prohibited", "protocol-unreachable", "redirect", "host-unknown", "unknown-header-type", "unknown-option", "required-option-missing", "source-quench", "reject-route", "host-prohibited", "fragmentation-needed", "precedence-cutoff", "router-advertisement", "timestamp-reply", "tos-host-unreachable", "router-solicitation", "time-exceeded", "bad-header", "ttl-zero-during-transit", "neighbour-solicitation", "beyond-scope", "tos-host-redirect", "packet-too-big", "tos-network-unreachable", "host-redirect", "echo-reply", "timestamp-request", "neighbour-advertisement", "no-route", "destination-unreachable", "ttl-zero-during-reassembly", "network-prohibited", "ip-header-bad", "source-route-failed", "host-unreachable" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [Fail if default zone is not correct] ************************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:44 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.027) 0:00:07.154 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_config.default_zone != __default_zone.stdout", "skip_reason": "Conditional result was False" } TASK [Save default ansible fact value] ***************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:49 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.009) 0:00:07.163 ********** ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Modify firewalld configuration] ****************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:56 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.013) 0:00:07.176 ********** ok: [sut] => { "changed": false, "cmd": "firewall-cmd --permanent --add-service https\nfirewall-cmd --permanent --new-service custom\n", "delta": "0:00:00.593379", "end": "2024-05-25 06:19:22.779520", "rc": 0, "start": "2024-05-25 06:19:22.186141" } STDOUT: success success TASK [Refetch firewall_config] ************************************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:63 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.718) 0:00:07.895 ********** TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.033) 0:00:07.929 ********** included: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.013) 0:00:07.942 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.022) 0:00:07.965 ********** skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.013) 0:00:07.978 ********** skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 Saturday 25 May 2024 06:19:22 +0000 (0:00:00.015) 0:00:07.993 ********** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.332) 0:00:08.326 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.016) 0:00:08.343 ********** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.019) 0:00:08.362 ********** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ActiveEnterTimestampMonotonic": "2775005940", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "dbus.service basic.target polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-05-25 06:19:17 UTC", "AssertTimestampMonotonic": "2774474209", "Before": "network-pre.target multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ConditionTimestampMonotonic": "2774474208", "Conflicts": "shutdown.target ebtables.service ipset.service iptables.service ip6tables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11823", "ExecMainStartTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ExecMainStartTimestampMonotonic": "2774476162", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-05-25 06:19:17 UTC] ; stop_time=[n/a] ; pid=11823 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-05-25 06:19:17 UTC", "InactiveExitTimestampMonotonic": "2774476202", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11823", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-05-25 06:19:17 UTC", "WatchdogTimestampMonotonic": "2775005883", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.204) 0:00:08.567 ********** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ActiveEnterTimestampMonotonic": "2775005940", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "dbus.service basic.target polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-05-25 06:19:17 UTC", "AssertTimestampMonotonic": "2774474209", "Before": "network-pre.target multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ConditionTimestampMonotonic": "2774474208", "Conflicts": "shutdown.target ebtables.service ipset.service iptables.service ip6tables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11823", "ExecMainStartTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ExecMainStartTimestampMonotonic": "2774476162", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-05-25 06:19:17 UTC] ; stop_time=[n/a] ; pid=11823 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-05-25 06:19:17 UTC", "InactiveExitTimestampMonotonic": "2774476202", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11823", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-05-25 06:19:17 UTC", "WatchdogTimestampMonotonic": "2775005883", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.202) 0:00:08.769 ********** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.022) 0:00:08.792 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.019) 0:00:08.811 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.017) 0:00:08.829 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.021) 0:00:08.851 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.022) 0:00:08.873 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall != None", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 25 May 2024 06:19:23 +0000 (0:00:00.009) 0:00:08.882 ********** ok: [sut] => { "changed": false, "firewall_config": { "custom": { "services": { "custom": { "description": "", "modules": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": [ "h323", "pptp", "ftp", "RAS", "snmp", "sane", "proto-gre", "irc", "Q.931", "amanda", "netbios-ns", "tftp", "sip" ], "icmptypes": [ "failed-policy", "tos-network-redirect", "port-unreachable", "network-redirect", "address-unreachable", "parameter-problem", "host-precedence-violation", "echo-request", "network-unreachable", "network-unknown", "communication-prohibited", "protocol-unreachable", "redirect", "host-unknown", "unknown-header-type", "unknown-option", "required-option-missing", "source-quench", "reject-route", "host-prohibited", "fragmentation-needed", "precedence-cutoff", "router-advertisement", "timestamp-reply", "tos-host-unreachable", "router-solicitation", "time-exceeded", "bad-header", "ttl-zero-during-transit", "neighbour-solicitation", "beyond-scope", "tos-host-redirect", "packet-too-big", "tos-network-unreachable", "host-redirect", "echo-reply", "timestamp-request", "neighbour-advertisement", "no-route", "destination-unreachable", "ttl-zero-during-reassembly", "network-prohibited", "ip-header-bad", "source-route-failed", "host-unreachable" ], "services": [ "bitcoin-rpc", "nut", "RH-Satellite-6-capsule", "pulseaudio", "nfs", "mdns", "postgresql", "ceph", "smtp-submission", "ldaps", "smtps", "nrpe", "mysql", "etcd-server", "finger", "lightning-network", "rtsp", "minidlna", "libvirt", "xmpp-client", "docker-registry", "pop3s", "syncthing-gui", "salt-master", "ftp", "snmptrap", "mqtt-tls", "dns", "wsmans", "puppetmaster", "tor-socks", "distcc", "xmpp-server", "telnet", "synergy", "freeipa-trust", "syncthing", "elasticsearch", "ganglia-master", "bitcoin-testnet", "llmnr", "high-availability", "git", "kerberos", "amanda-client", "ldap", "snmp", "tftp-client", "ovirt-storageconsole", "xdmcp", "plex", "rsh", "libvirt-tls", "audit", "bacula-client", "freeipa-replication", "sane", "radius", "syslog", "ntp", "ganglia-client", "pmwebapis", "zabbix-server", "pmwebapi", "bitcoin", "dropbox-lansync", "ptp", "ipp", "jenkins", "ssh", "samba-client", "rpc-bind", "ovirt-imageio", "iscsi-target", "spideroak-lansync", "wbem-http", "sips", "samba", "ceph-mon", "kpasswd", "privoxy", "ms-wbt", "amqp", "irc", "managesieve", "slp", "pop3", "wsman", "kibana", "ipsec", "pmcd", "etcd-client", "bacula", "zabbix-agent", "imap", "murmur", "svn", "pmproxy", "http", "quassel", "amqps", "condor-collector", "mongodb", "amanda-k5-client", "imaps", "freeipa-ldaps", "vnc-server", "ctdb", "nfs3", "isns", "gre", "ircs", "bitcoin-testnet-rpc", "openvpn", "upnp-client", "kshell", "https", "ipp-client", "kprop", "mqtt", "wbem-https", "kadmin", "dhcpv6", "RH-Satellite-6", "proxy-dhcp", "syslog-tls", "ovirt-vmconsole", "matrix", "freeipa-ldap", "smtp", "steam-streaming", "nmea-0183", "svdrp", "mountd", "docker-swarm", "transmission-client", "samba-dc", "dhcpv6-client", "tftp", "tinc", "dhcp", "sip", "klogin", "apcupsd", "squid", "redis", "mosh", "bgp", "rsyncd", "vdsm", "xmpp-local", "xmpp-bosh", "cfengine", "mssql" ], "zones": [ "home", "work", "public", "trusted", "internal", "block", "external", "dmz", "drop" ] }, "default_zone": "public" } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.388) 0:00:09.271 ********** ok: [sut] => { "ansible_facts": { "firewall_config": { "custom": { "services": { "custom": { "description": "", "modules": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": [ "h323", "pptp", "ftp", "RAS", "snmp", "sane", "proto-gre", "irc", "Q.931", "amanda", "netbios-ns", "tftp", "sip" ], "icmptypes": [ "failed-policy", "tos-network-redirect", "port-unreachable", "network-redirect", "address-unreachable", "parameter-problem", "host-precedence-violation", "echo-request", "network-unreachable", "network-unknown", "communication-prohibited", "protocol-unreachable", "redirect", "host-unknown", "unknown-header-type", "unknown-option", "required-option-missing", "source-quench", "reject-route", "host-prohibited", "fragmentation-needed", "precedence-cutoff", "router-advertisement", "timestamp-reply", "tos-host-unreachable", "router-solicitation", "time-exceeded", "bad-header", "ttl-zero-during-transit", "neighbour-solicitation", "beyond-scope", "tos-host-redirect", "packet-too-big", "tos-network-unreachable", "host-redirect", "echo-reply", "timestamp-request", "neighbour-advertisement", "no-route", "destination-unreachable", "ttl-zero-during-reassembly", "network-prohibited", "ip-header-bad", "source-route-failed", "host-unreachable" ], "services": [ "bitcoin-rpc", "nut", "RH-Satellite-6-capsule", "pulseaudio", "nfs", "mdns", "postgresql", "ceph", "smtp-submission", "ldaps", "smtps", "nrpe", "mysql", "etcd-server", "finger", "lightning-network", "rtsp", "minidlna", "libvirt", "xmpp-client", "docker-registry", "pop3s", "syncthing-gui", "salt-master", "ftp", "snmptrap", "mqtt-tls", "dns", "wsmans", "puppetmaster", "tor-socks", "distcc", "xmpp-server", "telnet", "synergy", "freeipa-trust", "syncthing", "elasticsearch", "ganglia-master", "bitcoin-testnet", "llmnr", "high-availability", "git", "kerberos", "amanda-client", "ldap", "snmp", "tftp-client", "ovirt-storageconsole", "xdmcp", "plex", "rsh", "libvirt-tls", "audit", "bacula-client", "freeipa-replication", "sane", "radius", "syslog", "ntp", "ganglia-client", "pmwebapis", "zabbix-server", "pmwebapi", "bitcoin", "dropbox-lansync", "ptp", "ipp", "jenkins", "ssh", "samba-client", "rpc-bind", "ovirt-imageio", "iscsi-target", "spideroak-lansync", "wbem-http", "sips", "samba", "ceph-mon", "kpasswd", "privoxy", "ms-wbt", "amqp", "irc", "managesieve", "slp", "pop3", "wsman", "kibana", "ipsec", "pmcd", "etcd-client", "bacula", "zabbix-agent", "imap", "murmur", "svn", "pmproxy", "http", "quassel", "amqps", "condor-collector", "mongodb", "amanda-k5-client", "imaps", "freeipa-ldaps", "vnc-server", "ctdb", "nfs3", "isns", "gre", "ircs", "bitcoin-testnet-rpc", "openvpn", "upnp-client", "kshell", "https", "ipp-client", "kprop", "mqtt", "wbem-https", "kadmin", "dhcpv6", "RH-Satellite-6", "proxy-dhcp", "syslog-tls", "ovirt-vmconsole", "matrix", "freeipa-ldap", "smtp", "steam-streaming", "nmea-0183", "svdrp", "mountd", "docker-swarm", "transmission-client", "samba-dc", "dhcpv6-client", "tftp", "tinc", "dhcp", "sip", "klogin", "apcupsd", "squid", "redis", "mosh", "bgp", "rsyncd", "vdsm", "xmpp-local", "xmpp-bosh", "cfengine", "mssql" ], "zones": [ "home", "work", "public", "trusted", "internal", "block", "external", "dmz", "drop" ] }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.023) 0:00:09.295 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.017) 0:00:09.312 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.016) 0:00:09.329 ********** skipping: [sut] => { "false_condition": "__firewall_previous_replaced | bool" } TASK [Fail if firewall_config not changed] ************************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:69 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.017) 0:00:09.347 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_config == __previous_firewall_config", "skip_reason": "Conditional result was False" } TASK [Fail if config defaults changed] ***************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:76 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.008) 0:00:09.355 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_config.default != __previous_firewall_config.default", "skip_reason": "Conditional result was False" } TASK [Fail if custom config unchanged] ***************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:81 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.008) 0:00:09.364 ********** skipping: [sut] => { "changed": false, "false_condition": "'custom' not in firewall_config or 'zones' not in firewall_config.custom or 'services' not in firewall_config.custom", "skip_reason": "Conditional result was False" } TASK [Store previous firewall_config] ****************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:89 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.008) 0:00:09.373 ********** ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Get firewall_config with detailed on] ************************************ task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:96 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.012) 0:00:09.385 ********** TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.037) 0:00:09.423 ********** included: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.013) 0:00:09.436 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.020) 0:00:09.456 ********** skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.012) 0:00:09.469 ********** skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.012) 0:00:09.481 ********** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.303) 0:00:09.785 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.016) 0:00:09.801 ********** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.020) 0:00:09.821 ********** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ActiveEnterTimestampMonotonic": "2775005940", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "dbus.service basic.target polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-05-25 06:19:17 UTC", "AssertTimestampMonotonic": "2774474209", "Before": "network-pre.target multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ConditionTimestampMonotonic": "2774474208", "Conflicts": "shutdown.target ebtables.service ipset.service iptables.service ip6tables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11823", "ExecMainStartTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ExecMainStartTimestampMonotonic": "2774476162", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-05-25 06:19:17 UTC] ; stop_time=[n/a] ; pid=11823 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-05-25 06:19:17 UTC", "InactiveExitTimestampMonotonic": "2774476202", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11823", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-05-25 06:19:17 UTC", "WatchdogTimestampMonotonic": "2775005883", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 25 May 2024 06:19:24 +0000 (0:00:00.201) 0:00:10.023 ********** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ActiveEnterTimestampMonotonic": "2775005940", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "dbus.service basic.target polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-05-25 06:19:17 UTC", "AssertTimestampMonotonic": "2774474209", "Before": "network-pre.target multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ConditionTimestampMonotonic": "2774474208", "Conflicts": "shutdown.target ebtables.service ipset.service iptables.service ip6tables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11823", "ExecMainStartTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ExecMainStartTimestampMonotonic": "2774476162", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-05-25 06:19:17 UTC] ; stop_time=[n/a] ; pid=11823 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-05-25 06:19:17 UTC", "InactiveExitTimestampMonotonic": "2774476202", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11823", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-05-25 06:19:17 UTC", "WatchdogTimestampMonotonic": "2775005883", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 25 May 2024 06:19:25 +0000 (0:00:00.204) 0:00:10.227 ********** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 25 May 2024 06:19:25 +0000 (0:00:00.028) 0:00:10.256 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 25 May 2024 06:19:25 +0000 (0:00:00.022) 0:00:10.279 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 25 May 2024 06:19:25 +0000 (0:00:00.020) 0:00:10.299 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 25 May 2024 06:19:25 +0000 (0:00:00.022) 0:00:10.321 ********** ok: [sut] => (item={'detailed': True}) => { "ansible_loop_var": "item", "changed": false, "firewall_config": { "custom": { "services": { "custom": { "description": "", "modules": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "icmptypes": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package whould cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "services": { "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "modules": [], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "modules": [], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "modules": [], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "modules": [], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "modules": [], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "modules": [], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "modules": [], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "modules": [], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "modules": [], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "modules": [], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "modules": [], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "modules": [], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "modules": [], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "modules": [], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "modules": [], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "modules": [], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "modules": [], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "modules": [], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "modules": [], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "modules": [], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "modules": [], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "modules": [], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "modules": [], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAP protocol. You can also enable the 'freeipa-ldaps' service if you want to provide the LDAPS protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAP", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAPS protocol. You can also enable the 'freeipa-ldap' service if you want to provide the LDAP protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAPS", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you want to enable LDAP replication between FreeIPA servers.", "modules": [], "protocols": [], "short": "FreeIPA replication", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "modules": [], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "modules": [ "ftp" ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "modules": [], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "modules": [], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "modules": [], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gre": { "description": "", "modules": [ "proto-gre" ], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "modules": [], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "modules": [], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "modules": [], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "modules": [], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.", "modules": [], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "modules": [], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "modules": [], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "modules": [], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "modules": [], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "modules": [], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "modules": [], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "modules": [], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "modules": [], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "modules": [], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "modules": [], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "modules": [], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "modules": [], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "modules": [], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": "LLMNR allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link.", "modules": [], "protocols": [], "short": "Link-Local Multicast Name Resolution (LLMNR)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "modules": [], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "modules": [], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "modules": [], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "modules": [], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "modules": [], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "modules": [], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "modules": [], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "modules": [], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "modules": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "modules": [], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "modules": [], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "modules": [], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "modules": [], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "modules": [], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "modules": [], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "modules": [], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "modules": [], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "modules": [], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "modules": [], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": " Plex Media Server (PMS) is the back-end media server component of Plex. It organizes audio (music) and visual (photos and videos) content from personal media libraries and streams it to their player counterparts, either on the same machine, the same local area network, or over the Internet. ", "modules": [], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "modules": [], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "modules": [], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "modules": [], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "modules": [], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "modules": [], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "modules": [], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "modules": [], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "modules": [], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "modules": [], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "modules": [], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "modules": [], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "modules": [], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "modules": [], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "modules": [ "sane" ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "modules": [ "sip" ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "modules": [], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "modules": [], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "modules": [], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "modules": [], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "modules": [], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "modules": [], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "modules": [], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "modules": [], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "modules": [], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "modules": [], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a Peer-to-Peer file synchronization service. Enable this option, if you plan to run the Synthing service.", "modules": [], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "modules": [], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "modules": [], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "modules": [], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "modules": [], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "modules": [ "tftp" ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tftp-client": { "description": "This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.", "modules": [ "tftp" ], "protocols": [], "short": "TFTP Client", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "modules": [], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "modules": [], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "modules": [], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "modules": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "modules": [], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "modules": [], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "modules": [], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "modules": [], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "modules": [], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "modules": [], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "modules": [], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "modules": [], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "modules": [], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "modules": [], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-server": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" } }, "zones": { "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default_zone": "public" }, "item": { "detailed": true } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 25 May 2024 06:19:28 +0000 (0:00:03.338) 0:00:13.660 ********** ok: [sut] => { "ansible_facts": { "firewall_config": { "custom": { "services": { "custom": { "description": "", "modules": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "icmptypes": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package whould cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "services": { "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "modules": [], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "modules": [], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "modules": [], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "modules": [], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "modules": [], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "modules": [], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "modules": [], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "modules": [], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "modules": [], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "modules": [], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "modules": [], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "modules": [], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "modules": [], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "modules": [], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "modules": [], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "modules": [], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "modules": [], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "modules": [], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "modules": [], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "modules": [], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "modules": [], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "modules": [], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "modules": [], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAP protocol. You can also enable the 'freeipa-ldaps' service if you want to provide the LDAPS protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAP", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAPS protocol. You can also enable the 'freeipa-ldap' service if you want to provide the LDAP protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAPS", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you want to enable LDAP replication between FreeIPA servers.", "modules": [], "protocols": [], "short": "FreeIPA replication", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "modules": [], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "modules": [ "ftp" ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "modules": [], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "modules": [], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "modules": [], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gre": { "description": "", "modules": [ "proto-gre" ], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "modules": [], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "modules": [], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "modules": [], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "modules": [], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.", "modules": [], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "modules": [], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "modules": [], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "modules": [], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "modules": [], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "modules": [], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "modules": [], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "modules": [], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "modules": [], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "modules": [], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "modules": [], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "modules": [], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "modules": [], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "modules": [], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": "LLMNR allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link.", "modules": [], "protocols": [], "short": "Link-Local Multicast Name Resolution (LLMNR)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "modules": [], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "modules": [], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "modules": [], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "modules": [], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "modules": [], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "modules": [], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "modules": [], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "modules": [], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "modules": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "modules": [], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "modules": [], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "modules": [], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "modules": [], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "modules": [], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "modules": [], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "modules": [], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "modules": [], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "modules": [], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "modules": [], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": " Plex Media Server (PMS) is the back-end media server component of Plex. It organizes audio (music) and visual (photos and videos) content from personal media libraries and streams it to their player counterparts, either on the same machine, the same local area network, or over the Internet. ", "modules": [], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "modules": [], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "modules": [], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "modules": [], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "modules": [], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "modules": [], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "modules": [], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "modules": [], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "modules": [], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "modules": [], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "modules": [], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "modules": [], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "modules": [], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "modules": [], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "modules": [ "sane" ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "modules": [ "sip" ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "modules": [], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "modules": [], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "modules": [], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "modules": [], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "modules": [], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "modules": [], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "modules": [], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "modules": [], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "modules": [], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "modules": [], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a Peer-to-Peer file synchronization service. Enable this option, if you plan to run the Synthing service.", "modules": [], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "modules": [], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "modules": [], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "modules": [], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "modules": [], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "modules": [ "tftp" ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tftp-client": { "description": "This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.", "modules": [ "tftp" ], "protocols": [], "short": "TFTP Client", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "modules": [], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "modules": [], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "modules": [], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "modules": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "modules": [], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "modules": [], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "modules": [], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "modules": [], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "modules": [], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "modules": [], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "modules": [], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "modules": [], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "modules": [], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "modules": [], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-server": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" } }, "zones": { "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.075) 0:00:13.736 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.019) 0:00:13.755 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.019) 0:00:13.774 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.022) 0:00:13.797 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.018) 0:00:13.815 ********** skipping: [sut] => { "false_condition": "__firewall_previous_replaced | bool" } TASK [Fail if default settings values not dictionaries] ************************ task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:103 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.025) 0:00:13.840 ********** skipping: [sut] => (item={'drop': {'masqerade': False, 'forward_ports': [], 'short': 'Drop', 'target': 'DROP', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': [], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.'}, 'work': {'masqerade': False, 'forward_ports': [], 'short': 'Work', 'target': 'default', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': ['ssh', 'dhcpv6-client'], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'}, 'internal': {'masqerade': False, 'forward_ports': [], 'short': 'Internal', 'target': 'default', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': ['ssh', 'mdns', 'samba-client', 'dhcpv6-client'], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.'}, 'trusted': {'masqerade': False, 'forward_ports': [], 'short': 'Trusted', 'target': 'ACCEPT', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': [], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'All network connections are accepted.'}, 'home': {'masqerade': False, 'forward_ports': [], 'short': 'Home', 'target': 'default', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': ['ssh', 'mdns', 'samba-client', 'dhcpv6-client'], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'}, 'dmz': {'masqerade': False, 'forward_ports': [], 'short': 'DMZ', 'target': 'default', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': ['ssh'], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.'}, 'public': {'masqerade': False, 'forward_ports': [], 'short': 'Public', 'target': 'default', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': ['ssh', 'dhcpv6-client', 'https'], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'}, 'block': {'masqerade': False, 'forward_ports': [], 'short': 'Block', 'target': '%%REJECT%%', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': [], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.'}, 'external': {'masqerade': True, 'forward_ports': [], 'short': 'External', 'target': 'default', 'source_ports': [], 'interfaces': [], 'sources': [], 'version': '', 'rules_str': [], 'icmp_block_inversion': False, 'services': ['ssh'], 'icmp_blocks': [], 'ports': [], 'protocols': [], 'description': 'For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "interfaces": [], "masqerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'xmpp-server': {'short': 'XMPP (Jabber) server', 'description': 'Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'bacula-client': {'short': 'Bacula Client', 'description': 'This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ganglia-client': {'short': 'ganglia-client', 'description': 'Ganglia monitoring daemon', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'isns': {'short': 'iSNS', 'description': 'The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'mysql': {'short': 'MySQL', 'description': 'MySQL Database Server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'zabbix-agent': {'short': 'Zabbix Agent', 'description': 'Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'xdmcp': {'short': 'XDMCP', 'description': 'The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ptp': {'short': 'Precision Time Protocol (PTP) Master', 'description': 'The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'syslog-tls': {'short': 'syslog-tls', 'description': 'Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'samba': {'short': 'Samba', 'description': 'This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.', 'source_ports': [], 'modules': ['netbios-ns'], 'version': '', 'protocols': []}, 'upnp-client': {'short': 'UPnP Client', 'description': 'Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).', 'source_ports': [['1900', 'udp']], 'modules': [], 'version': '', 'protocols': []}, 'mqtt': {'short': 'mqtt', 'description': 'The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ldap': {'short': 'LDAP', 'description': 'Lightweight Directory Access Protocol (LDAP) server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'kshell': {'short': 'kshell', 'description': 'Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ircs': {'short': 'IRC TLS/SSL', 'description': 'An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'imaps': {'short': 'IMAP over SSL', 'description': 'The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'RH-Satellite-6-capsule': {'short': 'Red Hat Satellite 6 Capsule', 'description': 'Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'rtsp': {'short': 'RTSP', 'description': 'The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'dropbox-lansync': {'short': 'dropboxlansync', 'description': 'Dropbox LAN sync', 'source_ports': [], 'modules': [], 'version': '1.0', 'protocols': []}, 'iscsi-target': {'short': 'iSCSI target', 'description': 'Internet SCSI target is a storage resource located on an iSCSI server.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'pop3': {'short': 'POP-3', 'description': 'The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'kprop': {'short': 'kprop', 'description': 'Kerberos KDC Propagation Protocol', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ssh': {'short': 'SSH', 'description': 'Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'pmwebapis': {'short': 'Secure performance metrics web API (pmwebapis)', 'description': 'This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ipsec': {'short': 'IPsec', 'description': 'Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': ['ah', 'esp']}, 'transmission-client': {'short': 'Transmission', 'description': 'Transmission is a lightweight BitTorrent client.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'nrpe': {'short': 'NRPE', 'description': 'NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'nfs3': {'short': 'NFS3', 'description': 'The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'tor-socks': {'short': 'Tor - SOCKS Proxy', 'description': "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'mountd': {'short': 'mountd', 'description': 'NFS Mount Lock Daemon', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'sane': {'short': 'SANE network daemon (saned)', 'description': 'The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.', 'source_ports': [], 'modules': ['sane'], 'version': '', 'protocols': []}, 'nfs': {'short': 'NFS4', 'description': 'The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'pop3s': {'short': 'POP-3 over SSL', 'description': 'The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'libvirt-tls': {'short': 'Virtual Machine Management (TLS)', 'description': 'Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'bitcoin-testnet': {'short': 'Bitcoin testnet', 'description': 'The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'managesieve': {'short': 'ManageSieve', 'description': 'The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'xmpp-bosh': {'short': 'XMPP (Jabber) web client', 'description': 'Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'amanda-k5-client': {'short': 'Amanda Backup Client (kerberized)', 'description': 'The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication', 'source_ports': [], 'modules': ['amanda'], 'version': '', 'protocols': []}, 'nut': {'short': 'NUT', 'description': 'Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ovirt-imageio': {'short': 'oVirt Image I/O', 'description': 'oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'xmpp-local': {'short': 'XMPP Link-Local Messaging', 'description': 'Serverless XMPP-like communication over local networks based on zero-configuration networking.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'kibana': {'short': 'Kibana', 'description': 'Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'synergy': {'short': 'Synergy', 'description': 'Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'syslog': {'short': 'syslog', 'description': 'Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ganglia-master': {'short': 'ganglia-master', 'description': 'Ganglia collector', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'radius': {'short': 'RADIUS', 'description': 'The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'sips': {'short': 'SIP-TLS (SIPS)', 'description': 'SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ms-wbt': {'short': 'ms-wbt', 'description': 'Microsoft Windows-based Terminal Server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'http': {'short': 'WWW (HTTP)', 'description': 'HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ftp': {'short': 'FTP', 'description': 'FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.', 'source_ports': [], 'modules': ['ftp'], 'version': '', 'protocols': []}, 'xmpp-client': {'short': 'XMPP (Jabber) client', 'description': 'Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'matrix': {'short': 'Matrix', 'description': "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'pmproxy': {'short': 'Performance metrics proxy (pmproxy)', 'description': 'This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'mosh': {'short': 'Mobile shell that supports roaming and intelligent local echo.', 'description': 'Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of "network lag" on high-latency connections.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'redis': {'short': 'redis', 'description': 'Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ovirt-storageconsole': {'short': 'oVirt Storage-Console', 'description': "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'svdrp': {'short': 'SVDRP', 'description': 'The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'apcupsd': {'short': 'apcupsd', 'description': 'The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'finger': {'short': 'finger', 'description': 'Finger is a protocol for obtaining information about users on remote hosts.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'kadmin': {'short': 'kadmin', 'description': 'Kerberos Administration Protocol', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'etcd-server': {'short': 'etcd Server', 'description': 'etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ceph-mon': {'short': 'ceph-mon', 'description': "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'irc': {'short': 'IRC', 'description': 'An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'nmea-0183': {'short': 'nmea-0183', 'description': 'NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'pmwebapi': {'short': 'Performance metrics web API (pmwebapi)', 'description': 'This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ntp': {'short': 'Network Time Protocol (NTP) Server', 'description': 'The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'vnc-server': {'short': 'Virtual Network Computing Server (VNC)', 'description': 'A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'plex': {'short': 'PLEX', 'description': ' Plex Media Server (PMS) is the back-end media server component of Plex. It organizes audio (music) and visual (photos and videos) content from personal media libraries and streams it to their player counterparts, either on the same machine, the same local area network, or over the Internet. ', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'bitcoin-testnet-rpc': {'short': 'Bitcoin testnet RPC', 'description': 'Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'minidlna': {'short': 'MiniDLNA', 'description': 'MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'murmur': {'short': 'Murmur', 'description': 'Murmur is the server of the Mumble VoIP chat system.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'syncthing': {'short': 'Syncthing', 'description': 'Syncthing is a Peer-to-Peer file synchronization service. Enable this option, if you plan to run the Synthing service.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'docker-registry': {'short': 'Docker Registry', 'description': 'Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'pmcd': {'short': 'Performance metrics collector (pmcd)', 'description': 'This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'mssql': {'short': 'mssql', 'description': 'Microsoft SQL Server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'postgresql': {'short': 'PostgreSQL', 'description': 'PostgreSQL Database Server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'condor-collector': {'short': 'HT Condor Collector', 'description': 'The HT Condor Collector is needed to organize the condor worker nodes.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'smtps': {'short': 'Mail (SMTP over SSL)', 'description': "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'freeipa-replication': {'short': 'FreeIPA replication', 'description': 'FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you want to enable LDAP replication between FreeIPA servers.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'tftp-client': {'short': 'TFTP Client', 'description': 'This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.', 'source_ports': [], 'modules': ['tftp'], 'version': '', 'protocols': []}, 'elasticsearch': {'short': 'Elasticsearch', 'description': 'Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'tftp': {'short': 'TFTP', 'description': 'The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).', 'source_ports': [], 'modules': ['tftp'], 'version': '', 'protocols': []}, 'llmnr': {'short': 'Link-Local Multicast Name Resolution (LLMNR)', 'description': 'LLMNR allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'vdsm': {'short': "oVirt's Virtual Desktop and Server Manager", 'description': "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'wbem-http': {'short': 'wbem-http', 'description': 'Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'quassel': {'short': 'Quassel IRC', 'description': 'Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'snmptrap': {'short': 'SNMPTRAP', 'description': 'SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ipp': {'short': 'Network Printing Server (IPP)', 'description': 'The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'wsman': {'short': 'wsman', 'description': 'Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ovirt-vmconsole': {'short': 'oVirt VM Console', 'description': 'oVirt VM Consoles enables secure access to virtual machine serial console.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'mdns': {'short': 'Multicast DNS (mDNS)', 'description': 'mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'git': {'short': 'git', 'description': 'The git daemon for supporting git:// access to git repositories.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'puppetmaster': {'short': 'Puppet Master', 'description': 'Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'dhcpv6-client': {'short': 'DHCPv6 Client', 'description': 'This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'rpc-bind': {'short': 'rpc-bind', 'description': 'Remote Procedure Call Bind', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'snmp': {'short': 'SNMP', 'description': 'Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks". Enable this service if you run SNMP agent (server).', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'bitcoin': {'short': 'Bitcoin', 'description': 'The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ldaps': {'short': 'LDAPS', 'description': 'Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'docker-swarm': {'short': 'Docker integrated swarm mode', 'description': 'Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': ['esp']}, 'tinc': {'short': 'tinc VPN', 'description': 'tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'salt-master': {'short': 'Salt Master', 'description': 'Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'freeipa-trust': {'short': 'FreeIPA trust setup', 'description': 'FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'svn': {'short': 'Subversion', 'description': 'The custom, unencrypted protocol used the Subversion Version Control System.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'squid': {'short': 'squid', 'description': 'Squid HTTP proxy server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'rsh': {'short': 'rsh', 'description': 'Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'dns': {'short': 'DNS', 'description': 'The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'smtp': {'short': 'Mail (SMTP)', 'description': "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'openvpn': {'short': 'OpenVPN', 'description': 'OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'telnet': {'short': 'Telnet', 'description': 'Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'freeipa-ldaps': {'short': 'FreeIPA with LDAPS', 'description': "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAPS protocol. You can also enable the 'freeipa-ldap' service if you want to provide the LDAP protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'amqps': {'short': 'amqps', 'description': 'The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'imap': {'short': 'IMAP', 'description': 'The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'etcd-client': {'short': 'etcd Client', 'description': 'etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'freeipa-ldap': {'short': 'FreeIPA with LDAP', 'description': "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAP protocol. You can also enable the 'freeipa-ldaps' service if you want to provide the LDAPS protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ipp-client': {'short': 'Network Printing Client (IPP)', 'description': 'The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'proxy-dhcp': {'short': 'Proxy DHCP', 'description': 'PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'amanda-client': {'short': 'Amanda Backup Client', 'description': 'The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.', 'source_ports': [], 'modules': ['amanda'], 'version': '', 'protocols': []}, 'slp': {'short': 'SLP', 'description': 'The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'dhcpv6': {'short': 'DHCPv6', 'description': 'This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'klogin': {'short': 'klogin', 'description': 'The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'privoxy': {'short': 'Privoxy - A Privacy Enhancing Proxy Server', 'description': 'Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'lightning-network': {'short': 'Lightning Network', 'description': 'The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'samba-dc': {'short': 'Samba DC', 'description': 'This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.', 'source_ports': [], 'modules': ['netbios-ns'], 'version': '', 'protocols': []}, 'syncthing-gui': {'short': 'Syncthing GUI', 'description': 'Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'kpasswd': {'short': 'Kpasswd', 'description': 'Kerberos password (Kpasswd) server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'wsmans': {'short': 'wsmans', 'description': 'Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'distcc': {'short': 'distcc', 'description': 'Distcc is a protocol used for distributed compilation.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'mqtt-tls': {'short': 'mqtt-tls', 'description': 'The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'RH-Satellite-6': {'short': 'Red Hat Satellite 6', 'description': 'Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ceph': {'short': 'ceph', 'description': "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'bacula': {'short': 'Bacula', 'description': 'Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'bgp': {'short': 'BGP service listen', 'description': 'Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'https': {'short': 'Secure WWW (HTTPS)', 'description': 'HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'amqp': {'short': 'amqp', 'description': 'The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'high-availability': {'short': 'Red Hat High Availability', 'description': 'This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'gre': {'short': '', 'description': '', 'source_ports': [], 'modules': ['proto-gre'], 'version': '', 'protocols': ['gre']}, 'cfengine': {'short': 'CFEngine', 'description': 'CFEngine server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'samba-client': {'short': 'Samba Client', 'description': 'This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.', 'source_ports': [], 'modules': ['netbios-ns'], 'version': '', 'protocols': []}, 'kerberos': {'short': 'Kerberos', 'description': 'Kerberos network authentication protocol server', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'spideroak-lansync': {'short': 'SpiderOak ONE LAN-Sync', 'description': 'SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'mongodb': {'short': 'mongodb', 'description': 'MongoDB is a free and open-source cross-platform document-oriented database program.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'zabbix-server': {'short': 'Zabbix Server', 'description': 'Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'smtp-submission': {'short': 'Mail (SMTP-Submission)', 'description': 'SMTP-Submission allows remote users to submit mail over port 587.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'libvirt': {'short': 'Virtual Machine Management', 'description': 'Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'sip': {'short': 'SIP', 'description': 'The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.', 'source_ports': [], 'modules': ['sip'], 'version': '', 'protocols': []}, 'rsyncd': {'short': 'Rsync in daemon mode', 'description': 'Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'bitcoin-rpc': {'short': 'Bitcoin RPC', 'description': 'Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'audit': {'short': 'Audit', 'description': 'The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'pulseaudio': {'short': 'PulseAudio', 'description': 'A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'jenkins': {'short': 'jenkins', 'description': 'Jenkins is an open source automation server written in Java.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'dhcp': {'short': 'DHCP', 'description': 'This allows a DHCP server to accept messages from DHCP clients and relay agents.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'wbem-https': {'short': 'wbem-https', 'description': 'Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'steam-streaming': {'short': 'Steam In-Home Streaming', 'description': "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}, 'ctdb': {'short': 'CTDB', 'description': 'CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.', 'source_ports': [], 'modules': [], 'version': '', 'protocols': []}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "modules": [], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "modules": [ "amanda" ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "modules": [], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "modules": [], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "modules": [], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "modules": [], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "modules": [], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "modules": [], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "modules": [], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "modules": [], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "modules": [], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "modules": [], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "modules": [], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "modules": [], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "modules": [], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "modules": [], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "modules": [], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "modules": [], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "modules": [], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "modules": [], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "modules": [], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "modules": [], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "modules": [], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "modules": [], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "modules": [], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "modules": [], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "modules": [], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAP protocol. You can also enable the 'freeipa-ldaps' service if you want to provide the LDAPS protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAP", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you plan to provide a FreeIPA Domain Controller using the LDAPS protocol. You can also enable the 'freeipa-ldap' service if you want to provide the LDAP protocol. Enable the 'dns' service if this FreeIPA server provides DNS services and 'freeipa-replication' service if this FreeIPA server is part of a multi-master replication setup.", "modules": [], "protocols": [], "short": "FreeIPA with LDAPS", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option if you want to enable LDAP replication between FreeIPA servers.", "modules": [], "protocols": [], "short": "FreeIPA replication", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "modules": [], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "modules": [ "ftp" ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "modules": [], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "modules": [], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "modules": [], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gre": { "description": "", "modules": [ "proto-gre" ], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "modules": [], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "modules": [], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "modules": [], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "modules": [], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "modules": [], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.", "modules": [], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "modules": [], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "modules": [], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "modules": [], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "modules": [], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "modules": [], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "modules": [], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "modules": [], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "modules": [], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "modules": [], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "modules": [], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "modules": [], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "modules": [], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "modules": [], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "modules": [], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "modules": [], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": "LLMNR allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link.", "modules": [], "protocols": [], "short": "Link-Local Multicast Name Resolution (LLMNR)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "modules": [], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "modules": [], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "modules": [], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "modules": [], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "modules": [], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "modules": [], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "modules": [], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "modules": [], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "modules": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "modules": [], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "modules": [], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "modules": [], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "modules": [], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "modules": [], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "modules": [], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "modules": [], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "modules": [], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "modules": [], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "modules": [], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "modules": [], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": " Plex Media Server (PMS) is the back-end media server component of Plex. It organizes audio (music) and visual (photos and videos) content from personal media libraries and streams it to their player counterparts, either on the same machine, the same local area network, or over the Internet. ", "modules": [], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "modules": [], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "modules": [], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "modules": [], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "modules": [], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "modules": [], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "modules": [], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "modules": [], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "modules": [], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "modules": [], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "modules": [], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "modules": [], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "modules": [], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "modules": [], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "modules": [], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "modules": [ "netbios-ns" ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "modules": [ "sane" ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "modules": [ "sip" ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "modules": [], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "modules": [], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "modules": [], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "modules": [], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "modules": [], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "modules": [], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "modules": [], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "modules": [], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "modules": [], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "modules": [], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "modules": [], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a Peer-to-Peer file synchronization service. Enable this option, if you plan to run the Synthing service.", "modules": [], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "modules": [], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "modules": [], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "modules": [], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "modules": [], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "modules": [], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "modules": [ "tftp" ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tftp-client": { "description": "This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.", "modules": [ "tftp" ], "protocols": [], "short": "TFTP Client", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "modules": [], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "modules": [], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "modules": [], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "modules": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "modules": [], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "modules": [], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "modules": [], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "modules": [], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "modules": [], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "modules": [], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "modules": [], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "modules": [], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "modules": [], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "modules": [], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "modules": [], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-server": { "description": "Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.", "modules": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'ftp': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_ftp', 'version': '', 'port': [['21', 'tcp']]}, 'sip': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_sip', 'version': '', 'port': [['5060', 'tcp'], ['5060', 'udp']]}, 'pptp': {'short': '', 'description': '', 'family': 'ipv4', 'module': 'nf_conntrack_pptp', 'version': '', 'port': [['1723', 'tcp']]}, 'snmp': {'short': '', 'description': '', 'family': 'ipv4', 'module': 'nf_conntrack_snmp', 'version': '', 'port': [['161', 'udp']]}, 'proto-gre': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_proto_gre', 'version': '', 'port': []}, 'h323': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_h323', 'version': '', 'port': []}, 'sane': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_sane', 'version': '', 'port': [['6566', 'tcp']]}, 'RAS': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_h323', 'version': '', 'port': [['1719', 'udp']]}, 'netbios-ns': {'short': '', 'description': '', 'family': 'ipv4', 'module': 'nf_conntrack_netbios_ns', 'version': '', 'port': [['137', 'udp']]}, 'irc': {'short': '', 'description': '', 'family': 'ipv4', 'module': 'nf_conntrack_irc', 'version': '', 'port': [['194', 'tcp']]}, 'amanda': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_amanda', 'version': '', 'port': [['10080', 'udp']]}, 'tftp': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_tftp', 'version': '', 'port': [['69', 'udp']]}, 'Q.931': {'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_h323', 'version': '', 'port': [['1720', 'tcp']]}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'ip-header-bad': {'destination': ['ipv4'], 'short': 'Ip Header Bad', 'version': '', 'description': 'This error message is sent if the IP header is bad.'}, 'protocol-unreachable': {'destination': ['ipv4'], 'short': 'Protocol Unreachable', 'version': '', 'description': 'This message is sent if the destination protocol is unreachable.'}, 'unknown-header-type': {'destination': ['ipv6'], 'short': 'Unknown Header Type', 'version': '', 'description': 'This error message is sent if an unrecognized Next Header type encountered.'}, 'timestamp-request': {'destination': ['ipv4'], 'short': 'Timestamp Request', 'version': '', 'description': 'This message is used for time synchronization.'}, 'neighbour-advertisement': {'destination': ['ipv6'], 'short': 'Neighbour Advertisement (Neighbor Advertisement)', 'version': '', 'description': 'This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.'}, 'router-solicitation': {'destination': [], 'short': 'Router Solicitation', 'version': '', 'description': 'This message is used by a host attached to a multicast link to request a Router Advertisement.'}, 'tos-network-unreachable': {'destination': ['ipv4'], 'short': 'TOS Network Unreachable', 'version': '', 'description': 'This error message is sent if the network is unreachable for the type of service.'}, 'beyond-scope': {'destination': ['ipv6'], 'short': 'Beyond Scope', 'version': '', 'description': 'This error message is sent if transmitting a package whould cross a zone boundary of the scope of the source address.'}, 'host-unreachable': {'destination': ['ipv4'], 'short': 'Host Unreachable', 'version': '', 'description': 'This error message is sent if the destination host is unreachable.'}, 'echo-reply': {'destination': [], 'short': 'Echo Reply (pong)', 'version': '', 'description': 'This message is the answer to an Echo Request.'}, 'bad-header': {'destination': ['ipv6'], 'short': 'Bad Header', 'version': '', 'description': 'This error message is created if there has been an error in the header of a packet.'}, 'host-redirect': {'destination': ['ipv4'], 'short': 'Host Redirect', 'version': '', 'description': 'This message is sent if the datagram is redirected for the host.'}, 'redirect': {'destination': [], 'short': 'Redirect', 'version': '', 'description': 'This error message informs a host to send packets on another route.'}, 'source-quench': {'destination': ['ipv4'], 'short': 'Source Quench', 'version': '', 'description': 'This error message is generated to tell a host to reduce the pace at which it is sending packets.'}, 'packet-too-big': {'destination': ['ipv6'], 'short': 'Packet Too Big', 'version': '', 'description': 'This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.'}, 'ttl-zero-during-reassembly': {'destination': ['ipv4', 'ipv6'], 'short': 'TTL Zero During Reassembly', 'version': '', 'description': 'This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.'}, 'host-prohibited': {'destination': ['ipv4'], 'short': 'Host Prohibited', 'version': '', 'description': 'This error message is sent if access from a host administratively prohibited.'}, 'tos-host-redirect': {'destination': ['ipv4'], 'short': 'TOS Host Redirect', 'version': '', 'description': 'This message is the datagram is redirected for the type of service and host.'}, 'network-unreachable': {'destination': ['ipv4'], 'short': 'Network Unreachable', 'version': '', 'description': 'This message is sent if the destination network is unreachable.'}, 'echo-request': {'destination': [], 'short': 'Echo Request (ping)', 'version': '', 'description': 'This message is used to test if a host is reachable mostly with the ping utility.'}, 'port-unreachable': {'destination': ['ipv4', 'ipv6'], 'short': 'Port Unreachable', 'version': '', 'description': 'This error message is sent if the port unreachable.'}, 'time-exceeded': {'destination': [], 'short': 'Time Exceeded', 'version': '', 'description': 'This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.'}, 'tos-network-redirect': {'destination': ['ipv4'], 'short': 'TOS Network Redirect', 'version': '', 'description': 'This message is sent if the datagram is redirected for the type of service and network.'}, 'no-route': {'destination': ['ipv6'], 'short': 'No Route', 'version': '', 'description': 'This error message is set if there is no route to the destination.'}, 'host-precedence-violation': {'destination': ['ipv4'], 'short': 'Host Precedence Violation', 'version': '', 'description': 'This error message is sent if the communication administratively prohibited.'}, 'fragmentation-needed': {'destination': ['ipv4'], 'short': 'Fragmentation Needed', 'version': '', 'description': 'This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.'}, 'failed-policy': {'destination': ['ipv6'], 'short': 'Failed Policy', 'version': '', 'description': 'This error message is generated if the source address failed ingress/egress policy.'}, 'required-option-missing': {'destination': ['ipv4'], 'short': 'Required Option Missing', 'version': '', 'description': 'This message is sent if a required option is missing.'}, 'network-unknown': {'destination': ['ipv4'], 'short': 'Network Unknown', 'version': '', 'description': 'This message is sent if the destination network is unknown.'}, 'unknown-option': {'destination': ['ipv6'], 'short': 'Unknown Option', 'version': '', 'description': 'This error message is sent if an unrecognized IPv6 option encountered.'}, 'timestamp-reply': {'destination': ['ipv4'], 'short': 'Timestamp Reply', 'version': '', 'description': 'This message is used to reply to a timestamp message.'}, 'network-prohibited': {'destination': ['ipv4'], 'short': 'Network Prohibited', 'version': '', 'description': 'This message is sent if the network is administratively prohibited.'}, 'network-redirect': {'destination': ['ipv4'], 'short': 'Network Redirect', 'version': '', 'description': 'This message is sent if the datagram is redirected for the network.'}, 'ttl-zero-during-transit': {'destination': ['ipv4', 'ipv6'], 'short': 'TTL Zero During Transit', 'version': '', 'description': 'This error message is sent if the time to live exceeded in transit.'}, 'neighbour-solicitation': {'destination': ['ipv6'], 'short': 'Neighbour Solicitation (Neighbor Solicitation)', 'version': '', 'description': 'This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.'}, 'reject-route': {'destination': ['ipv6'], 'short': 'Reject Route', 'version': '', 'description': 'This error message is sent if the route to destination is rejected.'}, 'host-unknown': {'destination': ['ipv4'], 'short': 'Host Unknown', 'version': '', 'description': 'This error message is sent if the destination host is unknown.'}, 'precedence-cutoff': {'destination': ['ipv4'], 'short': 'Precedence Cutoff', 'version': '', 'description': 'This message is sent if the precedence is lower than the required minimum.'}, 'source-route-failed': {'destination': ['ipv4'], 'short': 'Source Route Failed', 'version': '', 'description': 'This message is sent if the source route has failed.'}, 'destination-unreachable': {'destination': [], 'short': 'Destination Unreachable', 'version': '', 'description': 'This error message is generated by a host or gateway if the destination is not reachable.'}, 'parameter-problem': {'destination': [], 'short': 'Parameter Problem', 'version': '', 'description': 'This error message is generated if the IP header is bad, either by a missing option or bad length.'}, 'address-unreachable': {'destination': ['ipv6'], 'short': 'Address Unreachable', 'version': '', 'description': 'This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.'}, 'tos-host-unreachable': {'destination': ['ipv4'], 'short': 'TOS Host Unreachable', 'version': '', 'description': 'This message is sent if the host is unreachable for the type of service.'}, 'communication-prohibited': {'destination': ['ipv4', 'ipv6'], 'short': 'Communication Prohibited', 'version': '', 'description': 'This error message is sent if communication with destination administratively prohibited.'}, 'router-advertisement': {'destination': [], 'short': 'Router Advertisement', 'version': '', 'description': 'This message is used by routers to periodically announce the IP address of a multicast interface.'}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package whould cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [Fail if custom firewall_config is not its previous value] **************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:111 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.132) 0:00:13.973 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_config.custom != __previous_firewall_config.custom", "skip_reason": "Conditional result was False" } TASK [Fail if default zone differs] ******************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:116 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.012) 0:00:13.985 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_config.default_zone != __previous_firewall_config.default_zone", "skip_reason": "Conditional result was False" } TASK [Cleanup] ***************************************************************** task path: /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:122 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.010) 0:00:13.996 ********** TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.045) 0:00:14.041 ********** included: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.017) 0:00:14.059 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.022) 0:00:14.081 ********** skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 25 May 2024 06:19:28 +0000 (0:00:00.012) 0:00:14.094 ********** skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.012) 0:00:14.106 ********** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.303) 0:00:14.410 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.017) 0:00:14.427 ********** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.019) 0:00:14.447 ********** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ActiveEnterTimestampMonotonic": "2775005940", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "dbus.service basic.target polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-05-25 06:19:17 UTC", "AssertTimestampMonotonic": "2774474209", "Before": "network-pre.target multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ConditionTimestampMonotonic": "2774474208", "Conflicts": "shutdown.target ebtables.service ipset.service iptables.service ip6tables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11823", "ExecMainStartTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ExecMainStartTimestampMonotonic": "2774476162", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-05-25 06:19:17 UTC] ; stop_time=[n/a] ; pid=11823 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-05-25 06:19:17 UTC", "InactiveExitTimestampMonotonic": "2774476202", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11823", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-05-25 06:19:17 UTC", "WatchdogTimestampMonotonic": "2775005883", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.201) 0:00:14.648 ********** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ActiveEnterTimestampMonotonic": "2775005940", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "dbus.service basic.target polkit.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-05-25 06:19:17 UTC", "AssertTimestampMonotonic": "2774474209", "Before": "network-pre.target multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ConditionTimestampMonotonic": "2774474208", "Conflicts": "shutdown.target ebtables.service ipset.service iptables.service ip6tables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11823", "ExecMainStartTimestamp": "Sat 2024-05-25 06:19:17 UTC", "ExecMainStartTimestampMonotonic": "2774476162", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-05-25 06:19:17 UTC] ; stop_time=[n/a] ; pid=11823 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-05-25 06:19:17 UTC", "InactiveExitTimestampMonotonic": "2774476202", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11823", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-05-25 06:19:17 UTC", "WatchdogTimestampMonotonic": "2775005883", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.199) 0:00:14.848 ********** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.025) 0:00:14.873 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.016) 0:00:14.890 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.016) 0:00:14.907 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.021) 0:00:14.928 ********** skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.020) 0:00:14.949 ********** skipping: [sut] => { "changed": false, "false_condition": "'detailed' in fw[0]", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.021) 0:00:14.970 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.018) 0:00:14.988 ********** skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.017) 0:00:15.006 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.016) 0:00:15.022 ********** skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.017) 0:00:15.040 ********** skipping: [sut] => { "false_condition": "__firewall_previous_replaced | bool" } PLAY RECAP ********************************************************************* sut : ok=42 changed=2 unreachable=0 failed=0 skipped=73 rescued=0 ignored=0 Saturday 25 May 2024 06:19:29 +0000 (0:00:00.024) 0:00:15.065 ********** =============================================================================== fedora.linux_system_roles.firewall : Gather firewall config information --- 3.34s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 fedora.linux_system_roles.firewall : Get config files, checksums before and remove --- 1.64s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.93s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Gathering Facts --------------------------------------------------------- 0.92s /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:2 ---------------- Modify firewalld configuration ------------------------------------------ 0.72s /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:56 --------------- fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.56s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 Get default zone -------------------------------------------------------- 0.48s /WORKDIR/git-weekly-cixjrs7z3g/tests/tests_firewall_fact.yml:15 --------------- fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.40s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Gather firewall config if no arguments --- 0.40s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 fedora.linux_system_roles.firewall : Gather firewall config if no arguments --- 0.39s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.33s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.31s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.30s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.30s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 fedora.linux_system_roles.firewall : Get config files, checksums after --- 0.26s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.20s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.20s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.20s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.20s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.20s /WORKDIR/git-weekly-cixjrs7z3g/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [DEPRECATION WARNING]: ANSIBLE_COLLECTIONS_PATHS option, does not fit var naming standard, use the singular form ANSIBLE_COLLECTIONS_PATH instead. This feature will be removed from ansible-core in version 2.19. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. ---^---^---^---^---^---