# STDOUT: ---v---v---v---v---v--- ansible-playbook [core 2.17.2] config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.17/lib/python3.11/site-packages/ansible ansible collection location = /WORKDIR/git-weekly-cin8oy7k7n/.collection executable location = /opt/ansible-2.17/bin/ansible-playbook python version = 3.11.5 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] (/opt/ansible-2.17/bin/python) jinja version = 3.1.4 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_firewall_fact.yml ********************************************** 1 plays in /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml PLAY [Test firewall ansible fact] ********************************************** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:2 Saturday 10 August 2024 05:27:48 +0000 (0:00:00.023) 0:00:00.023 ******* ok: [sut] TASK [Start with default configuration] **************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:8 Saturday 10 August 2024 05:27:49 +0000 (0:00:00.997) 0:00:01.020 ******* included: fedora.linux_system_roles.firewall for sut TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 10 August 2024 05:27:49 +0000 (0:00:00.033) 0:00:01.054 ******* included: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 10 August 2024 05:27:49 +0000 (0:00:00.019) 0:00:01.073 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 10 August 2024 05:27:49 +0000 (0:00:00.018) 0:00:01.092 ******* ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 10 August 2024 05:27:49 +0000 (0:00:00.300) 0:00:01.393 ******* ok: [sut] => { "ansible_facts": { "__firewall_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Saturday 10 August 2024 05:27:49 +0000 (0:00:00.018) 0:00:01.411 ******* ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Saturday 10 August 2024 05:27:49 +0000 (0:00:00.237) 0:00:01.649 ******* ok: [sut] => { "ansible_facts": { "__firewall_is_transactional": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Saturday 10 August 2024 05:27:49 +0000 (0:00:00.034) 0:00:01.683 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Saturday 10 August 2024 05:27:52 +0000 (0:00:02.256) 0:00:03.940 ******* skipping: [sut] => { "false_condition": "__firewall_is_transactional | d(false)" } TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Saturday 10 August 2024 05:27:52 +0000 (0:00:00.013) 0:00:03.954 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Saturday 10 August 2024 05:27:52 +0000 (0:00:00.013) 0:00:03.968 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 10 August 2024 05:27:52 +0000 (0:00:00.014) 0:00:03.982 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 10 August 2024 05:27:52 +0000 (0:00:00.012) 0:00:03.995 ******* skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 10 August 2024 05:27:52 +0000 (0:00:00.016) 0:00:04.011 ******* ok: [sut] => { "changed": false, "name": "firewalld", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target dbus.socket polkit.service system.slice dbus-broker.service sysinit.target", "AllowIsolate": "no", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "ConfigurationDirectoryMode": "0755", "Conflicts": "ipset.service shutdown.target ebtables.service ip6tables.service iptables.service nftables.service", "ControlGroupId": "0", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "0", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestampMonotonic": "0", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "[not set]", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "UtmpMode": "init", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "infinity" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 10 August 2024 05:27:52 +0000 (0:00:00.558) 0:00:04.570 ******* changed: [sut] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "dbus-broker.service basic.target dbus.socket system.slice polkit.service sysinit.target", "AllowIsolate": "no", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "ConfigurationDirectoryMode": "0755", "Conflicts": "iptables.service ebtables.service shutdown.target nftables.service ipset.service ip6tables.service", "ControlGroupId": "0", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "0", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "sysinit.target system.slice dbus.socket", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestampMonotonic": "0", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "[not set]", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "UtmpMode": "init", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "infinity" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 10 August 2024 05:27:55 +0000 (0:00:02.181) 0:00:06.752 ******* ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": true, "__firewall_python_cmd": "/usr/bin/python3.12", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 10 August 2024 05:27:55 +0000 (0:00:00.031) 0:00:06.783 ******* ok: [sut] => { "changed": false, "rc": 0 } STDOUT: bb765f21e3a8c95eaabcd06ec2148cd4d16e58f654f8e2fce573b92c2a42ae7e /etc/firewalld/lockdown-whitelist.xml STDERR: OpenSSH_8.7p1, OpenSSL 3.0.7 1 Nov 2022 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf debug2: checking match for 'final all' host 10.31.42.183 originally 10.31.42.183 debug2: match not found debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config debug1: /etc/ssh/ssh_config line 56: Applying options for * debug1: configuration requests final Match pass debug2: resolve_canonicalize: hostname 10.31.42.183 is address debug1: re-parsing configuration debug1: Reading configuration data /etc/ssh/ssh_config debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf debug2: checking match for 'final all' host 10.31.42.183 originally 10.31.42.183 debug2: match found debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config debug1: /etc/ssh/ssh_config line 56: Applying options for * debug1: auto-mux: Trying existing master debug2: fd 3 setting O_NONBLOCK debug2: mux_client_hello_exchange: master version 4 debug1: mux_client_request_session: master session id: 2 debug2: Received exit status from master 0 Shared connection to 10.31.42.183 closed. TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 10 August 2024 05:27:57 +0000 (0:00:02.031) 0:00:08.814 ******* ok: [sut] => { "ansible_facts": { "__firewall_report_changed": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.021) 0:00:08.836 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.020) 0:00:08.856 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.020) 0:00:08.877 ******* skipping: [sut] => { "changed": false, "false_condition": "'detailed' in fw[0]", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.021) 0:00:08.898 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.015) 0:00:08.914 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.021) 0:00:08.936 ******* ok: [sut] => { "changed": false, "rc": 0 } STDERR: OpenSSH_8.7p1, OpenSSL 3.0.7 1 Nov 2022 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf debug2: checking match for 'final all' host 10.31.42.183 originally 10.31.42.183 debug2: match not found debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config debug1: /etc/ssh/ssh_config line 56: Applying options for * debug1: configuration requests final Match pass debug2: resolve_canonicalize: hostname 10.31.42.183 is address debug1: re-parsing configuration debug1: Reading configuration data /etc/ssh/ssh_config debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf debug2: checking match for 'final all' host 10.31.42.183 originally 10.31.42.183 debug2: match found debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config debug1: /etc/ssh/ssh_config line 56: Applying options for * debug1: auto-mux: Trying existing master debug2: fd 3 setting O_NONBLOCK debug2: mux_client_hello_exchange: master version 4 debug1: mux_client_request_session: master session id: 2 debug2: Received exit status from master 0 Shared connection to 10.31.42.183 closed. TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.346) 0:00:09.282 ******* changed: [sut] => { "ansible_facts": { "firewall_lib_result": { "changed": true } }, "changed": true } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.018) 0:00:09.301 ******* skipping: [sut] => { "false_condition": "__firewall_debug | d(false)" } TASK [Get default zone] ******************************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:15 Saturday 10 August 2024 05:27:57 +0000 (0:00:00.015) 0:00:09.316 ******* ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--get-default-zone" ], "delta": "0:00:00.217830", "end": "2024-08-10 05:27:58.065531", "rc": 0, "start": "2024-08-10 05:27:57.847701" } STDOUT: public TASK [Get default ansible fact] ************************************************ task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:22 Saturday 10 August 2024 05:27:58 +0000 (0:00:00.491) 0:00:09.808 ******* included: fedora.linux_system_roles.firewall for sut TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 10 August 2024 05:27:58 +0000 (0:00:00.055) 0:00:09.864 ******* included: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 10 August 2024 05:27:58 +0000 (0:00:00.027) 0:00:09.891 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 10 August 2024 05:27:58 +0000 (0:00:00.068) 0:00:09.959 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 10 August 2024 05:27:58 +0000 (0:00:00.032) 0:00:09.992 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Saturday 10 August 2024 05:27:58 +0000 (0:00:00.024) 0:00:10.016 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Saturday 10 August 2024 05:27:58 +0000 (0:00:00.022) 0:00:10.039 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Saturday 10 August 2024 05:27:58 +0000 (0:00:00.012) 0:00:10.052 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Saturday 10 August 2024 05:28:00 +0000 (0:00:02.115) 0:00:12.167 ******* skipping: [sut] => { "false_condition": "__firewall_is_transactional | d(false)" } TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Saturday 10 August 2024 05:28:00 +0000 (0:00:00.013) 0:00:12.181 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Saturday 10 August 2024 05:28:00 +0000 (0:00:00.013) 0:00:12.195 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 10 August 2024 05:28:00 +0000 (0:00:00.021) 0:00:12.217 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 10 August 2024 05:28:00 +0000 (0:00:00.012) 0:00:12.229 ******* skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 10 August 2024 05:28:00 +0000 (0:00:00.016) 0:00:12.245 ******* ok: [sut] => { "changed": false, "name": "firewalld", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestamp": "Sat 2024-08-10 05:27:55 UTC", "ActiveEnterTimestampMonotonic": "627361673", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service dbus-broker.service basic.target sysinit.target system.slice dbus.socket", "AllowIsolate": "no", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-08-10 05:27:53 UTC", "AssertTimestampMonotonic": "625947144", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "643590000", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ConditionTimestampMonotonic": "625947140", "ConfigurationDirectoryMode": "0755", "Conflicts": "nftables.service shutdown.target ip6tables.service ipset.service iptables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlGroupId": "5701", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5290", "ExecMainStartTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ExecMainStartTimestampMonotonic": "625960114", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-08-10 05:27:53 UTC", "InactiveExitTimestampMonotonic": "625960429", "InvocationID": "46bffcc6387846b1917c4fe16148beeb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "5290", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "35270656", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service dbus-org.fedoraproject.FirewallD1.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestamp": "Sat 2024-08-10 05:27:55 UTC", "StateChangeTimestampMonotonic": "627361673", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "5", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 10 August 2024 05:28:00 +0000 (0:00:00.385) 0:00:12.631 ******* ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestamp": "Sat 2024-08-10 05:27:55 UTC", "ActiveEnterTimestampMonotonic": "627361673", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service dbus-broker.service basic.target sysinit.target system.slice dbus.socket", "AllowIsolate": "no", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-08-10 05:27:53 UTC", "AssertTimestampMonotonic": "625947144", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "643590000", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ConditionTimestampMonotonic": "625947140", "ConfigurationDirectoryMode": "0755", "Conflicts": "nftables.service shutdown.target ip6tables.service ipset.service iptables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlGroupId": "5701", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5290", "ExecMainStartTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ExecMainStartTimestampMonotonic": "625960114", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-08-10 05:27:53 UTC", "InactiveExitTimestampMonotonic": "625960429", "InvocationID": "46bffcc6387846b1917c4fe16148beeb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "5290", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "35270656", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service dbus-org.fedoraproject.FirewallD1.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestamp": "Sat 2024-08-10 05:27:55 UTC", "StateChangeTimestampMonotonic": "627361673", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "5", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.389) 0:00:13.021 ******* ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python3.12", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.022) 0:00:13.044 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.024) 0:00:13.068 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.023) 0:00:13.092 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.037) 0:00:13.130 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.028) 0:00:13.158 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall != None", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.012) 0:00:13.171 ******* ok: [sut] => { "changed": false, "firewall_config": { "default": { "helpers": [ "pptp", "Q.931", "irc", "ftp", "h323", "snmp", "sip", "proto-gre", "tftp", "sane", "amanda", "RAS", "netbios-ns" ], "icmptypes": [ "tos-host-unreachable", "host-unknown", "host-prohibited", "host-unreachable", "failed-policy", "network-prohibited", "source-quench", "unknown-header-type", "router-solicitation", "tos-network-redirect", "tos-host-redirect", "neighbour-solicitation", "timestamp-reply", "ttl-zero-during-reassembly", "redirect", "timestamp-request", "destination-unreachable", "port-unreachable", "host-redirect", "neighbour-advertisement", "precedence-cutoff", "beyond-scope", "protocol-unreachable", "bad-header", "tos-network-unreachable", "host-precedence-violation", "source-route-failed", "packet-too-big", "router-advertisement", "parameter-problem", "network-unknown", "required-option-missing", "network-unreachable", "reject-route", "unknown-option", "ttl-zero-during-transit", "fragmentation-needed", "ip-header-bad", "communication-prohibited", "time-exceeded", "address-unreachable", "no-route", "network-redirect", "echo-request", "echo-reply" ], "policies": [ "allow-host-ipv6" ], "services": [ "transmission-client", "kerberos", "condor-collector", "ircs", "libvirt-tls", "xmpp-server", "tor-socks", "ovirt-imageio", "ssh", "wsmans", "tinc", "statsrv", "iscsi-target", "smtp-submission", "kibana", "ws-discovery-client", "ipfs", "kube-nodeport-services", "snmptls", "dns", "ovirt-vmconsole", "syslog-tls", "pulseaudio", "syncthing", "vdsm", "ganglia-master", "kubelet-worker", "nut", "smtp", "nmea-0183", "xmpp-local", "RH-Satellite-6", "nfs3", "ws-discovery-tcp", "kube-control-plane", "cratedb", "ipp-client", "upnp-client", "irc", "llmnr-client", "dhcpv6", "telnet", "ftp", "netdata-dashboard", "mosh", "https", "ctdb", "syscomlan", "freeipa-4", "cfengine", "foreman", "pop3s", "kube-scheduler-secure", "docker-swarm", "http", "galera", "ovirt-storageconsole", "samba-client", "syncthing-relay", "mqtt-tls", "pmproxy", "amqps", "mountd", "ssdp", "ws-discovery-udp", "quassel", "settlers-history-collection", "docker-registry", "syslog", "pop3", "rsyncd", "redis", "dropbox-lansync", "murmur", "syncthing-gui", "libvirt", "finger", "zabbix-server", "bb", "snmptrap", "tentacle", "svn", "minidlna", "squid", "prometheus-node-exporter", "RH-Satellite-6-capsule", "smtps", "http3", "ps3netsrv", "dds", "llmnr-tcp", "samba-dc", "zabbix-trapper", "bitcoin-testnet", "snmp", "factorio", "ps2link", "dhcp", "cockpit", "steam-streaming", "sip", "prometheus", "zero-k", "redis-sentinel", "wsman", "kube-controller-manager-secure", "lightning-network", "high-availability", "stronghold-crusader", "synergy", "need-for-speed-most-wanted", "vnc-server", "bittorrent-lsd", "freeipa-ldap", "bitcoin", "xmpp-bosh", "stellaris", "kube-control-plane-secure", "0-AD", "ceph", "bareos-storage", "amanda-client", "kube-worker", "kube-apiserver", "rquotad", "pmcd", "mqtt", "zerotier", "anno-1800", "nrpe", "kube-api", "ldaps", "tftp", "bitcoin-rpc", "mssql", "bitcoin-testnet-rpc", "ws-discovery", "samba", "ntp", "amqp", "xmpp-client", "git", "etcd-server", "imaps", "warpinator", "freeipa-trust", "apcupsd", "rpc-bind", "ldap", "audit", "bacula-client", "nbd", "managesieve", "postgresql", "jenkins", "anno-1602", "zabbix-agent", "ausweisapp2", "ident", "llmnr-udp", "pmwebapis", "spideroak-lansync", "kdeconnect", "freeipa-ldaps", "openvpn", "snmptls-trap", "amanda-k5-client", "collectd", "grafana", "kubelet", "kadmin", "ganglia-client", "terraria", "proxy-dhcp", "sane", "civilization-v", "llmnr", "checkmk-agent", "bgp", "radius", "rdp", "bacula", "dds-multicast", "etcd-client", "kube-scheduler", "opentelemetry", "dns-over-tls", "mongodb", "slp", "afp", "elasticsearch", "dds-unicast", "privoxy", "dhcpv6-client", "bareos-director", "kprop", "minecraft", "kubelet-readonly", "mysql", "gre", "ceph-exporter", "gpsd", "imap", "civilization-iv", "nfs", "xdmcp", "ms-wbt", "pmwebapi", "sips", "supertuxkart", "nebula", "zabbix-web-service", "bareos-filedaemon", "ptp", "ipsec", "klogin", "rtsp", "kube-controller-manager", "distcc", "puppetmaster", "plex", "foreman-proxy", "kpasswd", "ceph-mon", "rsh", "tile38", "wireguard", "memcache", "matrix", "netbios-ns", "freeipa-replication", "isns", "wbem-https", "wbem-http", "spotify-sync", "mdns", "salt-master", "zabbix-java-gateway", "ipp", "kshell", "svdrp" ], "zones": [ "internal", "external", "public", "nm-shared", "FedoraWorkstation", "trusted", "drop", "work", "FedoraServer", "home", "block", "dmz" ] }, "default_zone": "public" } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.368) 0:00:13.539 ******* ok: [sut] => { "ansible_facts": { "firewall_config": { "default": { "helpers": [ "pptp", "Q.931", "irc", "ftp", "h323", "snmp", "sip", "proto-gre", "tftp", "sane", "amanda", "RAS", "netbios-ns" ], "icmptypes": [ "tos-host-unreachable", "host-unknown", "host-prohibited", "host-unreachable", "failed-policy", "network-prohibited", "source-quench", "unknown-header-type", "router-solicitation", "tos-network-redirect", "tos-host-redirect", "neighbour-solicitation", "timestamp-reply", "ttl-zero-during-reassembly", "redirect", "timestamp-request", "destination-unreachable", "port-unreachable", "host-redirect", "neighbour-advertisement", "precedence-cutoff", "beyond-scope", "protocol-unreachable", "bad-header", "tos-network-unreachable", "host-precedence-violation", "source-route-failed", "packet-too-big", "router-advertisement", "parameter-problem", "network-unknown", "required-option-missing", "network-unreachable", "reject-route", "unknown-option", "ttl-zero-during-transit", "fragmentation-needed", "ip-header-bad", "communication-prohibited", "time-exceeded", "address-unreachable", "no-route", "network-redirect", "echo-request", "echo-reply" ], "policies": [ "allow-host-ipv6" ], "services": [ "transmission-client", "kerberos", "condor-collector", "ircs", "libvirt-tls", "xmpp-server", "tor-socks", "ovirt-imageio", "ssh", "wsmans", "tinc", "statsrv", "iscsi-target", "smtp-submission", "kibana", "ws-discovery-client", "ipfs", "kube-nodeport-services", "snmptls", "dns", "ovirt-vmconsole", "syslog-tls", "pulseaudio", "syncthing", "vdsm", "ganglia-master", "kubelet-worker", "nut", "smtp", "nmea-0183", "xmpp-local", "RH-Satellite-6", "nfs3", "ws-discovery-tcp", "kube-control-plane", "cratedb", "ipp-client", "upnp-client", "irc", "llmnr-client", "dhcpv6", "telnet", "ftp", "netdata-dashboard", "mosh", "https", "ctdb", "syscomlan", "freeipa-4", "cfengine", "foreman", "pop3s", "kube-scheduler-secure", "docker-swarm", "http", "galera", "ovirt-storageconsole", "samba-client", "syncthing-relay", "mqtt-tls", "pmproxy", "amqps", "mountd", "ssdp", "ws-discovery-udp", "quassel", "settlers-history-collection", "docker-registry", "syslog", "pop3", "rsyncd", "redis", "dropbox-lansync", "murmur", "syncthing-gui", "libvirt", "finger", "zabbix-server", "bb", "snmptrap", "tentacle", "svn", "minidlna", "squid", "prometheus-node-exporter", "RH-Satellite-6-capsule", "smtps", "http3", "ps3netsrv", "dds", "llmnr-tcp", "samba-dc", "zabbix-trapper", "bitcoin-testnet", "snmp", "factorio", "ps2link", "dhcp", "cockpit", "steam-streaming", "sip", "prometheus", "zero-k", "redis-sentinel", "wsman", "kube-controller-manager-secure", "lightning-network", "high-availability", "stronghold-crusader", "synergy", "need-for-speed-most-wanted", "vnc-server", "bittorrent-lsd", "freeipa-ldap", "bitcoin", "xmpp-bosh", "stellaris", "kube-control-plane-secure", "0-AD", "ceph", "bareos-storage", "amanda-client", "kube-worker", "kube-apiserver", "rquotad", "pmcd", "mqtt", "zerotier", "anno-1800", "nrpe", "kube-api", "ldaps", "tftp", "bitcoin-rpc", "mssql", "bitcoin-testnet-rpc", "ws-discovery", "samba", "ntp", "amqp", "xmpp-client", "git", "etcd-server", "imaps", "warpinator", "freeipa-trust", "apcupsd", "rpc-bind", "ldap", "audit", "bacula-client", "nbd", "managesieve", "postgresql", "jenkins", "anno-1602", "zabbix-agent", "ausweisapp2", "ident", "llmnr-udp", "pmwebapis", "spideroak-lansync", "kdeconnect", "freeipa-ldaps", "openvpn", "snmptls-trap", "amanda-k5-client", "collectd", "grafana", "kubelet", "kadmin", "ganglia-client", "terraria", "proxy-dhcp", "sane", "civilization-v", "llmnr", "checkmk-agent", "bgp", "radius", "rdp", "bacula", "dds-multicast", "etcd-client", "kube-scheduler", "opentelemetry", "dns-over-tls", "mongodb", "slp", "afp", "elasticsearch", "dds-unicast", "privoxy", "dhcpv6-client", "bareos-director", "kprop", "minecraft", "kubelet-readonly", "mysql", "gre", "ceph-exporter", "gpsd", "imap", "civilization-iv", "nfs", "xdmcp", "ms-wbt", "pmwebapi", "sips", "supertuxkart", "nebula", "zabbix-web-service", "bareos-filedaemon", "ptp", "ipsec", "klogin", "rtsp", "kube-controller-manager", "distcc", "puppetmaster", "plex", "foreman-proxy", "kpasswd", "ceph-mon", "rsh", "tile38", "wireguard", "memcache", "matrix", "netbios-ns", "freeipa-replication", "isns", "wbem-https", "wbem-http", "spotify-sync", "mdns", "salt-master", "zabbix-java-gateway", "ipp", "kshell", "svdrp" ], "zones": [ "internal", "external", "public", "nm-shared", "FedoraWorkstation", "trusted", "drop", "work", "FedoraServer", "home", "block", "dmz" ] }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.024) 0:00:13.564 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.015) 0:00:13.579 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.012) 0:00:13.592 ******* skipping: [sut] => { "false_condition": "__firewall_previous_replaced | bool" } TASK [Fail if firewall_config is undefined] ************************************ task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:28 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.014) 0:00:13.606 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_config is undefined", "skip_reason": "Conditional result was False" } TASK [Fail if firewall_config custom exists] *********************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:33 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.012) 0:00:13.619 ******* skipping: [sut] => { "changed": false, "false_condition": "'custom' in firewall_config", "skip_reason": "Conditional result was False" } TASK [Fail if firewall_config defaults do not have attributes] ***************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:38 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.009) 0:00:13.628 ******* skipping: [sut] => (item={'key': 'zones', 'value': ['internal', 'external', 'public', 'nm-shared', 'FedoraWorkstation', 'trusted', 'drop', 'work', 'FedoraServer', 'home', 'block', 'dmz']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "zones", "value": [ "internal", "external", "public", "nm-shared", "FedoraWorkstation", "trusted", "drop", "work", "FedoraServer", "home", "block", "dmz" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'key': 'services', 'value': ['transmission-client', 'kerberos', 'condor-collector', 'ircs', 'libvirt-tls', 'xmpp-server', 'tor-socks', 'ovirt-imageio', 'ssh', 'wsmans', 'tinc', 'statsrv', 'iscsi-target', 'smtp-submission', 'kibana', 'ws-discovery-client', 'ipfs', 'kube-nodeport-services', 'snmptls', 'dns', 'ovirt-vmconsole', 'syslog-tls', 'pulseaudio', 'syncthing', 'vdsm', 'ganglia-master', 'kubelet-worker', 'nut', 'smtp', 'nmea-0183', 'xmpp-local', 'RH-Satellite-6', 'nfs3', 'ws-discovery-tcp', 'kube-control-plane', 'cratedb', 'ipp-client', 'upnp-client', 'irc', 'llmnr-client', 'dhcpv6', 'telnet', 'ftp', 'netdata-dashboard', 'mosh', 'https', 'ctdb', 'syscomlan', 'freeipa-4', 'cfengine', 'foreman', 'pop3s', 'kube-scheduler-secure', 'docker-swarm', 'http', 'galera', 'ovirt-storageconsole', 'samba-client', 'syncthing-relay', 'mqtt-tls', 'pmproxy', 'amqps', 'mountd', 'ssdp', 'ws-discovery-udp', 'quassel', 'settlers-history-collection', 'docker-registry', 'syslog', 'pop3', 'rsyncd', 'redis', 'dropbox-lansync', 'murmur', 'syncthing-gui', 'libvirt', 'finger', 'zabbix-server', 'bb', 'snmptrap', 'tentacle', 'svn', 'minidlna', 'squid', 'prometheus-node-exporter', 'RH-Satellite-6-capsule', 'smtps', 'http3', 'ps3netsrv', 'dds', 'llmnr-tcp', 'samba-dc', 'zabbix-trapper', 'bitcoin-testnet', 'snmp', 'factorio', 'ps2link', 'dhcp', 'cockpit', 'steam-streaming', 'sip', 'prometheus', 'zero-k', 'redis-sentinel', 'wsman', 'kube-controller-manager-secure', 'lightning-network', 'high-availability', 'stronghold-crusader', 'synergy', 'need-for-speed-most-wanted', 'vnc-server', 'bittorrent-lsd', 'freeipa-ldap', 'bitcoin', 'xmpp-bosh', 'stellaris', 'kube-control-plane-secure', '0-AD', 'ceph', 'bareos-storage', 'amanda-client', 'kube-worker', 'kube-apiserver', 'rquotad', 'pmcd', 'mqtt', 'zerotier', 'anno-1800', 'nrpe', 'kube-api', 'ldaps', 'tftp', 'bitcoin-rpc', 'mssql', 'bitcoin-testnet-rpc', 'ws-discovery', 'samba', 'ntp', 'amqp', 'xmpp-client', 'git', 'etcd-server', 'imaps', 'warpinator', 'freeipa-trust', 'apcupsd', 'rpc-bind', 'ldap', 'audit', 'bacula-client', 'nbd', 'managesieve', 'postgresql', 'jenkins', 'anno-1602', 'zabbix-agent', 'ausweisapp2', 'ident', 'llmnr-udp', 'pmwebapis', 'spideroak-lansync', 'kdeconnect', 'freeipa-ldaps', 'openvpn', 'snmptls-trap', 'amanda-k5-client', 'collectd', 'grafana', 'kubelet', 'kadmin', 'ganglia-client', 'terraria', 'proxy-dhcp', 'sane', 'civilization-v', 'llmnr', 'checkmk-agent', 'bgp', 'radius', 'rdp', 'bacula', 'dds-multicast', 'etcd-client', 'kube-scheduler', 'opentelemetry', 'dns-over-tls', 'mongodb', 'slp', 'afp', 'elasticsearch', 'dds-unicast', 'privoxy', 'dhcpv6-client', 'bareos-director', 'kprop', 'minecraft', 'kubelet-readonly', 'mysql', 'gre', 'ceph-exporter', 'gpsd', 'imap', 'civilization-iv', 'nfs', 'xdmcp', 'ms-wbt', 'pmwebapi', 'sips', 'supertuxkart', 'nebula', 'zabbix-web-service', 'bareos-filedaemon', 'ptp', 'ipsec', 'klogin', 'rtsp', 'kube-controller-manager', 'distcc', 'puppetmaster', 'plex', 'foreman-proxy', 'kpasswd', 'ceph-mon', 'rsh', 'tile38', 'wireguard', 'memcache', 'matrix', 'netbios-ns', 'freeipa-replication', 'isns', 'wbem-https', 'wbem-http', 'spotify-sync', 'mdns', 'salt-master', 'zabbix-java-gateway', 'ipp', 'kshell', 'svdrp']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "services", "value": [ "transmission-client", "kerberos", "condor-collector", "ircs", "libvirt-tls", "xmpp-server", "tor-socks", "ovirt-imageio", "ssh", "wsmans", "tinc", "statsrv", "iscsi-target", "smtp-submission", "kibana", "ws-discovery-client", "ipfs", "kube-nodeport-services", "snmptls", "dns", "ovirt-vmconsole", "syslog-tls", "pulseaudio", "syncthing", "vdsm", "ganglia-master", "kubelet-worker", "nut", "smtp", "nmea-0183", "xmpp-local", "RH-Satellite-6", "nfs3", "ws-discovery-tcp", "kube-control-plane", "cratedb", "ipp-client", "upnp-client", "irc", "llmnr-client", "dhcpv6", "telnet", "ftp", "netdata-dashboard", "mosh", "https", "ctdb", "syscomlan", "freeipa-4", "cfengine", "foreman", "pop3s", "kube-scheduler-secure", "docker-swarm", "http", "galera", "ovirt-storageconsole", "samba-client", "syncthing-relay", "mqtt-tls", "pmproxy", "amqps", "mountd", "ssdp", "ws-discovery-udp", "quassel", "settlers-history-collection", "docker-registry", "syslog", "pop3", "rsyncd", "redis", "dropbox-lansync", "murmur", "syncthing-gui", "libvirt", "finger", "zabbix-server", "bb", "snmptrap", "tentacle", "svn", "minidlna", "squid", "prometheus-node-exporter", "RH-Satellite-6-capsule", "smtps", "http3", "ps3netsrv", "dds", "llmnr-tcp", "samba-dc", "zabbix-trapper", "bitcoin-testnet", "snmp", "factorio", "ps2link", "dhcp", "cockpit", "steam-streaming", "sip", "prometheus", "zero-k", "redis-sentinel", "wsman", "kube-controller-manager-secure", "lightning-network", "high-availability", "stronghold-crusader", "synergy", "need-for-speed-most-wanted", "vnc-server", "bittorrent-lsd", "freeipa-ldap", "bitcoin", "xmpp-bosh", "stellaris", "kube-control-plane-secure", "0-AD", "ceph", "bareos-storage", "amanda-client", "kube-worker", "kube-apiserver", "rquotad", "pmcd", "mqtt", "zerotier", "anno-1800", "nrpe", "kube-api", "ldaps", "tftp", "bitcoin-rpc", "mssql", "bitcoin-testnet-rpc", "ws-discovery", "samba", "ntp", "amqp", "xmpp-client", "git", "etcd-server", "imaps", "warpinator", "freeipa-trust", "apcupsd", "rpc-bind", "ldap", "audit", "bacula-client", "nbd", "managesieve", "postgresql", "jenkins", "anno-1602", "zabbix-agent", "ausweisapp2", "ident", "llmnr-udp", "pmwebapis", "spideroak-lansync", "kdeconnect", "freeipa-ldaps", "openvpn", "snmptls-trap", "amanda-k5-client", "collectd", "grafana", "kubelet", "kadmin", "ganglia-client", "terraria", "proxy-dhcp", "sane", "civilization-v", "llmnr", "checkmk-agent", "bgp", "radius", "rdp", "bacula", "dds-multicast", "etcd-client", "kube-scheduler", "opentelemetry", "dns-over-tls", "mongodb", "slp", "afp", "elasticsearch", "dds-unicast", "privoxy", "dhcpv6-client", "bareos-director", "kprop", "minecraft", "kubelet-readonly", "mysql", "gre", "ceph-exporter", "gpsd", "imap", "civilization-iv", "nfs", "xdmcp", "ms-wbt", "pmwebapi", "sips", "supertuxkart", "nebula", "zabbix-web-service", "bareos-filedaemon", "ptp", "ipsec", "klogin", "rtsp", "kube-controller-manager", "distcc", "puppetmaster", "plex", "foreman-proxy", "kpasswd", "ceph-mon", "rsh", "tile38", "wireguard", "memcache", "matrix", "netbios-ns", "freeipa-replication", "isns", "wbem-https", "wbem-http", "spotify-sync", "mdns", "salt-master", "zabbix-java-gateway", "ipp", "kshell", "svdrp" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'key': 'icmptypes', 'value': ['tos-host-unreachable', 'host-unknown', 'host-prohibited', 'host-unreachable', 'failed-policy', 'network-prohibited', 'source-quench', 'unknown-header-type', 'router-solicitation', 'tos-network-redirect', 'tos-host-redirect', 'neighbour-solicitation', 'timestamp-reply', 'ttl-zero-during-reassembly', 'redirect', 'timestamp-request', 'destination-unreachable', 'port-unreachable', 'host-redirect', 'neighbour-advertisement', 'precedence-cutoff', 'beyond-scope', 'protocol-unreachable', 'bad-header', 'tos-network-unreachable', 'host-precedence-violation', 'source-route-failed', 'packet-too-big', 'router-advertisement', 'parameter-problem', 'network-unknown', 'required-option-missing', 'network-unreachable', 'reject-route', 'unknown-option', 'ttl-zero-during-transit', 'fragmentation-needed', 'ip-header-bad', 'communication-prohibited', 'time-exceeded', 'address-unreachable', 'no-route', 'network-redirect', 'echo-request', 'echo-reply']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "icmptypes", "value": [ "tos-host-unreachable", "host-unknown", "host-prohibited", "host-unreachable", "failed-policy", "network-prohibited", "source-quench", "unknown-header-type", "router-solicitation", "tos-network-redirect", "tos-host-redirect", "neighbour-solicitation", "timestamp-reply", "ttl-zero-during-reassembly", "redirect", "timestamp-request", "destination-unreachable", "port-unreachable", "host-redirect", "neighbour-advertisement", "precedence-cutoff", "beyond-scope", "protocol-unreachable", "bad-header", "tos-network-unreachable", "host-precedence-violation", "source-route-failed", "packet-too-big", "router-advertisement", "parameter-problem", "network-unknown", "required-option-missing", "network-unreachable", "reject-route", "unknown-option", "ttl-zero-during-transit", "fragmentation-needed", "ip-header-bad", "communication-prohibited", "time-exceeded", "address-unreachable", "no-route", "network-redirect", "echo-request", "echo-reply" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'key': 'helpers', 'value': ['pptp', 'Q.931', 'irc', 'ftp', 'h323', 'snmp', 'sip', 'proto-gre', 'tftp', 'sane', 'amanda', 'RAS', 'netbios-ns']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "helpers", "value": [ "pptp", "Q.931", "irc", "ftp", "h323", "snmp", "sip", "proto-gre", "tftp", "sane", "amanda", "RAS", "netbios-ns" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'key': 'policies', 'value': ['allow-host-ipv6']}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item | length == 0", "item": { "key": "policies", "value": [ "allow-host-ipv6" ] }, "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [Fail if default zone is not correct] ************************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:44 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.031) 0:00:13.660 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_config.default_zone != __default_zone.stdout", "skip_reason": "Conditional result was False" } TASK [Save default ansible fact value] ***************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:49 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.009) 0:00:13.669 ******* ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Modify firewalld configuration] ****************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:56 Saturday 10 August 2024 05:28:01 +0000 (0:00:00.014) 0:00:13.683 ******* ok: [sut] => { "changed": false, "cmd": "firewall-cmd --permanent --add-service https\nfirewall-cmd --permanent --new-service custom\n", "delta": "0:00:00.476606", "end": "2024-08-10 05:28:02.640427", "rc": 0, "start": "2024-08-10 05:28:02.163821" } STDOUT: success success TASK [Refetch firewall_config] ************************************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:63 Saturday 10 August 2024 05:28:02 +0000 (0:00:00.688) 0:00:14.371 ******* included: fedora.linux_system_roles.firewall for sut TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 10 August 2024 05:28:02 +0000 (0:00:00.035) 0:00:14.407 ******* included: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 10 August 2024 05:28:02 +0000 (0:00:00.026) 0:00:14.434 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 10 August 2024 05:28:02 +0000 (0:00:00.019) 0:00:14.453 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 10 August 2024 05:28:02 +0000 (0:00:00.013) 0:00:14.466 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Saturday 10 August 2024 05:28:02 +0000 (0:00:00.012) 0:00:14.479 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Saturday 10 August 2024 05:28:02 +0000 (0:00:00.013) 0:00:14.492 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Saturday 10 August 2024 05:28:02 +0000 (0:00:00.014) 0:00:14.507 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Saturday 10 August 2024 05:28:04 +0000 (0:00:02.004) 0:00:16.511 ******* skipping: [sut] => { "false_condition": "__firewall_is_transactional | d(false)" } TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Saturday 10 August 2024 05:28:04 +0000 (0:00:00.013) 0:00:16.524 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Saturday 10 August 2024 05:28:04 +0000 (0:00:00.013) 0:00:16.538 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 10 August 2024 05:28:04 +0000 (0:00:00.016) 0:00:16.554 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 10 August 2024 05:28:04 +0000 (0:00:00.011) 0:00:16.566 ******* skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 10 August 2024 05:28:04 +0000 (0:00:00.016) 0:00:16.582 ******* ok: [sut] => { "changed": false, "name": "firewalld", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestamp": "Sat 2024-08-10 05:27:55 UTC", "ActiveEnterTimestampMonotonic": "627361673", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service dbus-broker.service basic.target sysinit.target system.slice dbus.socket", "AllowIsolate": "no", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-08-10 05:27:53 UTC", "AssertTimestampMonotonic": "625947144", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "829840000", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ConditionTimestampMonotonic": "625947140", "ConfigurationDirectoryMode": "0755", "Conflicts": "nftables.service shutdown.target ip6tables.service ipset.service iptables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlGroupId": "5701", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5290", "ExecMainStartTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ExecMainStartTimestampMonotonic": "625960114", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-08-10 05:27:53 UTC", "InactiveExitTimestampMonotonic": "625960429", "InvocationID": "46bffcc6387846b1917c4fe16148beeb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "5290", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "35291136", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service dbus-org.fedoraproject.FirewallD1.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestamp": "Sat 2024-08-10 05:27:55 UTC", "StateChangeTimestampMonotonic": "627361673", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "5", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 10 August 2024 05:28:05 +0000 (0:00:00.394) 0:00:16.977 ******* ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestamp": "Sat 2024-08-10 05:27:55 UTC", "ActiveEnterTimestampMonotonic": "627361673", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service dbus-broker.service basic.target sysinit.target system.slice dbus.socket", "AllowIsolate": "no", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-08-10 05:27:53 UTC", "AssertTimestampMonotonic": "625947144", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "829840000", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ConditionTimestampMonotonic": "625947140", "ConfigurationDirectoryMode": "0755", "Conflicts": "nftables.service shutdown.target ip6tables.service ipset.service iptables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlGroupId": "5701", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5290", "ExecMainStartTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ExecMainStartTimestampMonotonic": "625960114", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-08-10 05:27:53 UTC", "InactiveExitTimestampMonotonic": "625960429", "InvocationID": "46bffcc6387846b1917c4fe16148beeb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "5290", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "35291136", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service dbus-org.fedoraproject.FirewallD1.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestamp": "Sat 2024-08-10 05:27:55 UTC", "StateChangeTimestampMonotonic": "627361673", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "5", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 10 August 2024 05:28:05 +0000 (0:00:00.380) 0:00:17.358 ******* ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python3.12", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 10 August 2024 05:28:05 +0000 (0:00:00.019) 0:00:17.377 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 10 August 2024 05:28:05 +0000 (0:00:00.012) 0:00:17.389 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 10 August 2024 05:28:05 +0000 (0:00:00.011) 0:00:17.401 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 10 August 2024 05:28:05 +0000 (0:00:00.017) 0:00:17.419 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 10 August 2024 05:28:05 +0000 (0:00:00.016) 0:00:17.436 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall != None", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 10 August 2024 05:28:05 +0000 (0:00:00.009) 0:00:17.445 ******* ok: [sut] => { "changed": false, "firewall_config": { "custom": { "services": { "custom": { "description": "", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": [ "pptp", "Q.931", "irc", "ftp", "h323", "snmp", "sip", "proto-gre", "tftp", "sane", "amanda", "RAS", "netbios-ns" ], "icmptypes": [ "tos-host-unreachable", "host-unknown", "host-prohibited", "host-unreachable", "failed-policy", "network-prohibited", "source-quench", "unknown-header-type", "router-solicitation", "tos-network-redirect", "tos-host-redirect", "neighbour-solicitation", "timestamp-reply", "ttl-zero-during-reassembly", "redirect", "timestamp-request", "destination-unreachable", "port-unreachable", "host-redirect", "neighbour-advertisement", "precedence-cutoff", "beyond-scope", "protocol-unreachable", "bad-header", "tos-network-unreachable", "host-precedence-violation", "source-route-failed", "packet-too-big", "router-advertisement", "parameter-problem", "network-unknown", "required-option-missing", "network-unreachable", "reject-route", "unknown-option", "ttl-zero-during-transit", "fragmentation-needed", "ip-header-bad", "communication-prohibited", "time-exceeded", "address-unreachable", "no-route", "network-redirect", "echo-request", "echo-reply" ], "policies": [ "allow-host-ipv6" ], "services": [ "transmission-client", "kerberos", "condor-collector", "ircs", "libvirt-tls", "xmpp-server", "tor-socks", "ovirt-imageio", "ssh", "wsmans", "tinc", "statsrv", "iscsi-target", "smtp-submission", "kibana", "ws-discovery-client", "ipfs", "kube-nodeport-services", "snmptls", "dns", "ovirt-vmconsole", "syslog-tls", "pulseaudio", "syncthing", "vdsm", "ganglia-master", "kubelet-worker", "nut", "smtp", "nmea-0183", "xmpp-local", "RH-Satellite-6", "nfs3", "ws-discovery-tcp", "kube-control-plane", "cratedb", "ipp-client", "upnp-client", "irc", "llmnr-client", "dhcpv6", "telnet", "ftp", "netdata-dashboard", "mosh", "https", "ctdb", "syscomlan", "freeipa-4", "cfengine", "foreman", "pop3s", "kube-scheduler-secure", "docker-swarm", "http", "galera", "ovirt-storageconsole", "samba-client", "syncthing-relay", "mqtt-tls", "pmproxy", "amqps", "mountd", "ssdp", "ws-discovery-udp", "quassel", "settlers-history-collection", "docker-registry", "syslog", "pop3", "rsyncd", "redis", "dropbox-lansync", "murmur", "syncthing-gui", "libvirt", "finger", "zabbix-server", "bb", "snmptrap", "tentacle", "svn", "minidlna", "squid", "prometheus-node-exporter", "RH-Satellite-6-capsule", "smtps", "http3", "ps3netsrv", "dds", "llmnr-tcp", "samba-dc", "zabbix-trapper", "bitcoin-testnet", "snmp", "factorio", "ps2link", "dhcp", "cockpit", "steam-streaming", "sip", "prometheus", "zero-k", "redis-sentinel", "wsman", "kube-controller-manager-secure", "lightning-network", "high-availability", "stronghold-crusader", "synergy", "need-for-speed-most-wanted", "vnc-server", "bittorrent-lsd", "freeipa-ldap", "bitcoin", "xmpp-bosh", "stellaris", "kube-control-plane-secure", "0-AD", "ceph", "bareos-storage", "amanda-client", "kube-worker", "kube-apiserver", "rquotad", "pmcd", "mqtt", "zerotier", "anno-1800", "nrpe", "kube-api", "ldaps", "tftp", "bitcoin-rpc", "mssql", "bitcoin-testnet-rpc", "ws-discovery", "samba", "ntp", "amqp", "xmpp-client", "git", "etcd-server", "imaps", "warpinator", "freeipa-trust", "apcupsd", "rpc-bind", "ldap", "audit", "bacula-client", "nbd", "managesieve", "postgresql", "jenkins", "anno-1602", "zabbix-agent", "ausweisapp2", "ident", "llmnr-udp", "pmwebapis", "spideroak-lansync", "kdeconnect", "freeipa-ldaps", "openvpn", "snmptls-trap", "amanda-k5-client", "collectd", "grafana", "kubelet", "kadmin", "ganglia-client", "terraria", "proxy-dhcp", "sane", "civilization-v", "llmnr", "checkmk-agent", "bgp", "radius", "rdp", "bacula", "dds-multicast", "etcd-client", "kube-scheduler", "opentelemetry", "dns-over-tls", "mongodb", "slp", "afp", "elasticsearch", "dds-unicast", "privoxy", "dhcpv6-client", "bareos-director", "kprop", "minecraft", "kubelet-readonly", "mysql", "gre", "ceph-exporter", "gpsd", "imap", "civilization-iv", "nfs", "xdmcp", "ms-wbt", "pmwebapi", "sips", "supertuxkart", "nebula", "zabbix-web-service", "bareos-filedaemon", "ptp", "ipsec", "klogin", "rtsp", "kube-controller-manager", "distcc", "puppetmaster", "plex", "foreman-proxy", "kpasswd", "ceph-mon", "rsh", "tile38", "wireguard", "memcache", "matrix", "netbios-ns", "freeipa-replication", "isns", "wbem-https", "wbem-http", "spotify-sync", "mdns", "salt-master", "zabbix-java-gateway", "ipp", "kshell", "svdrp" ], "zones": [ "internal", "external", "public", "nm-shared", "FedoraWorkstation", "trusted", "drop", "work", "FedoraServer", "home", "block", "dmz" ] }, "default_zone": "public" } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.324) 0:00:17.770 ******* ok: [sut] => { "ansible_facts": { "firewall_config": { "custom": { "services": { "custom": { "description": "", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": [ "pptp", "Q.931", "irc", "ftp", "h323", "snmp", "sip", "proto-gre", "tftp", "sane", "amanda", "RAS", "netbios-ns" ], "icmptypes": [ "tos-host-unreachable", "host-unknown", "host-prohibited", "host-unreachable", "failed-policy", "network-prohibited", "source-quench", "unknown-header-type", "router-solicitation", "tos-network-redirect", "tos-host-redirect", "neighbour-solicitation", "timestamp-reply", "ttl-zero-during-reassembly", "redirect", "timestamp-request", "destination-unreachable", "port-unreachable", "host-redirect", "neighbour-advertisement", "precedence-cutoff", "beyond-scope", "protocol-unreachable", "bad-header", "tos-network-unreachable", "host-precedence-violation", "source-route-failed", "packet-too-big", "router-advertisement", "parameter-problem", "network-unknown", "required-option-missing", "network-unreachable", "reject-route", "unknown-option", "ttl-zero-during-transit", "fragmentation-needed", "ip-header-bad", "communication-prohibited", "time-exceeded", "address-unreachable", "no-route", "network-redirect", "echo-request", "echo-reply" ], "policies": [ "allow-host-ipv6" ], "services": [ "transmission-client", "kerberos", "condor-collector", "ircs", "libvirt-tls", "xmpp-server", "tor-socks", "ovirt-imageio", "ssh", "wsmans", "tinc", "statsrv", "iscsi-target", "smtp-submission", "kibana", "ws-discovery-client", "ipfs", "kube-nodeport-services", "snmptls", "dns", "ovirt-vmconsole", "syslog-tls", "pulseaudio", "syncthing", "vdsm", "ganglia-master", "kubelet-worker", "nut", "smtp", "nmea-0183", "xmpp-local", "RH-Satellite-6", "nfs3", "ws-discovery-tcp", "kube-control-plane", "cratedb", "ipp-client", "upnp-client", "irc", "llmnr-client", "dhcpv6", "telnet", "ftp", "netdata-dashboard", "mosh", "https", "ctdb", "syscomlan", "freeipa-4", "cfengine", "foreman", "pop3s", "kube-scheduler-secure", "docker-swarm", "http", "galera", "ovirt-storageconsole", "samba-client", "syncthing-relay", "mqtt-tls", "pmproxy", "amqps", "mountd", "ssdp", "ws-discovery-udp", "quassel", "settlers-history-collection", "docker-registry", "syslog", "pop3", "rsyncd", "redis", "dropbox-lansync", "murmur", "syncthing-gui", "libvirt", "finger", "zabbix-server", "bb", "snmptrap", "tentacle", "svn", "minidlna", "squid", "prometheus-node-exporter", "RH-Satellite-6-capsule", "smtps", "http3", "ps3netsrv", "dds", "llmnr-tcp", "samba-dc", "zabbix-trapper", "bitcoin-testnet", "snmp", "factorio", "ps2link", "dhcp", "cockpit", "steam-streaming", "sip", "prometheus", "zero-k", "redis-sentinel", "wsman", "kube-controller-manager-secure", "lightning-network", "high-availability", "stronghold-crusader", "synergy", "need-for-speed-most-wanted", "vnc-server", "bittorrent-lsd", "freeipa-ldap", "bitcoin", "xmpp-bosh", "stellaris", "kube-control-plane-secure", "0-AD", "ceph", "bareos-storage", "amanda-client", "kube-worker", "kube-apiserver", "rquotad", "pmcd", "mqtt", "zerotier", "anno-1800", "nrpe", "kube-api", "ldaps", "tftp", "bitcoin-rpc", "mssql", "bitcoin-testnet-rpc", "ws-discovery", "samba", "ntp", "amqp", "xmpp-client", "git", "etcd-server", "imaps", "warpinator", "freeipa-trust", "apcupsd", "rpc-bind", "ldap", "audit", "bacula-client", "nbd", "managesieve", "postgresql", "jenkins", "anno-1602", "zabbix-agent", "ausweisapp2", "ident", "llmnr-udp", "pmwebapis", "spideroak-lansync", "kdeconnect", "freeipa-ldaps", "openvpn", "snmptls-trap", "amanda-k5-client", "collectd", "grafana", "kubelet", "kadmin", "ganglia-client", "terraria", "proxy-dhcp", "sane", "civilization-v", "llmnr", "checkmk-agent", "bgp", "radius", "rdp", "bacula", "dds-multicast", "etcd-client", "kube-scheduler", "opentelemetry", "dns-over-tls", "mongodb", "slp", "afp", "elasticsearch", "dds-unicast", "privoxy", "dhcpv6-client", "bareos-director", "kprop", "minecraft", "kubelet-readonly", "mysql", "gre", "ceph-exporter", "gpsd", "imap", "civilization-iv", "nfs", "xdmcp", "ms-wbt", "pmwebapi", "sips", "supertuxkart", "nebula", "zabbix-web-service", "bareos-filedaemon", "ptp", "ipsec", "klogin", "rtsp", "kube-controller-manager", "distcc", "puppetmaster", "plex", "foreman-proxy", "kpasswd", "ceph-mon", "rsh", "tile38", "wireguard", "memcache", "matrix", "netbios-ns", "freeipa-replication", "isns", "wbem-https", "wbem-http", "spotify-sync", "mdns", "salt-master", "zabbix-java-gateway", "ipp", "kshell", "svdrp" ], "zones": [ "internal", "external", "public", "nm-shared", "FedoraWorkstation", "trusted", "drop", "work", "FedoraServer", "home", "block", "dmz" ] }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.020) 0:00:17.790 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.011) 0:00:17.802 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.013) 0:00:17.816 ******* skipping: [sut] => { "false_condition": "__firewall_previous_replaced | bool" } TASK [Fail if firewall_config not changed] ************************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:69 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.014) 0:00:17.831 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_config == __previous_firewall_config", "skip_reason": "Conditional result was False" } TASK [Fail if config defaults changed] ***************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:76 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.008) 0:00:17.839 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_config.default != __previous_firewall_config.default", "skip_reason": "Conditional result was False" } TASK [Fail if custom config unchanged] ***************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:81 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.008) 0:00:17.848 ******* skipping: [sut] => { "changed": false, "false_condition": "'custom' not in firewall_config or 'zones' not in firewall_config.custom or 'services' not in firewall_config.custom", "skip_reason": "Conditional result was False" } TASK [Store previous firewall_config] ****************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:89 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.008) 0:00:17.857 ******* ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Get firewall_config with detailed on] ************************************ task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:96 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.013) 0:00:17.870 ******* included: fedora.linux_system_roles.firewall for sut TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.039) 0:00:17.910 ******* included: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.015) 0:00:17.925 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.014) 0:00:17.940 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.013) 0:00:17.953 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.012) 0:00:17.966 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.012) 0:00:17.979 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Saturday 10 August 2024 05:28:06 +0000 (0:00:00.013) 0:00:17.992 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Saturday 10 August 2024 05:28:08 +0000 (0:00:01.999) 0:00:19.992 ******* skipping: [sut] => { "false_condition": "__firewall_is_transactional | d(false)" } TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Saturday 10 August 2024 05:28:08 +0000 (0:00:00.014) 0:00:20.006 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Saturday 10 August 2024 05:28:08 +0000 (0:00:00.015) 0:00:20.022 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 10 August 2024 05:28:08 +0000 (0:00:00.012) 0:00:20.034 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 10 August 2024 05:28:08 +0000 (0:00:00.012) 0:00:20.047 ******* skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 10 August 2024 05:28:08 +0000 (0:00:00.024) 0:00:20.072 ******* ok: [sut] => { "changed": false, "name": "firewalld", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestamp": "Sat 2024-08-10 05:27:55 UTC", "ActiveEnterTimestampMonotonic": "627361673", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service dbus-broker.service basic.target sysinit.target system.slice dbus.socket", "AllowIsolate": "no", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-08-10 05:27:53 UTC", "AssertTimestampMonotonic": "625947144", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "889568000", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ConditionTimestampMonotonic": "625947140", "ConfigurationDirectoryMode": "0755", "Conflicts": "nftables.service shutdown.target ip6tables.service ipset.service iptables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlGroupId": "5701", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5290", "ExecMainStartTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ExecMainStartTimestampMonotonic": "625960114", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-08-10 05:27:53 UTC", "InactiveExitTimestampMonotonic": "625960429", "InvocationID": "46bffcc6387846b1917c4fe16148beeb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "5290", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "35291136", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service dbus-org.fedoraproject.FirewallD1.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestamp": "Sat 2024-08-10 05:27:55 UTC", "StateChangeTimestampMonotonic": "627361673", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "5", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 10 August 2024 05:28:08 +0000 (0:00:00.371) 0:00:20.444 ******* ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestamp": "Sat 2024-08-10 05:27:55 UTC", "ActiveEnterTimestampMonotonic": "627361673", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service dbus-broker.service basic.target sysinit.target system.slice dbus.socket", "AllowIsolate": "no", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-08-10 05:27:53 UTC", "AssertTimestampMonotonic": "625947144", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "889568000", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ConditionTimestampMonotonic": "625947140", "ConfigurationDirectoryMode": "0755", "Conflicts": "nftables.service shutdown.target ip6tables.service ipset.service iptables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlGroupId": "5701", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5290", "ExecMainStartTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ExecMainStartTimestampMonotonic": "625960114", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-08-10 05:27:53 UTC", "InactiveExitTimestampMonotonic": "625960429", "InvocationID": "46bffcc6387846b1917c4fe16148beeb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "5290", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "35291136", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service dbus-org.fedoraproject.FirewallD1.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestamp": "Sat 2024-08-10 05:27:55 UTC", "StateChangeTimestampMonotonic": "627361673", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "5", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 10 August 2024 05:28:09 +0000 (0:00:00.381) 0:00:20.825 ******* ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python3.12", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 10 August 2024 05:28:09 +0000 (0:00:00.023) 0:00:20.849 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 10 August 2024 05:28:09 +0000 (0:00:00.014) 0:00:20.863 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 10 August 2024 05:28:09 +0000 (0:00:00.014) 0:00:20.878 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 10 August 2024 05:28:09 +0000 (0:00:00.028) 0:00:20.906 ******* ok: [sut] => (item={'detailed': True}) => { "ansible_loop_var": "item", "changed": false, "firewall_config": { "custom": { "services": { "custom": { "description": "", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "icmptypes": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package would cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "policies": { "allow-host-ipv6": { "description": "Allows basic IPv6 functionality for the host running firewalld.", "egress_zones": [ "HOST" ], "forward_ports": [], "icmp_blocks": [], "ingress_zones": [ "ANY" ], "masquerade": false, "ports": [], "priority": -15000, "protocols": [], "rich_rules": [ "rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept", "rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept", "rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept", "rule family=\"ipv6\" icmp-type name=\"redirect\" accept" ], "services": [], "short": "Allow host IPv6", "source_ports": [], "target": "CONTINUE", "version": "" } }, "services": { "0-AD": { "description": " 0 A.D. is a real-time strategy (RTS) game of ancient warfare. It's a historically-based war/economy game that allows players to relive or rewrite the history of thirteen ancient civilizations, each depicted at their peak of economic growth and military prowess. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "20595", "udp" ] ], "protocols": [], "short": "0 A.D.", "source_ports": [], "version": "" }, "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "destination": {}, "helpers": [], "includes": [ "foreman" ], "modules": [], "ports": [ [ "5000", "tcp" ], [ "5646-5647", "tcp" ], [ "5671", "tcp" ], [ "8000", "tcp" ], [ "8080", "tcp" ], [ "9090", "tcp" ] ], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "destination": {}, "helpers": [], "includes": [ "RH-Satellite-6" ], "modules": [], "ports": [ [ "8443", "tcp" ] ], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "afp": { "description": "The Apple Filing Protocol (AFP), formerly AppleTalk Filing Protocol, is a proprietary network protocol, and part of the Apple File Service (AFS), that offers file services for macOS and the classic Mac OS.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "548", "tcp" ] ], "protocols": [], "short": "AFP", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "destination": {}, "helpers": [ "amanda" ], "includes": [], "modules": [], "ports": [ [ "10080", "udp" ], [ "10080", "tcp" ] ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "destination": {}, "helpers": [ "amanda" ], "includes": [], "modules": [], "ports": [ [ "10082", "tcp" ] ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5672", "tcp" ] ], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5671", "tcp" ] ], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "anno-1602": { "description": " Anno 1602 is a construction and management video game. Set in the early modern period, it requires the player to build colonies on small islands and manage resources, exploration, diplomacy and trade. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "47624", "tcp" ], [ "2300-2400", "tcp" ], [ "2300-2400", "udp" ] ], "protocols": [], "short": "Anno 1602", "source_ports": [], "version": "" }, "anno-1800": { "description": " Anno 1800 - Lead the Industrial Revolution! Welcome to the dawn of the Industrial Age. The path you choose will define your world. Are you an innovator or an exploiter? A conqueror or a liberator? How the world remembers your name is up to you. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18000", "udp" ] ], "protocols": [], "short": "Anno 1800", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3551", "tcp" ] ], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "60", "tcp" ] ], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "ausweisapp2": { "description": "AusweisApp2 is an official government application to provide electronic identification services (eID) in conjunction with an approved electronic identification document such as the german nPA. In order to use your Smartphone as a card reader enable this service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "24727", "udp" ] ], "protocols": [], "short": "AusweisApp2", "source_ports": [], "version": "1.17.1" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9101", "tcp" ], [ "9102", "tcp" ], [ "9103", "tcp" ] ], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9102", "tcp" ] ], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bareos-director": { "description": "This option allows connections to a local Bareos Director. These connections are typically initiated by Bareos consoles (bconsole). Bareos WebUI and Bareos File Daemon (when using Client Initiated Connections).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9101", "tcp" ] ], "protocols": [], "short": "Bareos Director Daemon (bareos-dir)", "source_ports": [], "version": "" }, "bareos-filedaemon": { "description": "This option allows a Bareos Director to connect to the local Bareos File Daemon.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9102", "tcp" ] ], "protocols": [], "short": "Bareos File Daemon (bareos-fd)", "source_ports": [], "version": "" }, "bareos-storage": { "description": "This option allows Bareos Director and File Daemons to connect to the local Bareos Storage Daemon to send/receive data and manage volumes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9103", "tcp" ] ], "protocols": [], "short": "Bareos Storage Daemon (bareos-sd)", "source_ports": [], "version": "" }, "bb": { "description": "Big Brother is a plain text protocol for sending and receiving client data, reports, and queries to a BB-compatible monitoring server or proxy. The standard IANA port for a listening Big Brother service is 1984, because of course it is.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1984", "tcp" ], [ "1984", "udp" ] ], "protocols": [], "short": "Big Brother", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "179", "tcp" ] ], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8333", "tcp" ] ], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8332", "tcp" ] ], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18333", "tcp" ] ], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18332", "tcp" ] ], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "bittorrent-lsd": { "description": "Local Peer Discovery is a protocol designed to support the discovery of BitTorrent peers on a local area network. Enable this service if you run a BitTorrent client.", "destination": { "ipv4": "239.192.152.143", "ipv6": "ff15::efc0:988f" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6771", "udp" ] ], "protocols": [], "short": "BitTorrent Local Peer Discovery (LSD)", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6800-7568", "tcp" ] ], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-exporter": { "description": "The Prometheus module running on Ceph manager to expose metrics.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9283", "tcp" ] ], "protocols": [], "short": "ceph-exporter", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3300", "tcp" ], [ "6789", "tcp" ] ], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5308", "tcp" ] ], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "checkmk-agent": { "description": "The checkmk monitoring agent runs on clients to provide detailed host state.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6556", "tcp" ] ], "protocols": [], "short": "checkmk agent", "source_ports": [], "version": "" }, "civilization-iv": { "description": " Civilization IV is a 4X turn-based strategy computer game and the fourth installment of the Civilization series. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2033", "tcp" ], [ "2056", "tcp" ], [ "3783", "tcp" ], [ "6500", "tcp" ], [ "6667", "tcp" ], [ "28900", "tcp" ], [ "29900-29901", "tcp" ], [ "2033", "udp" ], [ "2302-2400", "udp" ], [ "6500", "udp" ], [ "6515", "udp" ], [ "13139", "udp" ], [ "27900", "udp" ] ], "protocols": [], "short": "Sid Meier's Civilization IV", "source_ports": [], "version": "" }, "civilization-v": { "description": " Become Ruler of the World by establishing and leading a civilization from the dawn of man into the space age: Wage war, conduct diplomacy, discover new technologies, go head-to-head with some of history’s greatest leaders and build the most powerful empire the world has ever known. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1745", "tcp" ], [ "1795", "tcp" ], [ "3074", "tcp" ], [ "27015-27030", "tcp" ], [ "27036-27037", "tcp" ], [ "1745", "udp" ], [ "1795", "udp" ], [ "3064", "udp" ], [ "3074", "udp" ], [ "4380", "udp" ], [ "27000-27031", "udp" ], [ "27036", "udp" ] ], "protocols": [], "short": "Sid Meier's Civilization V", "source_ports": [], "version": "" }, "cockpit": { "description": "Cockpit lets you access and configure your server remotely.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9090", "tcp" ] ], "protocols": [], "short": "Cockpit", "source_ports": [], "version": "" }, "collectd": { "description": "Collectd is a monitoring system that allows metrics to be sent over the network. This rule allows incoming collectd traffic from remote boxes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25826", "udp" ] ], "protocols": [], "short": "Collectd", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9618", "tcp" ] ], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "cratedb": { "description": "CrateDB is a distributed SQL database management system that integrates a fully searchable document oriented data store.", "destination": {}, "helpers": [], "includes": [ "postgresql" ], "modules": [], "ports": [ [ "4200", "tcp" ], [ "4300", "tcp" ] ], "protocols": [], "short": "CrateDB", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4379", "tcp" ], [ "4379", "udp" ] ], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dds": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast and multicast service for domains with ID 0 through 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": {}, "helpers": [], "includes": [ "dds-multicast", "dds-unicast" ], "modules": [], "ports": [], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dds-multicast": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast service for domains with ID 0 to 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": { "ipv4": "239.255.0.1" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7400-7401", "udp" ], [ "7650-7651", "udp" ], [ "7900-7901", "udp" ], [ "8150-8151", "udp" ], [ "8400-8401", "udp" ], [ "8650-8651", "udp" ], [ "8900-8901", "udp" ], [ "9150-9151", "udp" ], [ "9400-9401", "udp" ], [ "9650-9651", "udp" ], [ "9900-9901", "udp" ] ], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dds-unicast": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast service for domains with ID 0 ito 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7402-7649", "udp" ], [ "7652-7899", "udp" ], [ "7902-8149", "udp" ], [ "8152-8339", "udp" ], [ "8402-8649", "udp" ], [ "8652-8899", "udp" ], [ "8902-9149", "udp" ], [ "9152-9339", "udp" ], [ "9402-9649", "udp" ], [ "9652-9899", "udp" ], [ "9902-10149", "udp" ] ], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "67", "udp" ] ], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "547", "udp" ] ], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "destination": { "ipv6": "fe80::/64" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "546", "udp" ] ], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3632", "tcp" ] ], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "53", "tcp" ], [ "53", "udp" ] ], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "dns-over-tls": { "description": "DNS over TLS (DoT) is a security protocol for encrypting and wrapping Domain Name System (DNS) queries and answers via the Transport Layer Security (TLS) protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "853", "tcp" ] ], "protocols": [], "short": "DNS over TLS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5000", "tcp" ] ], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2377", "tcp" ], [ "7946", "tcp" ], [ "7946", "udp" ], [ "4789", "udp" ] ], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "17500", "udp" ], [ "17500", "tcp" ] ], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9300", "tcp" ], [ "9200", "tcp" ] ], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2379", "tcp" ] ], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2380", "tcp" ] ], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "factorio": { "description": " Factorio is a game about building and creating automated factories to produce items of increasing complexity, within an infinite 2D world. Use your imagination to design your factory, combine simple elements into ingenious structures, and finally protect it from the creatures who don't really like you. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "34197", "udp" ] ], "protocols": [], "short": "Factorio", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "79", "tcp" ] ], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "foreman": { "description": "Foreman is a complete lifecycle management tool for physical and virtual servers.", "destination": {}, "helpers": [], "includes": [ "dns", "http", "https", "dhcp", "tftp" ], "modules": [], "ports": [ [ "68", "udp" ], [ "8140", "tcp" ] ], "protocols": [], "short": "foreman", "source_ports": [], "version": "" }, "foreman-proxy": { "description": "The Smart Proxy is a project which provides a restful API to various sub-systems.", "destination": {}, "helpers": [], "includes": [ "foreman" ], "modules": [], "ports": [ [ "8443", "tcp" ] ], "protocols": [], "short": "foreman-proxy", "source_ports": [], "version": "" }, "freeipa-4": { "description": "FreeIPA is an integrated identity and authentication solution with Kerberos, LDAP, PKI, and web UI. Enable this option if you plan to provide a FreeIPA server. Enable the 'dns' service if this FreeIPA server provides DNS services, 'ntp' service if this FreeIPA server provides NTP services, and 'freeipa-trust' for cross-forest trusts with Active Directory.", "destination": {}, "helpers": [], "includes": [ "http", "https", "kerberos", "kpasswd", "ldap", "ldaps" ], "modules": [], "ports": [], "protocols": [], "short": "FreeIPA 4 server", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ], [ "443", "tcp" ], [ "88", "tcp" ], [ "88", "udp" ], [ "464", "tcp" ], [ "464", "udp" ], [ "123", "udp" ], [ "389", "tcp" ] ], "protocols": [], "short": "FreeIPA with LDAP (deprecated)", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ], [ "443", "tcp" ], [ "88", "tcp" ], [ "88", "udp" ], [ "464", "tcp" ], [ "464", "udp" ], [ "123", "udp" ], [ "636", "tcp" ] ], "protocols": [], "short": "FreeIPA with LDAPS (deprecated)", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7389", "tcp" ] ], "protocols": [], "short": "FreeIPA replication (deprecated)", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "135", "tcp" ], [ "138-139", "tcp" ], [ "138-139", "udp" ], [ "389", "tcp" ], [ "389", "udp" ], [ "445", "tcp" ], [ "445", "udp" ], [ "49152-65535", "tcp" ], [ "3268", "tcp" ] ], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "destination": {}, "helpers": [ "ftp" ], "includes": [], "modules": [], "ports": [ [ "21", "tcp" ] ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "galera": { "description": "MariaDB-Galera Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3306", "tcp" ], [ "4567", "tcp" ], [ "4568", "tcp" ], [ "4444", "tcp" ] ], "protocols": [], "short": "Galera", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8660", "tcp" ] ], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8651", "tcp" ] ], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9418", "tcp" ] ], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gpsd": { "description": "gpsd is a service daemon that monitors one or more GPSes or AIS receivers attached to a host computer through serial or USB ports, making all data on the location/course/velocity of the sensors available to be queried on TCP port 2947 of the host computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2947", "tcp" ] ], "protocols": [], "short": "gpsd", "source_ports": [], "version": "" }, "grafana": { "description": "Grafana is an open platform for beautiful analytics and monitoring", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3000", "tcp" ] ], "protocols": [], "short": "grafana", "source_ports": [], "version": "" }, "gre": { "description": "", "destination": {}, "helpers": [ "proto-gre" ], "includes": [], "modules": [], "ports": [], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2224", "tcp" ], [ "3121", "tcp" ], [ "5403", "tcp" ], [ "5404", "udp" ], [ "5405-5412", "udp" ], [ "9929", "tcp" ], [ "9929", "udp" ], [ "21064", "tcp" ] ], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ] ], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "http3": { "description": "HTTP/3 is a protocol used to serve Web pages that uses QUIC as the transport protocol. If you plan to make your HTTP/3 compatible Web server publicly available, enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "443", "udp" ] ], "protocols": [], "short": "WWW (HTTP/3)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "443", "tcp" ] ], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "ident": { "description": "The Identification Protocol as specified in RFC 1413, which is used to determine the identity of a user of a particular TCP connection.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "113", "tcp" ] ], "protocols": [], "short": "Ident Protocol", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "143", "tcp" ] ], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "993", "tcp" ] ], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipfs": { "description": "The InterPlanetary File System (IPFS) is a peer-to-peer hypermedia protocol designed to make the web faster, safer, and more open", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4001", "tcp" ], [ "4001", "udp" ] ], "protocols": [], "short": "IPFS", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "631", "tcp" ], [ "631", "udp" ] ], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "631", "udp" ] ], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) is the standardized IETF VPN architecture defined in RFC 4301. IPsec is negotiated using the IKEv1 (RFC 2409) or IKEv2 (RFC 7296) protocol, which in itself uses encryption and authentication. IPsec provides Internet Protocol (IP) packet encryption and authentication. Both IKE and IPsec can be encapsulated in UDP (RFC 3948) or TCP (RFC 8229 to make it easier to traverse NAT. Enabling this service will enable IKE, IPsec and their encapsulation protocols and ports. Note that IKE and IPsec can also be configured to use non-default ports, but this is not common practice.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "500", "udp" ], [ "4500", "udp" ], [ "4500", "tcp" ] ], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6667", "tcp" ] ], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6697", "tcp" ] ], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3260", "tcp" ], [ "3260", "udp" ] ], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3205", "tcp" ], [ "3205", "udp" ] ], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8080", "tcp" ] ], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "749", "tcp" ] ], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kdeconnect": { "description": "KDE Connect is an application to connect your phone to your computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1714-1764", "tcp" ], [ "1714-1764", "udp" ] ], "protocols": [], "short": "KDE Connect", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "88", "tcp" ], [ "88", "udp" ] ], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5601", "tcp" ] ], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "543", "tcp" ] ], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "464", "tcp" ], [ "464", "udp" ] ], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "754", "tcp" ] ], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "544", "tcp" ] ], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "kube-api": { "description": "Backwards compatibility after service renaming", "destination": {}, "helpers": [], "includes": [ "kubelet" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kube-apiserver": { "description": "The Kubernetes API server validates and configures data for the api objects which include pods, services, replicationcontrollers, and others.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6443", "tcp" ] ], "protocols": [], "short": "Kubernetes Api Server", "source_ports": [], "version": "" }, "kube-control-plane": { "description": "The Kubernetes Control-plane Node runs all the services of the Kubernetes Control Plane. This includes kube-apiserver, etcd, kube-schedule, kube-controller-manager, cloud-controller-manager, and others", "destination": {}, "helpers": [], "includes": [ "etcd-client", "etcd-server", "kube-apiserver", "kube-controller-manager", "kube-scheduler" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Control-plane Node", "source_ports": [], "version": "" }, "kube-control-plane-secure": { "description": "The Kubernetes Control-plane Node runs all the services of the Kubernetes Control Plane. This includes kube-apiserver, etcd, kube-schedule, kube-controller-manager, cloud-controller-manager, and others", "destination": {}, "helpers": [], "includes": [ "etcd-client", "etcd-server", "kube-apiserver", "kube-controller-manager-secure", "kube-scheduler-secure" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Control-plane Node - secure", "source_ports": [], "version": "" }, "kube-controller-manager": { "description": "The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10252", "tcp" ] ], "protocols": [], "short": "Kubernetes Controller Manager", "source_ports": [], "version": "" }, "kube-controller-manager-secure": { "description": "The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10257", "tcp" ] ], "protocols": [], "short": "Kubernetes Controller Manager - Secure", "source_ports": [], "version": "" }, "kube-nodeport-services": { "description": "Services of type NodePort expose a port on each worker", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "30000-32767", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kube-scheduler": { "description": "The Kubernetes scheduler is a policy-rich, topology-aware, workload-specific function that significantly impacts availability, performance, and capacity.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10251", "tcp" ] ], "protocols": [], "short": "Kubernetes Scheduler", "source_ports": [], "version": "" }, "kube-scheduler-secure": { "description": "The Kubernetes scheduler is a policy-rich, topology-aware, workload-specific function that significantly impacts availability, performance, and capacity.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10259", "tcp" ] ], "protocols": [], "short": "Kubernetes Scheduler - secure", "source_ports": [], "version": "" }, "kube-worker": { "description": "The Kubernetes Worker Node runs some (or sometimes all) of the workloads of the Kubernetes cluster. There might be NodoPort services associated with these workloads.", "destination": {}, "helpers": [], "includes": [ "kubelet", "kube-nodeport-services" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Worker Node", "source_ports": [], "version": "" }, "kubelet": { "description": "The kubelet API is used to communicate between kube-scheduler and the node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10250", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kubelet-readonly": { "description": "The kubelet API is used to communicate between kube-scheduler and the node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10255", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet read", "source_ports": [], "version": "" }, "kubelet-worker": { "description": "Backwards compatibility after service renaming", "destination": {}, "helpers": [], "includes": [ "kube-worker" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Worker Node", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "389", "tcp" ] ], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "636", "tcp" ] ], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "16509", "tcp" ] ], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "16514", "tcp" ] ], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9735", "tcp" ] ], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. In order to allow this host to resolve other hosts, use the llmnr-client service. ", "destination": {}, "helpers": [], "includes": [ "llmnr-tcp", "llmnr-udp" ], "modules": [], "ports": [], "protocols": [], "short": "LLMNR", "source_ports": [], "version": "" }, "llmnr-client": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service allows incoming LLMNR responses. Due to protocol details the service matches by source port and thus allows unsolicited responses. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "LLMNR Client", "source_ports": [ [ "5355", "udp" ] ], "version": "" }, "llmnr-tcp": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5355", "tcp" ] ], "protocols": [], "short": "LLMNR (TCP)", "source_ports": [], "version": "" }, "llmnr-udp": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. ", "destination": { "ipv4": "224.0.0.252", "ipv6": "ff02::1:3" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5355", "udp" ] ], "protocols": [], "short": "LLMNR (UDP)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4190", "tcp" ] ], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "destination": {}, "helpers": [], "includes": [ "https" ], "modules": [], "ports": [ [ "8448", "tcp" ] ], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "destination": { "ipv4": "224.0.0.251", "ipv6": "ff02::fb" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5353", "udp" ] ], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "memcache": { "description": "memcache is a high-performance object caching system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "11211", "tcp" ], [ "11211", "udp" ] ], "protocols": [], "short": "memcache", "source_ports": [], "version": "" }, "minecraft": { "description": " Minecraft is a sandbox game developed by Mojang Studios. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25565", "tcp" ], [ "25565", "udp" ] ], "protocols": [], "short": "Minecraft", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "destination": {}, "helpers": [], "includes": [ "ssdp" ], "modules": [], "ports": [ [ "8200", "tcp" ] ], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "27017", "tcp" ] ], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "60000-61000", "udp" ] ], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "20048", "tcp" ], [ "20048", "udp" ] ], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1883", "tcp" ] ], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8883", "tcp" ] ], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "destination": {}, "helpers": [], "includes": [ "rdp" ], "modules": [], "ports": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1433", "tcp" ] ], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "64738", "tcp" ], [ "64738", "udp" ] ], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3306", "tcp" ] ], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nbd": { "description": "Network Block Device (NBD) is a high-performance protocol for exporting disk images between machines.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10809", "tcp" ] ], "protocols": [], "short": "NBD", "source_ports": [], "version": "" }, "nebula": { "description": "Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. The port needs to be open if the host is set as lighthouse.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4242", "udp" ] ], "protocols": [], "short": "Nebula", "source_ports": [], "version": "" }, "need-for-speed-most-wanted": { "description": " Need for Speed: Most Wanted is a 2005 open-world racing video game, and the ninth installment in the Need for Speed series. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "13505", "tcp" ], [ "30900-30999", "tcp" ], [ "3658", "udp" ] ], "protocols": [], "short": "Need for Speed: Most Wanted", "source_ports": [], "version": "" }, "netbios-ns": { "description": "This allows you to find Windows (Samba) servers that share files and printers.", "destination": {}, "helpers": [ "netbios-ns" ], "includes": [], "modules": [], "ports": [ [ "137", "udp" ] ], "protocols": [], "short": "NetBIOS NS", "source_ports": [], "version": "" }, "netdata-dashboard": { "description": "Netdata dashboard is a place to view the results of the netdata monitoring agent", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "19999", "tcp" ] ], "protocols": [], "short": "Netdata Dashboard", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2049", "tcp" ] ], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2049", "tcp" ], [ "2049", "udp" ] ], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10110", "tcp" ], [ "10110", "udp" ] ], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5666", "tcp" ] ], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "123", "udp" ] ], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3493", "tcp" ] ], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "opentelemetry": { "description": "OpenTelemetry Protocol (OTLP) specification describes the encoding, transport, and delivery mechanism of telemetry data between telemetry sources, intermediate nodes such as collectors and telemetry backends.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4317", "tcp" ], [ "4318", "tcp" ] ], "protocols": [], "short": "OTLP", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1194", "udp" ] ], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "54322", "tcp" ] ], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "55863", "tcp" ], [ "39543", "tcp" ] ], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2223", "tcp" ] ], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": "Plex Media Server (PMS) is the back-end media server component of Plex. It organizes content from personal media libraries and streams it to the network.", "destination": {}, "helpers": [], "includes": [ "ssdp" ], "modules": [], "ports": [ [ "32400", "tcp" ], [ "32400", "udp" ], [ "32469", "tcp" ], [ "3005", "tcp" ], [ "8324", "tcp" ], [ "32410", "udp" ], [ "32412", "udp" ], [ "32413", "udp" ], [ "32414", "udp" ] ], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44321", "tcp" ] ], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44322", "tcp" ] ], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44323", "tcp" ] ], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44324", "tcp" ] ], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "110", "tcp" ] ], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "995", "tcp" ] ], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5432", "tcp" ] ], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8118", "tcp" ] ], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "prometheus": { "description": "The Prometheus monitoring system and time series database.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9090", "tcp" ] ], "protocols": [], "short": "prometheus", "source_ports": [], "version": "" }, "prometheus-node-exporter": { "description": "The node-exporter agent for Prometheus monitoring system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9100", "tcp" ] ], "protocols": [], "short": "prometheus-node-exporter", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4011", "udp" ] ], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ps2link": { "description": "ps2link is a protocol used for interacting with a PlayStation 2 system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18194", "udp" ], [ "18193", "tcp" ] ], "protocols": [], "short": "ps2link", "source_ports": [], "version": "" }, "ps3netsrv": { "description": "PS3 Network Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "38008", "tcp" ] ], "protocols": [], "short": "ps3netsrv", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "319", "udp" ], [ "320", "udp" ] ], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4713", "tcp" ] ], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8140", "tcp" ] ], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4242", "tcp" ] ], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1812", "tcp" ], [ "1812", "udp" ], [ "1813", "tcp" ], [ "1813", "udp" ] ], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "rdp": { "description": "Microsoft's Remote Desktop Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3389", "tcp" ] ], "protocols": [], "short": "rdp", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6379", "tcp" ] ], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "redis-sentinel": { "description": "Redis Sentinel provides high availability for Redis.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "26379", "tcp" ] ], "protocols": [], "short": "redis-sentinel", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "111", "tcp" ], [ "111", "udp" ] ], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rquotad": { "description": "Remote Quota Server Daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "875", "tcp" ], [ "875", "udp" ] ], "protocols": [], "short": "rquotad", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "514", "tcp" ] ], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "873", "tcp" ], [ "873", "udp" ] ], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "554", "tcp" ], [ "554", "udp" ] ], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4505", "tcp" ], [ "4506", "tcp" ] ], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "samba-client" ], "modules": [], "ports": [ [ "139", "tcp" ], [ "445", "tcp" ] ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "netbios-ns" ], "modules": [], "ports": [ [ "138", "udp" ] ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "samba", "dns", "kerberos", "ldap", "ldaps", "kpasswd" ], "modules": [], "ports": [ [ "135", "tcp" ], [ "389", "udp" ], [ "49152-65535", "tcp" ], [ "3268", "tcp" ], [ "3269", "tcp" ] ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "destination": {}, "helpers": [ "sane" ], "includes": [], "modules": [], "ports": [ [ "6566", "tcp" ] ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "settlers-history-collection": { "description": "The Settlers History Collection includes History Editions of all seven previous Settlers games, which includes gold versions of each game with all expansions.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1005", "udp" ], [ "1100", "udp" ], [ "3074", "udp" ], [ "6200", "udp" ], [ "6300", "udp" ] ], "protocols": [], "short": "The Settlers History Collection", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "destination": {}, "helpers": [ "sip" ], "includes": [], "modules": [], "ports": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5061", "tcp" ], [ "5061", "udp" ] ], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "427", "tcp" ], [ "427", "udp" ] ], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25", "tcp" ] ], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "587", "tcp" ] ], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "465", "tcp" ] ], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "161", "tcp" ], [ "161", "udp" ] ], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptls": { "description": "Simple Network Management Protocol over TLS/DTLS is an \"Internet-standard protocol for managing devices on IP networks\" protected by TLS. Enable this service if you run SNMP agent (server).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10161", "tcp" ], [ "10161", "udp" ] ], "protocols": [], "short": "Secure SNMP (TLS)", "source_ports": [], "version": "" }, "snmptls-trap": { "description": "Secure SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message. This port is protected by TLS.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10162", "tcp" ], [ "10162", "udp" ] ], "protocols": [], "short": "Secure SNMPTRAP (TLS)", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "162", "tcp" ], [ "162", "udp" ] ], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "21327", "udp" ], [ "21328", "udp" ] ], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "spotify-sync": { "description": "The Spotify Client allows you to sync local music files with your phone.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "57621", "udp" ], [ "57621", "tcp" ] ], "protocols": [], "short": "Spotify Client Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3128", "tcp" ] ], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssdp": { "description": "The Simple Service Discovery Protocol (SSDP) is a network protocol based on the Internet protocol suite for advertisement and discovery of network services and presence information.", "destination": { "ipv4": "239.255.255.250", "ipv6": "ff02::c" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1900", "udp" ] ], "protocols": [], "short": "Simple Service Discovery Protocol (SSDP)", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22", "tcp" ] ], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "statsrv": { "description": " Statistics Server protocol provides a way to give statistics about a system to the outside world. Defined in RFC-996", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "133", "tcp" ], [ "133", "udp" ] ], "protocols": [], "short": "Statistics Server", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "27036", "tcp" ], [ "27037", "tcp" ], [ "27031-27036", "udp" ] ], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "stellaris": { "description": " Explore a galaxy full of wonders in this sci-fi grand strategy game from Paradox Development Studios. Interact with diverse alien races, discover strange new worlds with unexpected events and expand the reach of your empire. Each new adventure holds almost limitless possibilities. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "17780-17785", "udp" ] ], "protocols": [], "short": "Stellaris", "source_ports": [], "version": "" }, "stronghold-crusader": { "description": " The highly anticipated sequel to the best-selling Stronghold, Stronghold Crusader (HD) throws you into historic battles and castle sieges from the Crusades with fiendish AI opponents, new units, 4 historical campaigns and over 100 unique skirmish missions. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2300-2400", "tcp" ], [ "47624", "tcp" ], [ "2300-2400", "udp" ] ], "protocols": [], "short": "Stronghold Crusader", "source_ports": [], "version": "" }, "supertuxkart": { "description": " SuperTuxKart is a 3D open-source kart racing game. It aims towards fun for players of all skill levels, with item boxes giving random items, nitro, drifting and more. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2759", "tcp" ], [ "2759", "udp" ], [ "2757", "udp" ], [ "2757", "tcp" ] ], "protocols": [], "short": "SuperTuxKart", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6419", "tcp" ], [ "6419", "udp" ] ], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3690", "tcp" ] ], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a peer-to-peer file synchronization service. Enable this option, if you plan to run the Syncthing service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22000", "tcp" ], [ "22000", "udp" ], [ "21027", "udp" ] ], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8384", "tcp" ] ], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "syncthing-relay": { "description": "Syncthing is a peer-to-peer file synchronization service. Only enable this option if you run a Syncthing relay server. This separate program (syncthing-relaysrv or relaysrv) is not needed for normal Syncthing usage.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22067", "tcp" ], [ "22070", "tcp" ] ], "protocols": [], "short": "Syncthing Relay", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "24800", "tcp" ] ], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syscomlan": { "description": "Local system communication", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1065", "tcp" ], [ "1065", "udp" ] ], "protocols": [], "short": "syscomlan", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "514", "udp" ] ], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6514", "tcp" ], [ "6514", "udp" ] ], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "23", "tcp" ] ], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tentacle": { "description": "Tentacle is a protocol for monitoring computer networks. Pandora FMS is one server implementation.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "41121", "tcp" ] ], "protocols": [], "short": "tentacle", "source_ports": [], "version": "" }, "terraria": { "description": " Dig, fight, explore, build! Nothing is impossible in this action-packed adventure game. Four Pack also available! ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7777", "tcp" ] ], "protocols": [], "short": "Terraria", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in a simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "destination": {}, "helpers": [ "tftp" ], "includes": [], "modules": [], "ports": [ [ "69", "udp" ] ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tile38": { "description": "Tile38 is a geospatial database, spatial index, and realtime geofence.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9851", "tcp" ] ], "protocols": [], "short": "tile38", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "655", "tcp" ], [ "655", "udp" ] ], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9050", "tcp" ] ], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "51413", "tcp" ], [ "51413", "udp" ] ], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "54321", "tcp" ], [ "5900-6923", "tcp" ], [ "49152-49216", "tcp" ] ], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5900-5903", "tcp" ] ], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "warpinator": { "description": "Warpinator is a file sharing app developed by Linux Mint. Warpinator allows you to send and receive files between computers that are on the same network without the need for any servers or special configuration.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "42000", "tcp" ], [ "42000", "udp" ], [ "42001", "tcp" ] ], "protocols": [], "short": "Warpinator", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5988", "tcp" ] ], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5989", "tcp" ] ], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wireguard": { "description": "WireGuard is the simple, fast and modern VPN. The port needs to be open if a peer has this host explicitly configured as endpoint.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "51820", "udp" ] ], "protocols": [], "short": "WireGuard", "source_ports": [], "version": "" }, "ws-discovery": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": {}, "helpers": [], "includes": [ "ws-discovery-tcp", "ws-discovery-udp" ], "modules": [], "ports": [], "protocols": [], "short": "WS-Discovery", "source_ports": [], "version": "" }, "ws-discovery-client": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network. Use only in trusted zones.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "WS-Discovery Client", "source_ports": [ [ "3702", "udp" ] ], "version": "" }, "ws-discovery-tcp": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3702", "tcp" ] ], "protocols": [], "short": "WS-Discovery (TCP)", "source_ports": [], "version": "" }, "ws-discovery-udp": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": { "ipv4": "239.255.255.250", "ipv6": "ff02::c" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3702", "udp" ] ], "protocols": [], "short": "WS-Discovery (UDP)", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5985", "tcp" ] ], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5986", "tcp" ] ], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "177", "tcp" ], [ "177", "udp" ] ], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5280", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5222", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5298", "tcp" ] ], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5269", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Listen port used by Zabbix agents deployed on monitoring targets.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10050", "tcp" ] ], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-java-gateway": { "description": "Listen port for Zabbix Java Gateway for monitoring Java applications over JMX.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10052", "tcp" ] ], "protocols": [], "short": "Zabbix Java Gateway", "source_ports": [], "version": "" }, "zabbix-server": { "description": "This is an alias for zabbix-trapper. This definition is deprecated in favor of zabbix-trapper.", "destination": {}, "helpers": [], "includes": [ "zabbix-trapper" ], "modules": [], "ports": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" }, "zabbix-trapper": { "description": "Trapper port to receive monitoring data used by the Zabbix server and Zabbix proxy.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10051", "tcp" ] ], "protocols": [], "short": "Zabbix Trapper", "source_ports": [], "version": "" }, "zabbix-web-service": { "description": "Listen port of Zabbix web service for receiving HTTP based reporting requests.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10053", "tcp" ] ], "protocols": [], "short": "Zabbix Web Service", "source_ports": [], "version": "" }, "zero-k": { "description": " With 100+ truly unique units, Zero-K is an RTS of freedom and creativity, tempered by a decade of refinement. Sculpt land into a castle and throw invaders off it with a Jugglenaut. Explore a massive campaign, solo or co-op. Hop online for epic 32 player battles or fast paced 1v1, on 100s of maps. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8452", "udp" ] ], "protocols": [], "short": "Zero-K", "source_ports": [], "version": "" }, "zerotier": { "description": "ZeroTier creates secure networks between on-premise, cloud, desktop, and mobile devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9993", "udp" ] ], "protocols": [], "short": "ZeroTier", "source_ports": [], "version": "" } }, "zones": { "FedoraServer": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "cockpit" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "FedoraWorkstation": { "description": "Unsolicited incoming network packets are rejected from port 1 to 1024, except for select network services. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [ [ "1025-65535", "udp" ], [ "1025-65535", "tcp" ] ], "protocols": [], "rules_str": [], "services": [ "dhcpv6-client", "ssh", "samba-client" ], "short": "Fedora Workstation", "source_ports": [], "sources": [], "target": "default", "version": "" }, "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "nm-shared": { "description": " This zone is used internally by NetworkManager when activating a profile that uses connection sharing and doesn't have an explicit firewall zone set. Block all traffic to the local machine except ICMP, ICMPv6, DHCP and DNS. Allow all forwarded traffic. Note that future package updates may change the definition of the zone unless you overwrite it with your own definition. ", "egress_priority": 0, "forward": false, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [ "icmp", "ipv6-icmp" ], "rules_str": [ "rule priority=\"32767\" reject" ], "services": [ "dhcp", "dns", "ssh" ], "short": "NetworkManager Shared", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default_zone": "public" }, "item": { "detailed": true } } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 10 August 2024 05:28:11 +0000 (0:00:02.751) 0:00:23.658 ******* ok: [sut] => { "ansible_facts": { "firewall_config": { "custom": { "services": { "custom": { "description": "", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "", "source_ports": [], "version": "" } }, "zones": { "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default": { "helpers": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "icmptypes": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package would cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "policies": { "allow-host-ipv6": { "description": "Allows basic IPv6 functionality for the host running firewalld.", "egress_zones": [ "HOST" ], "forward_ports": [], "icmp_blocks": [], "ingress_zones": [ "ANY" ], "masquerade": false, "ports": [], "priority": -15000, "protocols": [], "rich_rules": [ "rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept", "rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept", "rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept", "rule family=\"ipv6\" icmp-type name=\"redirect\" accept" ], "services": [], "short": "Allow host IPv6", "source_ports": [], "target": "CONTINUE", "version": "" } }, "services": { "0-AD": { "description": " 0 A.D. is a real-time strategy (RTS) game of ancient warfare. It's a historically-based war/economy game that allows players to relive or rewrite the history of thirteen ancient civilizations, each depicted at their peak of economic growth and military prowess. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "20595", "udp" ] ], "protocols": [], "short": "0 A.D.", "source_ports": [], "version": "" }, "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "destination": {}, "helpers": [], "includes": [ "foreman" ], "modules": [], "ports": [ [ "5000", "tcp" ], [ "5646-5647", "tcp" ], [ "5671", "tcp" ], [ "8000", "tcp" ], [ "8080", "tcp" ], [ "9090", "tcp" ] ], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "destination": {}, "helpers": [], "includes": [ "RH-Satellite-6" ], "modules": [], "ports": [ [ "8443", "tcp" ] ], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "afp": { "description": "The Apple Filing Protocol (AFP), formerly AppleTalk Filing Protocol, is a proprietary network protocol, and part of the Apple File Service (AFS), that offers file services for macOS and the classic Mac OS.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "548", "tcp" ] ], "protocols": [], "short": "AFP", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "destination": {}, "helpers": [ "amanda" ], "includes": [], "modules": [], "ports": [ [ "10080", "udp" ], [ "10080", "tcp" ] ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "destination": {}, "helpers": [ "amanda" ], "includes": [], "modules": [], "ports": [ [ "10082", "tcp" ] ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5672", "tcp" ] ], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5671", "tcp" ] ], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "anno-1602": { "description": " Anno 1602 is a construction and management video game. Set in the early modern period, it requires the player to build colonies on small islands and manage resources, exploration, diplomacy and trade. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "47624", "tcp" ], [ "2300-2400", "tcp" ], [ "2300-2400", "udp" ] ], "protocols": [], "short": "Anno 1602", "source_ports": [], "version": "" }, "anno-1800": { "description": " Anno 1800 - Lead the Industrial Revolution! Welcome to the dawn of the Industrial Age. The path you choose will define your world. Are you an innovator or an exploiter? A conqueror or a liberator? How the world remembers your name is up to you. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18000", "udp" ] ], "protocols": [], "short": "Anno 1800", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3551", "tcp" ] ], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "60", "tcp" ] ], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "ausweisapp2": { "description": "AusweisApp2 is an official government application to provide electronic identification services (eID) in conjunction with an approved electronic identification document such as the german nPA. In order to use your Smartphone as a card reader enable this service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "24727", "udp" ] ], "protocols": [], "short": "AusweisApp2", "source_ports": [], "version": "1.17.1" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9101", "tcp" ], [ "9102", "tcp" ], [ "9103", "tcp" ] ], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9102", "tcp" ] ], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bareos-director": { "description": "This option allows connections to a local Bareos Director. These connections are typically initiated by Bareos consoles (bconsole). Bareos WebUI and Bareos File Daemon (when using Client Initiated Connections).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9101", "tcp" ] ], "protocols": [], "short": "Bareos Director Daemon (bareos-dir)", "source_ports": [], "version": "" }, "bareos-filedaemon": { "description": "This option allows a Bareos Director to connect to the local Bareos File Daemon.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9102", "tcp" ] ], "protocols": [], "short": "Bareos File Daemon (bareos-fd)", "source_ports": [], "version": "" }, "bareos-storage": { "description": "This option allows Bareos Director and File Daemons to connect to the local Bareos Storage Daemon to send/receive data and manage volumes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9103", "tcp" ] ], "protocols": [], "short": "Bareos Storage Daemon (bareos-sd)", "source_ports": [], "version": "" }, "bb": { "description": "Big Brother is a plain text protocol for sending and receiving client data, reports, and queries to a BB-compatible monitoring server or proxy. The standard IANA port for a listening Big Brother service is 1984, because of course it is.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1984", "tcp" ], [ "1984", "udp" ] ], "protocols": [], "short": "Big Brother", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "179", "tcp" ] ], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8333", "tcp" ] ], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8332", "tcp" ] ], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18333", "tcp" ] ], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18332", "tcp" ] ], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "bittorrent-lsd": { "description": "Local Peer Discovery is a protocol designed to support the discovery of BitTorrent peers on a local area network. Enable this service if you run a BitTorrent client.", "destination": { "ipv4": "239.192.152.143", "ipv6": "ff15::efc0:988f" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6771", "udp" ] ], "protocols": [], "short": "BitTorrent Local Peer Discovery (LSD)", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6800-7568", "tcp" ] ], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-exporter": { "description": "The Prometheus module running on Ceph manager to expose metrics.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9283", "tcp" ] ], "protocols": [], "short": "ceph-exporter", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3300", "tcp" ], [ "6789", "tcp" ] ], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5308", "tcp" ] ], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "checkmk-agent": { "description": "The checkmk monitoring agent runs on clients to provide detailed host state.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6556", "tcp" ] ], "protocols": [], "short": "checkmk agent", "source_ports": [], "version": "" }, "civilization-iv": { "description": " Civilization IV is a 4X turn-based strategy computer game and the fourth installment of the Civilization series. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2033", "tcp" ], [ "2056", "tcp" ], [ "3783", "tcp" ], [ "6500", "tcp" ], [ "6667", "tcp" ], [ "28900", "tcp" ], [ "29900-29901", "tcp" ], [ "2033", "udp" ], [ "2302-2400", "udp" ], [ "6500", "udp" ], [ "6515", "udp" ], [ "13139", "udp" ], [ "27900", "udp" ] ], "protocols": [], "short": "Sid Meier's Civilization IV", "source_ports": [], "version": "" }, "civilization-v": { "description": " Become Ruler of the World by establishing and leading a civilization from the dawn of man into the space age: Wage war, conduct diplomacy, discover new technologies, go head-to-head with some of history’s greatest leaders and build the most powerful empire the world has ever known. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1745", "tcp" ], [ "1795", "tcp" ], [ "3074", "tcp" ], [ "27015-27030", "tcp" ], [ "27036-27037", "tcp" ], [ "1745", "udp" ], [ "1795", "udp" ], [ "3064", "udp" ], [ "3074", "udp" ], [ "4380", "udp" ], [ "27000-27031", "udp" ], [ "27036", "udp" ] ], "protocols": [], "short": "Sid Meier's Civilization V", "source_ports": [], "version": "" }, "cockpit": { "description": "Cockpit lets you access and configure your server remotely.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9090", "tcp" ] ], "protocols": [], "short": "Cockpit", "source_ports": [], "version": "" }, "collectd": { "description": "Collectd is a monitoring system that allows metrics to be sent over the network. This rule allows incoming collectd traffic from remote boxes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25826", "udp" ] ], "protocols": [], "short": "Collectd", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9618", "tcp" ] ], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "cratedb": { "description": "CrateDB is a distributed SQL database management system that integrates a fully searchable document oriented data store.", "destination": {}, "helpers": [], "includes": [ "postgresql" ], "modules": [], "ports": [ [ "4200", "tcp" ], [ "4300", "tcp" ] ], "protocols": [], "short": "CrateDB", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4379", "tcp" ], [ "4379", "udp" ] ], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dds": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast and multicast service for domains with ID 0 through 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": {}, "helpers": [], "includes": [ "dds-multicast", "dds-unicast" ], "modules": [], "ports": [], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dds-multicast": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast service for domains with ID 0 to 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": { "ipv4": "239.255.0.1" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7400-7401", "udp" ], [ "7650-7651", "udp" ], [ "7900-7901", "udp" ], [ "8150-8151", "udp" ], [ "8400-8401", "udp" ], [ "8650-8651", "udp" ], [ "8900-8901", "udp" ], [ "9150-9151", "udp" ], [ "9400-9401", "udp" ], [ "9650-9651", "udp" ], [ "9900-9901", "udp" ] ], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dds-unicast": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast service for domains with ID 0 ito 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7402-7649", "udp" ], [ "7652-7899", "udp" ], [ "7902-8149", "udp" ], [ "8152-8339", "udp" ], [ "8402-8649", "udp" ], [ "8652-8899", "udp" ], [ "8902-9149", "udp" ], [ "9152-9339", "udp" ], [ "9402-9649", "udp" ], [ "9652-9899", "udp" ], [ "9902-10149", "udp" ] ], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "67", "udp" ] ], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "547", "udp" ] ], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "destination": { "ipv6": "fe80::/64" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "546", "udp" ] ], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3632", "tcp" ] ], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "53", "tcp" ], [ "53", "udp" ] ], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "dns-over-tls": { "description": "DNS over TLS (DoT) is a security protocol for encrypting and wrapping Domain Name System (DNS) queries and answers via the Transport Layer Security (TLS) protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "853", "tcp" ] ], "protocols": [], "short": "DNS over TLS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5000", "tcp" ] ], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2377", "tcp" ], [ "7946", "tcp" ], [ "7946", "udp" ], [ "4789", "udp" ] ], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "17500", "udp" ], [ "17500", "tcp" ] ], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9300", "tcp" ], [ "9200", "tcp" ] ], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2379", "tcp" ] ], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2380", "tcp" ] ], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "factorio": { "description": " Factorio is a game about building and creating automated factories to produce items of increasing complexity, within an infinite 2D world. Use your imagination to design your factory, combine simple elements into ingenious structures, and finally protect it from the creatures who don't really like you. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "34197", "udp" ] ], "protocols": [], "short": "Factorio", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "79", "tcp" ] ], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "foreman": { "description": "Foreman is a complete lifecycle management tool for physical and virtual servers.", "destination": {}, "helpers": [], "includes": [ "dns", "http", "https", "dhcp", "tftp" ], "modules": [], "ports": [ [ "68", "udp" ], [ "8140", "tcp" ] ], "protocols": [], "short": "foreman", "source_ports": [], "version": "" }, "foreman-proxy": { "description": "The Smart Proxy is a project which provides a restful API to various sub-systems.", "destination": {}, "helpers": [], "includes": [ "foreman" ], "modules": [], "ports": [ [ "8443", "tcp" ] ], "protocols": [], "short": "foreman-proxy", "source_ports": [], "version": "" }, "freeipa-4": { "description": "FreeIPA is an integrated identity and authentication solution with Kerberos, LDAP, PKI, and web UI. Enable this option if you plan to provide a FreeIPA server. Enable the 'dns' service if this FreeIPA server provides DNS services, 'ntp' service if this FreeIPA server provides NTP services, and 'freeipa-trust' for cross-forest trusts with Active Directory.", "destination": {}, "helpers": [], "includes": [ "http", "https", "kerberos", "kpasswd", "ldap", "ldaps" ], "modules": [], "ports": [], "protocols": [], "short": "FreeIPA 4 server", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ], [ "443", "tcp" ], [ "88", "tcp" ], [ "88", "udp" ], [ "464", "tcp" ], [ "464", "udp" ], [ "123", "udp" ], [ "389", "tcp" ] ], "protocols": [], "short": "FreeIPA with LDAP (deprecated)", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ], [ "443", "tcp" ], [ "88", "tcp" ], [ "88", "udp" ], [ "464", "tcp" ], [ "464", "udp" ], [ "123", "udp" ], [ "636", "tcp" ] ], "protocols": [], "short": "FreeIPA with LDAPS (deprecated)", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7389", "tcp" ] ], "protocols": [], "short": "FreeIPA replication (deprecated)", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "135", "tcp" ], [ "138-139", "tcp" ], [ "138-139", "udp" ], [ "389", "tcp" ], [ "389", "udp" ], [ "445", "tcp" ], [ "445", "udp" ], [ "49152-65535", "tcp" ], [ "3268", "tcp" ] ], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "destination": {}, "helpers": [ "ftp" ], "includes": [], "modules": [], "ports": [ [ "21", "tcp" ] ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "galera": { "description": "MariaDB-Galera Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3306", "tcp" ], [ "4567", "tcp" ], [ "4568", "tcp" ], [ "4444", "tcp" ] ], "protocols": [], "short": "Galera", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8660", "tcp" ] ], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8651", "tcp" ] ], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9418", "tcp" ] ], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gpsd": { "description": "gpsd is a service daemon that monitors one or more GPSes or AIS receivers attached to a host computer through serial or USB ports, making all data on the location/course/velocity of the sensors available to be queried on TCP port 2947 of the host computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2947", "tcp" ] ], "protocols": [], "short": "gpsd", "source_ports": [], "version": "" }, "grafana": { "description": "Grafana is an open platform for beautiful analytics and monitoring", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3000", "tcp" ] ], "protocols": [], "short": "grafana", "source_ports": [], "version": "" }, "gre": { "description": "", "destination": {}, "helpers": [ "proto-gre" ], "includes": [], "modules": [], "ports": [], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2224", "tcp" ], [ "3121", "tcp" ], [ "5403", "tcp" ], [ "5404", "udp" ], [ "5405-5412", "udp" ], [ "9929", "tcp" ], [ "9929", "udp" ], [ "21064", "tcp" ] ], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ] ], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "http3": { "description": "HTTP/3 is a protocol used to serve Web pages that uses QUIC as the transport protocol. If you plan to make your HTTP/3 compatible Web server publicly available, enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "443", "udp" ] ], "protocols": [], "short": "WWW (HTTP/3)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "443", "tcp" ] ], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "ident": { "description": "The Identification Protocol as specified in RFC 1413, which is used to determine the identity of a user of a particular TCP connection.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "113", "tcp" ] ], "protocols": [], "short": "Ident Protocol", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "143", "tcp" ] ], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "993", "tcp" ] ], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipfs": { "description": "The InterPlanetary File System (IPFS) is a peer-to-peer hypermedia protocol designed to make the web faster, safer, and more open", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4001", "tcp" ], [ "4001", "udp" ] ], "protocols": [], "short": "IPFS", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "631", "tcp" ], [ "631", "udp" ] ], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "631", "udp" ] ], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) is the standardized IETF VPN architecture defined in RFC 4301. IPsec is negotiated using the IKEv1 (RFC 2409) or IKEv2 (RFC 7296) protocol, which in itself uses encryption and authentication. IPsec provides Internet Protocol (IP) packet encryption and authentication. Both IKE and IPsec can be encapsulated in UDP (RFC 3948) or TCP (RFC 8229 to make it easier to traverse NAT. Enabling this service will enable IKE, IPsec and their encapsulation protocols and ports. Note that IKE and IPsec can also be configured to use non-default ports, but this is not common practice.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "500", "udp" ], [ "4500", "udp" ], [ "4500", "tcp" ] ], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6667", "tcp" ] ], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6697", "tcp" ] ], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3260", "tcp" ], [ "3260", "udp" ] ], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3205", "tcp" ], [ "3205", "udp" ] ], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8080", "tcp" ] ], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "749", "tcp" ] ], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kdeconnect": { "description": "KDE Connect is an application to connect your phone to your computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1714-1764", "tcp" ], [ "1714-1764", "udp" ] ], "protocols": [], "short": "KDE Connect", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "88", "tcp" ], [ "88", "udp" ] ], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5601", "tcp" ] ], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "543", "tcp" ] ], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "464", "tcp" ], [ "464", "udp" ] ], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "754", "tcp" ] ], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "544", "tcp" ] ], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "kube-api": { "description": "Backwards compatibility after service renaming", "destination": {}, "helpers": [], "includes": [ "kubelet" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kube-apiserver": { "description": "The Kubernetes API server validates and configures data for the api objects which include pods, services, replicationcontrollers, and others.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6443", "tcp" ] ], "protocols": [], "short": "Kubernetes Api Server", "source_ports": [], "version": "" }, "kube-control-plane": { "description": "The Kubernetes Control-plane Node runs all the services of the Kubernetes Control Plane. This includes kube-apiserver, etcd, kube-schedule, kube-controller-manager, cloud-controller-manager, and others", "destination": {}, "helpers": [], "includes": [ "etcd-client", "etcd-server", "kube-apiserver", "kube-controller-manager", "kube-scheduler" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Control-plane Node", "source_ports": [], "version": "" }, "kube-control-plane-secure": { "description": "The Kubernetes Control-plane Node runs all the services of the Kubernetes Control Plane. This includes kube-apiserver, etcd, kube-schedule, kube-controller-manager, cloud-controller-manager, and others", "destination": {}, "helpers": [], "includes": [ "etcd-client", "etcd-server", "kube-apiserver", "kube-controller-manager-secure", "kube-scheduler-secure" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Control-plane Node - secure", "source_ports": [], "version": "" }, "kube-controller-manager": { "description": "The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10252", "tcp" ] ], "protocols": [], "short": "Kubernetes Controller Manager", "source_ports": [], "version": "" }, "kube-controller-manager-secure": { "description": "The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10257", "tcp" ] ], "protocols": [], "short": "Kubernetes Controller Manager - Secure", "source_ports": [], "version": "" }, "kube-nodeport-services": { "description": "Services of type NodePort expose a port on each worker", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "30000-32767", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kube-scheduler": { "description": "The Kubernetes scheduler is a policy-rich, topology-aware, workload-specific function that significantly impacts availability, performance, and capacity.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10251", "tcp" ] ], "protocols": [], "short": "Kubernetes Scheduler", "source_ports": [], "version": "" }, "kube-scheduler-secure": { "description": "The Kubernetes scheduler is a policy-rich, topology-aware, workload-specific function that significantly impacts availability, performance, and capacity.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10259", "tcp" ] ], "protocols": [], "short": "Kubernetes Scheduler - secure", "source_ports": [], "version": "" }, "kube-worker": { "description": "The Kubernetes Worker Node runs some (or sometimes all) of the workloads of the Kubernetes cluster. There might be NodoPort services associated with these workloads.", "destination": {}, "helpers": [], "includes": [ "kubelet", "kube-nodeport-services" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Worker Node", "source_ports": [], "version": "" }, "kubelet": { "description": "The kubelet API is used to communicate between kube-scheduler and the node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10250", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kubelet-readonly": { "description": "The kubelet API is used to communicate between kube-scheduler and the node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10255", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet read", "source_ports": [], "version": "" }, "kubelet-worker": { "description": "Backwards compatibility after service renaming", "destination": {}, "helpers": [], "includes": [ "kube-worker" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Worker Node", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "389", "tcp" ] ], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "636", "tcp" ] ], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "16509", "tcp" ] ], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "16514", "tcp" ] ], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9735", "tcp" ] ], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. In order to allow this host to resolve other hosts, use the llmnr-client service. ", "destination": {}, "helpers": [], "includes": [ "llmnr-tcp", "llmnr-udp" ], "modules": [], "ports": [], "protocols": [], "short": "LLMNR", "source_ports": [], "version": "" }, "llmnr-client": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service allows incoming LLMNR responses. Due to protocol details the service matches by source port and thus allows unsolicited responses. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "LLMNR Client", "source_ports": [ [ "5355", "udp" ] ], "version": "" }, "llmnr-tcp": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5355", "tcp" ] ], "protocols": [], "short": "LLMNR (TCP)", "source_ports": [], "version": "" }, "llmnr-udp": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. ", "destination": { "ipv4": "224.0.0.252", "ipv6": "ff02::1:3" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5355", "udp" ] ], "protocols": [], "short": "LLMNR (UDP)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4190", "tcp" ] ], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "destination": {}, "helpers": [], "includes": [ "https" ], "modules": [], "ports": [ [ "8448", "tcp" ] ], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "destination": { "ipv4": "224.0.0.251", "ipv6": "ff02::fb" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5353", "udp" ] ], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "memcache": { "description": "memcache is a high-performance object caching system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "11211", "tcp" ], [ "11211", "udp" ] ], "protocols": [], "short": "memcache", "source_ports": [], "version": "" }, "minecraft": { "description": " Minecraft is a sandbox game developed by Mojang Studios. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25565", "tcp" ], [ "25565", "udp" ] ], "protocols": [], "short": "Minecraft", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "destination": {}, "helpers": [], "includes": [ "ssdp" ], "modules": [], "ports": [ [ "8200", "tcp" ] ], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "27017", "tcp" ] ], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "60000-61000", "udp" ] ], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "20048", "tcp" ], [ "20048", "udp" ] ], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1883", "tcp" ] ], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8883", "tcp" ] ], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "destination": {}, "helpers": [], "includes": [ "rdp" ], "modules": [], "ports": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1433", "tcp" ] ], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "64738", "tcp" ], [ "64738", "udp" ] ], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3306", "tcp" ] ], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nbd": { "description": "Network Block Device (NBD) is a high-performance protocol for exporting disk images between machines.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10809", "tcp" ] ], "protocols": [], "short": "NBD", "source_ports": [], "version": "" }, "nebula": { "description": "Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. The port needs to be open if the host is set as lighthouse.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4242", "udp" ] ], "protocols": [], "short": "Nebula", "source_ports": [], "version": "" }, "need-for-speed-most-wanted": { "description": " Need for Speed: Most Wanted is a 2005 open-world racing video game, and the ninth installment in the Need for Speed series. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "13505", "tcp" ], [ "30900-30999", "tcp" ], [ "3658", "udp" ] ], "protocols": [], "short": "Need for Speed: Most Wanted", "source_ports": [], "version": "" }, "netbios-ns": { "description": "This allows you to find Windows (Samba) servers that share files and printers.", "destination": {}, "helpers": [ "netbios-ns" ], "includes": [], "modules": [], "ports": [ [ "137", "udp" ] ], "protocols": [], "short": "NetBIOS NS", "source_ports": [], "version": "" }, "netdata-dashboard": { "description": "Netdata dashboard is a place to view the results of the netdata monitoring agent", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "19999", "tcp" ] ], "protocols": [], "short": "Netdata Dashboard", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2049", "tcp" ] ], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2049", "tcp" ], [ "2049", "udp" ] ], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10110", "tcp" ], [ "10110", "udp" ] ], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5666", "tcp" ] ], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "123", "udp" ] ], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3493", "tcp" ] ], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "opentelemetry": { "description": "OpenTelemetry Protocol (OTLP) specification describes the encoding, transport, and delivery mechanism of telemetry data between telemetry sources, intermediate nodes such as collectors and telemetry backends.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4317", "tcp" ], [ "4318", "tcp" ] ], "protocols": [], "short": "OTLP", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1194", "udp" ] ], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "54322", "tcp" ] ], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "55863", "tcp" ], [ "39543", "tcp" ] ], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2223", "tcp" ] ], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": "Plex Media Server (PMS) is the back-end media server component of Plex. It organizes content from personal media libraries and streams it to the network.", "destination": {}, "helpers": [], "includes": [ "ssdp" ], "modules": [], "ports": [ [ "32400", "tcp" ], [ "32400", "udp" ], [ "32469", "tcp" ], [ "3005", "tcp" ], [ "8324", "tcp" ], [ "32410", "udp" ], [ "32412", "udp" ], [ "32413", "udp" ], [ "32414", "udp" ] ], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44321", "tcp" ] ], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44322", "tcp" ] ], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44323", "tcp" ] ], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44324", "tcp" ] ], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "110", "tcp" ] ], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "995", "tcp" ] ], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5432", "tcp" ] ], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8118", "tcp" ] ], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "prometheus": { "description": "The Prometheus monitoring system and time series database.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9090", "tcp" ] ], "protocols": [], "short": "prometheus", "source_ports": [], "version": "" }, "prometheus-node-exporter": { "description": "The node-exporter agent for Prometheus monitoring system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9100", "tcp" ] ], "protocols": [], "short": "prometheus-node-exporter", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4011", "udp" ] ], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ps2link": { "description": "ps2link is a protocol used for interacting with a PlayStation 2 system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18194", "udp" ], [ "18193", "tcp" ] ], "protocols": [], "short": "ps2link", "source_ports": [], "version": "" }, "ps3netsrv": { "description": "PS3 Network Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "38008", "tcp" ] ], "protocols": [], "short": "ps3netsrv", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "319", "udp" ], [ "320", "udp" ] ], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4713", "tcp" ] ], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8140", "tcp" ] ], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4242", "tcp" ] ], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1812", "tcp" ], [ "1812", "udp" ], [ "1813", "tcp" ], [ "1813", "udp" ] ], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "rdp": { "description": "Microsoft's Remote Desktop Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3389", "tcp" ] ], "protocols": [], "short": "rdp", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6379", "tcp" ] ], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "redis-sentinel": { "description": "Redis Sentinel provides high availability for Redis.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "26379", "tcp" ] ], "protocols": [], "short": "redis-sentinel", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "111", "tcp" ], [ "111", "udp" ] ], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rquotad": { "description": "Remote Quota Server Daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "875", "tcp" ], [ "875", "udp" ] ], "protocols": [], "short": "rquotad", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "514", "tcp" ] ], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "873", "tcp" ], [ "873", "udp" ] ], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "554", "tcp" ], [ "554", "udp" ] ], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4505", "tcp" ], [ "4506", "tcp" ] ], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "samba-client" ], "modules": [], "ports": [ [ "139", "tcp" ], [ "445", "tcp" ] ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "netbios-ns" ], "modules": [], "ports": [ [ "138", "udp" ] ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "samba", "dns", "kerberos", "ldap", "ldaps", "kpasswd" ], "modules": [], "ports": [ [ "135", "tcp" ], [ "389", "udp" ], [ "49152-65535", "tcp" ], [ "3268", "tcp" ], [ "3269", "tcp" ] ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "destination": {}, "helpers": [ "sane" ], "includes": [], "modules": [], "ports": [ [ "6566", "tcp" ] ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "settlers-history-collection": { "description": "The Settlers History Collection includes History Editions of all seven previous Settlers games, which includes gold versions of each game with all expansions.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1005", "udp" ], [ "1100", "udp" ], [ "3074", "udp" ], [ "6200", "udp" ], [ "6300", "udp" ] ], "protocols": [], "short": "The Settlers History Collection", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "destination": {}, "helpers": [ "sip" ], "includes": [], "modules": [], "ports": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5061", "tcp" ], [ "5061", "udp" ] ], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "427", "tcp" ], [ "427", "udp" ] ], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25", "tcp" ] ], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "587", "tcp" ] ], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "465", "tcp" ] ], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "161", "tcp" ], [ "161", "udp" ] ], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptls": { "description": "Simple Network Management Protocol over TLS/DTLS is an \"Internet-standard protocol for managing devices on IP networks\" protected by TLS. Enable this service if you run SNMP agent (server).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10161", "tcp" ], [ "10161", "udp" ] ], "protocols": [], "short": "Secure SNMP (TLS)", "source_ports": [], "version": "" }, "snmptls-trap": { "description": "Secure SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message. This port is protected by TLS.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10162", "tcp" ], [ "10162", "udp" ] ], "protocols": [], "short": "Secure SNMPTRAP (TLS)", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "162", "tcp" ], [ "162", "udp" ] ], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "21327", "udp" ], [ "21328", "udp" ] ], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "spotify-sync": { "description": "The Spotify Client allows you to sync local music files with your phone.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "57621", "udp" ], [ "57621", "tcp" ] ], "protocols": [], "short": "Spotify Client Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3128", "tcp" ] ], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssdp": { "description": "The Simple Service Discovery Protocol (SSDP) is a network protocol based on the Internet protocol suite for advertisement and discovery of network services and presence information.", "destination": { "ipv4": "239.255.255.250", "ipv6": "ff02::c" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1900", "udp" ] ], "protocols": [], "short": "Simple Service Discovery Protocol (SSDP)", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22", "tcp" ] ], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "statsrv": { "description": " Statistics Server protocol provides a way to give statistics about a system to the outside world. Defined in RFC-996", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "133", "tcp" ], [ "133", "udp" ] ], "protocols": [], "short": "Statistics Server", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "27036", "tcp" ], [ "27037", "tcp" ], [ "27031-27036", "udp" ] ], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "stellaris": { "description": " Explore a galaxy full of wonders in this sci-fi grand strategy game from Paradox Development Studios. Interact with diverse alien races, discover strange new worlds with unexpected events and expand the reach of your empire. Each new adventure holds almost limitless possibilities. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "17780-17785", "udp" ] ], "protocols": [], "short": "Stellaris", "source_ports": [], "version": "" }, "stronghold-crusader": { "description": " The highly anticipated sequel to the best-selling Stronghold, Stronghold Crusader (HD) throws you into historic battles and castle sieges from the Crusades with fiendish AI opponents, new units, 4 historical campaigns and over 100 unique skirmish missions. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2300-2400", "tcp" ], [ "47624", "tcp" ], [ "2300-2400", "udp" ] ], "protocols": [], "short": "Stronghold Crusader", "source_ports": [], "version": "" }, "supertuxkart": { "description": " SuperTuxKart is a 3D open-source kart racing game. It aims towards fun for players of all skill levels, with item boxes giving random items, nitro, drifting and more. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2759", "tcp" ], [ "2759", "udp" ], [ "2757", "udp" ], [ "2757", "tcp" ] ], "protocols": [], "short": "SuperTuxKart", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6419", "tcp" ], [ "6419", "udp" ] ], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3690", "tcp" ] ], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a peer-to-peer file synchronization service. Enable this option, if you plan to run the Syncthing service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22000", "tcp" ], [ "22000", "udp" ], [ "21027", "udp" ] ], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8384", "tcp" ] ], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "syncthing-relay": { "description": "Syncthing is a peer-to-peer file synchronization service. Only enable this option if you run a Syncthing relay server. This separate program (syncthing-relaysrv or relaysrv) is not needed for normal Syncthing usage.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22067", "tcp" ], [ "22070", "tcp" ] ], "protocols": [], "short": "Syncthing Relay", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "24800", "tcp" ] ], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syscomlan": { "description": "Local system communication", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1065", "tcp" ], [ "1065", "udp" ] ], "protocols": [], "short": "syscomlan", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "514", "udp" ] ], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6514", "tcp" ], [ "6514", "udp" ] ], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "23", "tcp" ] ], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tentacle": { "description": "Tentacle is a protocol for monitoring computer networks. Pandora FMS is one server implementation.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "41121", "tcp" ] ], "protocols": [], "short": "tentacle", "source_ports": [], "version": "" }, "terraria": { "description": " Dig, fight, explore, build! Nothing is impossible in this action-packed adventure game. Four Pack also available! ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7777", "tcp" ] ], "protocols": [], "short": "Terraria", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in a simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "destination": {}, "helpers": [ "tftp" ], "includes": [], "modules": [], "ports": [ [ "69", "udp" ] ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tile38": { "description": "Tile38 is a geospatial database, spatial index, and realtime geofence.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9851", "tcp" ] ], "protocols": [], "short": "tile38", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "655", "tcp" ], [ "655", "udp" ] ], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9050", "tcp" ] ], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "51413", "tcp" ], [ "51413", "udp" ] ], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "54321", "tcp" ], [ "5900-6923", "tcp" ], [ "49152-49216", "tcp" ] ], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5900-5903", "tcp" ] ], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "warpinator": { "description": "Warpinator is a file sharing app developed by Linux Mint. Warpinator allows you to send and receive files between computers that are on the same network without the need for any servers or special configuration.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "42000", "tcp" ], [ "42000", "udp" ], [ "42001", "tcp" ] ], "protocols": [], "short": "Warpinator", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5988", "tcp" ] ], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5989", "tcp" ] ], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wireguard": { "description": "WireGuard is the simple, fast and modern VPN. The port needs to be open if a peer has this host explicitly configured as endpoint.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "51820", "udp" ] ], "protocols": [], "short": "WireGuard", "source_ports": [], "version": "" }, "ws-discovery": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": {}, "helpers": [], "includes": [ "ws-discovery-tcp", "ws-discovery-udp" ], "modules": [], "ports": [], "protocols": [], "short": "WS-Discovery", "source_ports": [], "version": "" }, "ws-discovery-client": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network. Use only in trusted zones.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "WS-Discovery Client", "source_ports": [ [ "3702", "udp" ] ], "version": "" }, "ws-discovery-tcp": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3702", "tcp" ] ], "protocols": [], "short": "WS-Discovery (TCP)", "source_ports": [], "version": "" }, "ws-discovery-udp": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": { "ipv4": "239.255.255.250", "ipv6": "ff02::c" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3702", "udp" ] ], "protocols": [], "short": "WS-Discovery (UDP)", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5985", "tcp" ] ], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5986", "tcp" ] ], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "177", "tcp" ], [ "177", "udp" ] ], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5280", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5222", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5298", "tcp" ] ], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5269", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Listen port used by Zabbix agents deployed on monitoring targets.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10050", "tcp" ] ], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-java-gateway": { "description": "Listen port for Zabbix Java Gateway for monitoring Java applications over JMX.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10052", "tcp" ] ], "protocols": [], "short": "Zabbix Java Gateway", "source_ports": [], "version": "" }, "zabbix-server": { "description": "This is an alias for zabbix-trapper. This definition is deprecated in favor of zabbix-trapper.", "destination": {}, "helpers": [], "includes": [ "zabbix-trapper" ], "modules": [], "ports": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" }, "zabbix-trapper": { "description": "Trapper port to receive monitoring data used by the Zabbix server and Zabbix proxy.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10051", "tcp" ] ], "protocols": [], "short": "Zabbix Trapper", "source_ports": [], "version": "" }, "zabbix-web-service": { "description": "Listen port of Zabbix web service for receiving HTTP based reporting requests.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10053", "tcp" ] ], "protocols": [], "short": "Zabbix Web Service", "source_ports": [], "version": "" }, "zero-k": { "description": " With 100+ truly unique units, Zero-K is an RTS of freedom and creativity, tempered by a decade of refinement. Sculpt land into a castle and throw invaders off it with a Jugglenaut. Explore a massive campaign, solo or co-op. Hop online for epic 32 player battles or fast paced 1v1, on 100s of maps. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8452", "udp" ] ], "protocols": [], "short": "Zero-K", "source_ports": [], "version": "" }, "zerotier": { "description": "ZeroTier creates secure networks between on-premise, cloud, desktop, and mobile devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9993", "udp" ] ], "protocols": [], "short": "ZeroTier", "source_ports": [], "version": "" } }, "zones": { "FedoraServer": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "cockpit" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "FedoraWorkstation": { "description": "Unsolicited incoming network packets are rejected from port 1 to 1024, except for select network services. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [ [ "1025-65535", "udp" ], [ "1025-65535", "tcp" ] ], "protocols": [], "rules_str": [], "services": [ "dhcpv6-client", "ssh", "samba-client" ], "short": "Fedora Workstation", "source_ports": [], "sources": [], "target": "default", "version": "" }, "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "nm-shared": { "description": " This zone is used internally by NetworkManager when activating a profile that uses connection sharing and doesn't have an explicit firewall zone set. Block all traffic to the local machine except ICMP, ICMPv6, DHCP and DNS. Allow all forwarded traffic. Note that future package updates may change the definition of the zone unless you overwrite it with your own definition. ", "egress_priority": 0, "forward": false, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [ "icmp", "ipv6-icmp" ], "rules_str": [ "rule priority=\"32767\" reject" ], "services": [ "dhcp", "dns", "ssh" ], "short": "NetworkManager Shared", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } } }, "default_zone": "public" } }, "changed": false } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.158) 0:00:23.817 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.017) 0:00:23.834 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.025) 0:00:23.860 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.013) 0:00:23.873 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.012) 0:00:23.886 ******* skipping: [sut] => { "false_condition": "__firewall_previous_replaced | bool" } TASK [Fail if default settings values not dictionaries] ************************ task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:103 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.015) 0:00:23.901 ******* skipping: [sut] => (item={'internal': {'version': '', 'short': 'Internal', 'description': 'For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.', 'target': 'default', 'services': ['ssh', 'mdns', 'samba-client', 'dhcpv6-client'], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'external': {'version': '', 'short': 'External', 'description': 'For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', 'target': 'default', 'services': ['ssh'], 'ports': [], 'icmp_blocks': [], 'masquerade': True, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'public': {'version': '', 'short': 'Public', 'description': 'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', 'target': 'default', 'services': ['ssh', 'mdns', 'dhcpv6-client', 'https'], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'nm-shared': {'version': '', 'short': 'NetworkManager Shared', 'description': " This zone is used internally by NetworkManager when activating a profile that uses connection sharing and doesn't have an explicit firewall zone set. Block all traffic to the local machine except ICMP, ICMPv6, DHCP and DNS. Allow all forwarded traffic. Note that future package updates may change the definition of the zone unless you overwrite it with your own definition. ", 'target': 'ACCEPT', 'services': ['dhcp', 'dns', 'ssh'], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': ['rule priority="32767" reject'], 'protocols': ['icmp', 'ipv6-icmp'], 'source_ports': [], 'icmp_block_inversion': False, 'forward': False, 'ingress_priority': 0, 'egress_priority': 0}, 'FedoraWorkstation': {'version': '', 'short': 'Fedora Workstation', 'description': 'Unsolicited incoming network packets are rejected from port 1 to 1024, except for select network services. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.', 'target': 'default', 'services': ['dhcpv6-client', 'ssh', 'samba-client'], 'ports': [['1025-65535', 'udp'], ['1025-65535', 'tcp']], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'trusted': {'version': '', 'short': 'Trusted', 'description': 'All network connections are accepted.', 'target': 'ACCEPT', 'services': [], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'drop': {'version': '', 'short': 'Drop', 'description': 'Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.', 'target': 'DROP', 'services': [], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'work': {'version': '', 'short': 'Work', 'description': 'For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', 'target': 'default', 'services': ['ssh', 'mdns', 'dhcpv6-client'], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'FedoraServer': {'version': '', 'short': 'Public', 'description': 'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', 'target': 'default', 'services': ['ssh', 'dhcpv6-client', 'cockpit'], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'home': {'version': '', 'short': 'Home', 'description': 'For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', 'target': 'default', 'services': ['ssh', 'mdns', 'samba-client', 'dhcpv6-client'], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'block': {'version': '', 'short': 'Block', 'description': 'Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.', 'target': '%%REJECT%%', 'services': [], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}, 'dmz': {'version': '', 'short': 'DMZ', 'description': 'For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.', 'target': 'default', 'services': ['ssh'], 'ports': [], 'icmp_blocks': [], 'masquerade': False, 'forward_ports': [], 'interfaces': [], 'sources': [], 'rules_str': [], 'protocols': [], 'source_ports': [], 'icmp_block_inversion': False, 'forward': True, 'ingress_priority': 0, 'egress_priority': 0}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "FedoraServer": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "dhcpv6-client", "cockpit" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "FedoraWorkstation": { "description": "Unsolicited incoming network packets are rejected from port 1 to 1024, except for select network services. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [ [ "1025-65535", "udp" ], [ "1025-65535", "tcp" ] ], "protocols": [], "rules_str": [], "services": [ "dhcpv6-client", "ssh", "samba-client" ], "short": "Fedora Workstation", "source_ports": [], "sources": [], "target": "default", "version": "" }, "block": { "description": "Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Block", "source_ports": [], "sources": [], "target": "%%REJECT%%", "version": "" }, "dmz": { "description": "For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "DMZ", "source_ports": [], "sources": [], "target": "default", "version": "" }, "drop": { "description": "Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Drop", "source_ports": [], "sources": [], "target": "DROP", "version": "" }, "external": { "description": "For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": true, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh" ], "short": "External", "source_ports": [], "sources": [], "target": "default", "version": "" }, "home": { "description": "For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Home", "source_ports": [], "sources": [], "target": "default", "version": "" }, "internal": { "description": "For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "samba-client", "dhcpv6-client" ], "short": "Internal", "source_ports": [], "sources": [], "target": "default", "version": "" }, "nm-shared": { "description": " This zone is used internally by NetworkManager when activating a profile that uses connection sharing and doesn't have an explicit firewall zone set. Block all traffic to the local machine except ICMP, ICMPv6, DHCP and DNS. Allow all forwarded traffic. Note that future package updates may change the definition of the zone unless you overwrite it with your own definition. ", "egress_priority": 0, "forward": false, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [ "icmp", "ipv6-icmp" ], "rules_str": [ "rule priority=\"32767\" reject" ], "services": [ "dhcp", "dns", "ssh" ], "short": "NetworkManager Shared", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "public": { "description": "For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client", "https" ], "short": "Public", "source_ports": [], "sources": [], "target": "default", "version": "" }, "trusted": { "description": "All network connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [], "short": "Trusted", "source_ports": [], "sources": [], "target": "ACCEPT", "version": "" }, "work": { "description": "For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.", "egress_priority": 0, "forward": true, "forward_ports": [], "icmp_block_inversion": false, "icmp_blocks": [], "ingress_priority": 0, "interfaces": [], "masquerade": false, "ports": [], "protocols": [], "rules_str": [], "services": [ "ssh", "mdns", "dhcpv6-client" ], "short": "Work", "source_ports": [], "sources": [], "target": "default", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'transmission-client': {'version': '', 'short': 'Transmission', 'description': 'Transmission is a lightweight BitTorrent client.', 'ports': [['51413', 'tcp'], ['51413', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kerberos': {'version': '', 'short': 'Kerberos', 'description': 'Kerberos network authentication protocol server', 'ports': [['88', 'tcp'], ['88', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'condor-collector': {'version': '', 'short': 'HT Condor Collector', 'description': 'The HT Condor Collector is needed to organize the condor worker nodes.', 'ports': [['9618', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ircs': {'version': '', 'short': 'IRC TLS/SSL', 'description': 'An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.', 'ports': [['6697', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'libvirt-tls': {'version': '', 'short': 'Virtual Machine Management (TLS)', 'description': 'Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.', 'ports': [['16514', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'xmpp-server': {'version': '', 'short': 'XMPP (Jabber) server', 'description': 'Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.', 'ports': [['5269', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'tor-socks': {'version': '', 'short': 'Tor - SOCKS Proxy', 'description': "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", 'ports': [['9050', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ovirt-imageio': {'version': '', 'short': 'oVirt Image I/O', 'description': 'oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.', 'ports': [['54322', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ssh': {'version': '', 'short': 'SSH', 'description': 'Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.', 'ports': [['22', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'wsmans': {'version': '', 'short': 'wsmans', 'description': 'Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.', 'ports': [['5986', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'tinc': {'version': '', 'short': 'tinc VPN', 'description': 'tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.', 'ports': [['655', 'tcp'], ['655', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'statsrv': {'version': '', 'short': 'Statistics Server', 'description': ' Statistics Server protocol provides a way to give statistics about a system to the outside world. Defined in RFC-996', 'ports': [['133', 'tcp'], ['133', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'iscsi-target': {'version': '', 'short': 'iSCSI target', 'description': 'Internet SCSI target is a storage resource located on an iSCSI server.', 'ports': [['3260', 'tcp'], ['3260', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'smtp-submission': {'version': '', 'short': 'Mail (SMTP-Submission)', 'description': 'SMTP-Submission allows remote users to submit mail over port 587.', 'ports': [['587', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kibana': {'version': '', 'short': 'Kibana', 'description': 'Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.', 'ports': [['5601', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ws-discovery-client': {'version': '', 'short': 'WS-Discovery Client', 'description': 'Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network. Use only in trusted zones.', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [['3702', 'udp']], 'includes': [], 'helpers': []}, 'ipfs': {'version': '', 'short': 'IPFS', 'description': 'The InterPlanetary File System (IPFS) is a peer-to-peer hypermedia protocol designed to make the web faster, safer, and more open', 'ports': [['4001', 'tcp'], ['4001', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kube-nodeport-services': {'version': '', 'short': 'Kubernetes Kubelet', 'description': 'Services of type NodePort expose a port on each worker', 'ports': [['30000-32767', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'snmptls': {'version': '', 'short': 'Secure SNMP (TLS)', 'description': 'Simple Network Management Protocol over TLS/DTLS is an "Internet-standard protocol for managing devices on IP networks" protected by TLS. Enable this service if you run SNMP agent (server).', 'ports': [['10161', 'tcp'], ['10161', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'dns': {'version': '', 'short': 'DNS', 'description': 'The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).', 'ports': [['53', 'tcp'], ['53', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ovirt-vmconsole': {'version': '', 'short': 'oVirt VM Console', 'description': 'oVirt VM Consoles enables secure access to virtual machine serial console.', 'ports': [['2223', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'syslog-tls': {'version': '', 'short': 'syslog-tls', 'description': 'Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.', 'ports': [['6514', 'tcp'], ['6514', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'pulseaudio': {'version': '', 'short': 'PulseAudio', 'description': 'A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.', 'ports': [['4713', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'syncthing': {'version': '', 'short': 'Syncthing', 'description': 'Syncthing is a peer-to-peer file synchronization service. Enable this option, if you plan to run the Syncthing service.', 'ports': [['22000', 'tcp'], ['22000', 'udp'], ['21027', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'vdsm': {'version': '', 'short': "oVirt's Virtual Desktop and Server Manager", 'description': "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", 'ports': [['54321', 'tcp'], ['5900-6923', 'tcp'], ['49152-49216', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ganglia-master': {'version': '', 'short': 'ganglia-master', 'description': 'Ganglia collector', 'ports': [['8651', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kubelet-worker': {'version': '', 'short': 'Kubernetes Worker Node', 'description': 'Backwards compatibility after service renaming', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['kube-worker'], 'helpers': []}, 'nut': {'version': '', 'short': 'NUT', 'description': 'Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.', 'ports': [['3493', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'smtp': {'version': '', 'short': 'Mail (SMTP)', 'description': "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", 'ports': [['25', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'nmea-0183': {'version': '', 'short': 'nmea-0183', 'description': 'NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.', 'ports': [['10110', 'tcp'], ['10110', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'xmpp-local': {'version': '', 'short': 'XMPP Link-Local Messaging', 'description': 'Serverless XMPP-like communication over local networks based on zero-configuration networking.', 'ports': [['5298', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'RH-Satellite-6': {'version': '', 'short': 'Red Hat Satellite 6', 'description': 'Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.', 'ports': [['5000', 'tcp'], ['5646-5647', 'tcp'], ['5671', 'tcp'], ['8000', 'tcp'], ['8080', 'tcp'], ['9090', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['foreman'], 'helpers': []}, 'nfs3': {'version': '', 'short': 'NFS3', 'description': 'The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.', 'ports': [['2049', 'tcp'], ['2049', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ws-discovery-tcp': {'version': '', 'short': 'WS-Discovery (TCP)', 'description': 'Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.', 'ports': [['3702', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kube-control-plane': {'version': '', 'short': 'Kubernetes Control-plane Node', 'description': 'The Kubernetes Control-plane Node runs all the services of the Kubernetes Control Plane. This includes kube-apiserver, etcd, kube-schedule, kube-controller-manager, cloud-controller-manager, and others', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['etcd-client', 'etcd-server', 'kube-apiserver', 'kube-controller-manager', 'kube-scheduler'], 'helpers': []}, 'cratedb': {'version': '', 'short': 'CrateDB', 'description': 'CrateDB is a distributed SQL database management system that integrates a fully searchable document oriented data store.', 'ports': [['4200', 'tcp'], ['4300', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['postgresql'], 'helpers': []}, 'ipp-client': {'version': '', 'short': 'Network Printing Client (IPP)', 'description': 'The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.', 'ports': [['631', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'upnp-client': {'version': '', 'short': 'UPnP Client', 'description': 'Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [['1900', 'udp']], 'includes': [], 'helpers': []}, 'irc': {'version': '', 'short': 'IRC', 'description': 'An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.', 'ports': [['6667', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'llmnr-client': {'version': '', 'short': 'LLMNR Client', 'description': ' Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service allows incoming LLMNR responses. Due to protocol details the service matches by source port and thus allows unsolicited responses. ', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [['5355', 'udp']], 'includes': [], 'helpers': []}, 'dhcpv6': {'version': '', 'short': 'DHCPv6', 'description': 'This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.', 'ports': [['547', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'telnet': {'version': '', 'short': 'Telnet', 'description': 'Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.', 'ports': [['23', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ftp': {'version': '', 'short': 'FTP', 'description': 'FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.', 'ports': [['21', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': ['ftp']}, 'netdata-dashboard': {'version': '', 'short': 'Netdata Dashboard', 'description': 'Netdata dashboard is a place to view the results of the netdata monitoring agent', 'ports': [['19999', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'mosh': {'version': '', 'short': 'Mobile shell that supports roaming and intelligent local echo.', 'description': 'Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of "network lag" on high-latency connections.', 'ports': [['60000-61000', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'https': {'version': '', 'short': 'Secure WWW (HTTPS)', 'description': 'HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.', 'ports': [['443', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ctdb': {'version': '', 'short': 'CTDB', 'description': 'CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.', 'ports': [['4379', 'tcp'], ['4379', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'syscomlan': {'version': '', 'short': 'syscomlan', 'description': 'Local system communication', 'ports': [['1065', 'tcp'], ['1065', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'freeipa-4': {'version': '', 'short': 'FreeIPA 4 server', 'description': "FreeIPA is an integrated identity and authentication solution with Kerberos, LDAP, PKI, and web UI. Enable this option if you plan to provide a FreeIPA server. Enable the 'dns' service if this FreeIPA server provides DNS services, 'ntp' service if this FreeIPA server provides NTP services, and 'freeipa-trust' for cross-forest trusts with Active Directory.", 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['http', 'https', 'kerberos', 'kpasswd', 'ldap', 'ldaps'], 'helpers': []}, 'cfengine': {'version': '', 'short': 'CFEngine', 'description': 'CFEngine server', 'ports': [['5308', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'foreman': {'version': '', 'short': 'foreman', 'description': 'Foreman is a complete lifecycle management tool for physical and virtual servers.', 'ports': [['68', 'udp'], ['8140', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['dns', 'http', 'https', 'dhcp', 'tftp'], 'helpers': []}, 'pop3s': {'version': '', 'short': 'POP-3 over SSL', 'description': 'The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).', 'ports': [['995', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kube-scheduler-secure': {'version': '', 'short': 'Kubernetes Scheduler - secure', 'description': 'The Kubernetes scheduler is a policy-rich, topology-aware, workload-specific function that significantly impacts availability, performance, and capacity.', 'ports': [['10259', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'docker-swarm': {'version': '', 'short': 'Docker integrated swarm mode', 'description': 'Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.', 'ports': [['2377', 'tcp'], ['7946', 'tcp'], ['7946', 'udp'], ['4789', 'udp']], 'modules': [], 'destination': {}, 'protocols': ['esp'], 'source_ports': [], 'includes': [], 'helpers': []}, 'http': {'version': '', 'short': 'WWW (HTTP)', 'description': 'HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.', 'ports': [['80', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'galera': {'version': '', 'short': 'Galera', 'description': 'MariaDB-Galera Database Server', 'ports': [['3306', 'tcp'], ['4567', 'tcp'], ['4568', 'tcp'], ['4444', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ovirt-storageconsole': {'version': '', 'short': 'oVirt Storage-Console', 'description': "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", 'ports': [['55863', 'tcp'], ['39543', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'samba-client': {'version': '', 'short': 'Samba Client', 'description': 'This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.', 'ports': [['138', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['netbios-ns'], 'helpers': []}, 'syncthing-relay': {'version': '', 'short': 'Syncthing Relay', 'description': 'Syncthing is a peer-to-peer file synchronization service. Only enable this option if you run a Syncthing relay server. This separate program (syncthing-relaysrv or relaysrv) is not needed for normal Syncthing usage.', 'ports': [['22067', 'tcp'], ['22070', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'mqtt-tls': {'version': '', 'short': 'mqtt-tls', 'description': 'The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.', 'ports': [['8883', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'pmproxy': {'version': '', 'short': 'Performance metrics proxy (pmproxy)', 'description': 'This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.', 'ports': [['44322', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'amqps': {'version': '', 'short': 'amqps', 'description': 'The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.', 'ports': [['5671', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'mountd': {'version': '', 'short': 'mountd', 'description': 'NFS Mount Lock Daemon', 'ports': [['20048', 'tcp'], ['20048', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ssdp': {'version': '', 'short': 'Simple Service Discovery Protocol (SSDP)', 'description': 'The Simple Service Discovery Protocol (SSDP) is a network protocol based on the Internet protocol suite for advertisement and discovery of network services and presence information.', 'ports': [['1900', 'udp']], 'modules': [], 'destination': {'ipv4': '239.255.255.250', 'ipv6': 'ff02::c'}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ws-discovery-udp': {'version': '', 'short': 'WS-Discovery (UDP)', 'description': 'Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.', 'ports': [['3702', 'udp']], 'modules': [], 'destination': {'ipv4': '239.255.255.250', 'ipv6': 'ff02::c'}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'quassel': {'version': '', 'short': 'Quassel IRC', 'description': 'Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.', 'ports': [['4242', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'settlers-history-collection': {'version': '', 'short': 'The Settlers History Collection', 'description': 'The Settlers History Collection includes History Editions of all seven previous Settlers games, which includes gold versions of each game with all expansions.', 'ports': [['1005', 'udp'], ['1100', 'udp'], ['3074', 'udp'], ['6200', 'udp'], ['6300', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'docker-registry': {'version': '', 'short': 'Docker Registry', 'description': 'Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.', 'ports': [['5000', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'syslog': {'version': '', 'short': 'syslog', 'description': 'Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.', 'ports': [['514', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'pop3': {'version': '', 'short': 'POP-3', 'description': 'The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).', 'ports': [['110', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'rsyncd': {'version': '', 'short': 'Rsync in daemon mode', 'description': 'Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.', 'ports': [['873', 'tcp'], ['873', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'redis': {'version': '', 'short': 'redis', 'description': 'Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.', 'ports': [['6379', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'dropbox-lansync': {'version': '1.0', 'short': 'dropboxlansync', 'description': 'Dropbox LAN sync', 'ports': [['17500', 'udp'], ['17500', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'murmur': {'version': '', 'short': 'Murmur', 'description': 'Murmur is the server of the Mumble VoIP chat system.', 'ports': [['64738', 'tcp'], ['64738', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'syncthing-gui': {'version': '', 'short': 'Syncthing GUI', 'description': 'Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).', 'ports': [['8384', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'libvirt': {'version': '', 'short': 'Virtual Machine Management', 'description': 'Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.', 'ports': [['16509', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'finger': {'version': '', 'short': 'finger', 'description': 'Finger is a protocol for obtaining information about users on remote hosts.', 'ports': [['79', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'zabbix-server': {'version': '', 'short': 'Zabbix Server', 'description': 'This is an alias for zabbix-trapper. This definition is deprecated in favor of zabbix-trapper.', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['zabbix-trapper'], 'helpers': []}, 'bb': {'version': '', 'short': 'Big Brother', 'description': 'Big Brother is a plain text protocol for sending and receiving client data, reports, and queries to a BB-compatible monitoring server or proxy. The standard IANA port for a listening Big Brother service is 1984, because of course it is.', 'ports': [['1984', 'tcp'], ['1984', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'snmptrap': {'version': '', 'short': 'SNMPTRAP', 'description': 'SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.', 'ports': [['162', 'tcp'], ['162', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'tentacle': {'version': '', 'short': 'tentacle', 'description': 'Tentacle is a protocol for monitoring computer networks. Pandora FMS is one server implementation.', 'ports': [['41121', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'svn': {'version': '', 'short': 'Subversion', 'description': 'The custom, unencrypted protocol used the Subversion Version Control System.', 'ports': [['3690', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'minidlna': {'version': '', 'short': 'MiniDLNA', 'description': 'MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.', 'ports': [['8200', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['ssdp'], 'helpers': []}, 'squid': {'version': '', 'short': 'squid', 'description': 'Squid HTTP proxy server', 'ports': [['3128', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'prometheus-node-exporter': {'version': '', 'short': 'prometheus-node-exporter', 'description': 'The node-exporter agent for Prometheus monitoring system.', 'ports': [['9100', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'RH-Satellite-6-capsule': {'version': '', 'short': 'Red Hat Satellite 6 Capsule', 'description': 'Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.', 'ports': [['8443', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['RH-Satellite-6'], 'helpers': []}, 'smtps': {'version': '', 'short': 'Mail (SMTP over SSL)', 'description': "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", 'ports': [['465', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'http3': {'version': '', 'short': 'WWW (HTTP/3)', 'description': 'HTTP/3 is a protocol used to serve Web pages that uses QUIC as the transport protocol. If you plan to make your HTTP/3 compatible Web server publicly available, enable this option.', 'ports': [['443', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ps3netsrv': {'version': '', 'short': 'ps3netsrv', 'description': 'PS3 Network Server', 'ports': [['38008', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'dds': {'version': '', 'short': 'OMG DDS', 'description': 'Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast and multicast service for domains with ID 0 through 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['dds-multicast', 'dds-unicast'], 'helpers': []}, 'llmnr-tcp': {'version': '', 'short': 'LLMNR (TCP)', 'description': ' Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. ', 'ports': [['5355', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'samba-dc': {'version': '', 'short': 'Samba DC', 'description': 'This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.', 'ports': [['135', 'tcp'], ['389', 'udp'], ['49152-65535', 'tcp'], ['3268', 'tcp'], ['3269', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['samba', 'dns', 'kerberos', 'ldap', 'ldaps', 'kpasswd'], 'helpers': []}, 'zabbix-trapper': {'version': '', 'short': 'Zabbix Trapper', 'description': 'Trapper port to receive monitoring data used by the Zabbix server and Zabbix proxy.', 'ports': [['10051', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bitcoin-testnet': {'version': '', 'short': 'Bitcoin testnet', 'description': 'The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.', 'ports': [['18333', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'snmp': {'version': '', 'short': 'SNMP', 'description': 'Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks". Enable this service if you run SNMP agent (server).', 'ports': [['161', 'tcp'], ['161', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'factorio': {'version': '', 'short': 'Factorio', 'description': " Factorio is a game about building and creating automated factories to produce items of increasing complexity, within an infinite 2D world. Use your imagination to design your factory, combine simple elements into ingenious structures, and finally protect it from the creatures who don't really like you. ", 'ports': [['34197', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ps2link': {'version': '', 'short': 'ps2link', 'description': 'ps2link is a protocol used for interacting with a PlayStation 2 system.', 'ports': [['18194', 'udp'], ['18193', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'dhcp': {'version': '', 'short': 'DHCP', 'description': 'This allows a DHCP server to accept messages from DHCP clients and relay agents.', 'ports': [['67', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'cockpit': {'version': '', 'short': 'Cockpit', 'description': 'Cockpit lets you access and configure your server remotely.', 'ports': [['9090', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'steam-streaming': {'version': '', 'short': 'Steam In-Home Streaming', 'description': "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", 'ports': [['27036', 'tcp'], ['27037', 'tcp'], ['27031-27036', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'sip': {'version': '', 'short': 'SIP', 'description': 'The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.', 'ports': [['5060', 'tcp'], ['5060', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': ['sip']}, 'prometheus': {'version': '', 'short': 'prometheus', 'description': 'The Prometheus monitoring system and time series database.', 'ports': [['9090', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'zero-k': {'version': '', 'short': 'Zero-K', 'description': ' With 100+ truly unique units, Zero-K is an RTS of freedom and creativity, tempered by a decade of refinement. Sculpt land into a castle and throw invaders off it with a Jugglenaut. Explore a massive campaign, solo or co-op. Hop online for epic 32 player battles or fast paced 1v1, on 100s of maps. ', 'ports': [['8452', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'redis-sentinel': {'version': '', 'short': 'redis-sentinel', 'description': 'Redis Sentinel provides high availability for Redis.', 'ports': [['26379', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'wsman': {'version': '', 'short': 'wsman', 'description': 'Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted', 'ports': [['5985', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kube-controller-manager-secure': {'version': '', 'short': 'Kubernetes Controller Manager - Secure', 'description': 'The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes.', 'ports': [['10257', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'lightning-network': {'version': '', 'short': 'Lightning Network', 'description': 'The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.', 'ports': [['9735', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'high-availability': {'version': '', 'short': 'Red Hat High Availability', 'description': 'This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.', 'ports': [['2224', 'tcp'], ['3121', 'tcp'], ['5403', 'tcp'], ['5404', 'udp'], ['5405-5412', 'udp'], ['9929', 'tcp'], ['9929', 'udp'], ['21064', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'stronghold-crusader': {'version': '', 'short': 'Stronghold Crusader', 'description': ' The highly anticipated sequel to the best-selling Stronghold, Stronghold Crusader (HD) throws you into historic battles and castle sieges from the Crusades with fiendish AI opponents, new units, 4 historical campaigns and over 100 unique skirmish missions. ', 'ports': [['2300-2400', 'tcp'], ['47624', 'tcp'], ['2300-2400', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'synergy': {'version': '', 'short': 'Synergy', 'description': 'Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.', 'ports': [['24800', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'need-for-speed-most-wanted': {'version': '', 'short': 'Need for Speed: Most Wanted', 'description': ' Need for Speed: Most Wanted is a 2005 open-world racing video game, and the ninth installment in the Need for Speed series. ', 'ports': [['13505', 'tcp'], ['30900-30999', 'tcp'], ['3658', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'vnc-server': {'version': '', 'short': 'Virtual Network Computing Server (VNC)', 'description': 'A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.', 'ports': [['5900-5903', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bittorrent-lsd': {'version': '', 'short': 'BitTorrent Local Peer Discovery (LSD)', 'description': 'Local Peer Discovery is a protocol designed to support the discovery of BitTorrent peers on a local area network. Enable this service if you run a BitTorrent client.', 'ports': [['6771', 'udp']], 'modules': [], 'destination': {'ipv4': '239.192.152.143', 'ipv6': 'ff15::efc0:988f'}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'freeipa-ldap': {'version': '', 'short': 'FreeIPA with LDAP (deprecated)', 'description': 'This service is deprecated. Please use freeipa-4 service instead.', 'ports': [['80', 'tcp'], ['443', 'tcp'], ['88', 'tcp'], ['88', 'udp'], ['464', 'tcp'], ['464', 'udp'], ['123', 'udp'], ['389', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bitcoin': {'version': '', 'short': 'Bitcoin', 'description': 'The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.', 'ports': [['8333', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'xmpp-bosh': {'version': '', 'short': 'XMPP (Jabber) web client', 'description': 'Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.', 'ports': [['5280', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'stellaris': {'version': '', 'short': 'Stellaris', 'description': ' Explore a galaxy full of wonders in this sci-fi grand strategy game from Paradox Development Studios. Interact with diverse alien races, discover strange new worlds with unexpected events and expand the reach of your empire. Each new adventure holds almost limitless possibilities. ', 'ports': [['17780-17785', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kube-control-plane-secure': {'version': '', 'short': 'Kubernetes Control-plane Node - secure', 'description': 'The Kubernetes Control-plane Node runs all the services of the Kubernetes Control Plane. This includes kube-apiserver, etcd, kube-schedule, kube-controller-manager, cloud-controller-manager, and others', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['etcd-client', 'etcd-server', 'kube-apiserver', 'kube-controller-manager-secure', 'kube-scheduler-secure'], 'helpers': []}, '0-AD': {'version': '', 'short': '0 A.D.', 'description': " 0 A.D. is a real-time strategy (RTS) game of ancient warfare. It's a historically-based war/economy game that allows players to relive or rewrite the history of thirteen ancient civilizations, each depicted at their peak of economic growth and military prowess. ", 'ports': [['20595', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ceph': {'version': '', 'short': 'ceph', 'description': "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", 'ports': [['6800-7568', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bareos-storage': {'version': '', 'short': 'Bareos Storage Daemon (bareos-sd)', 'description': 'This option allows Bareos Director and File Daemons to connect to the local Bareos Storage Daemon to send/receive data and manage volumes.', 'ports': [['9103', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'amanda-client': {'version': '', 'short': 'Amanda Backup Client', 'description': 'The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.', 'ports': [['10080', 'udp'], ['10080', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': ['amanda']}, 'kube-worker': {'version': '', 'short': 'Kubernetes Worker Node', 'description': 'The Kubernetes Worker Node runs some (or sometimes all) of the workloads of the Kubernetes cluster. There might be NodoPort services associated with these workloads.', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['kubelet', 'kube-nodeport-services'], 'helpers': []}, 'kube-apiserver': {'version': '', 'short': 'Kubernetes Api Server', 'description': 'The Kubernetes API server validates and configures data for the api objects which include pods, services, replicationcontrollers, and others.', 'ports': [['6443', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'rquotad': {'version': '', 'short': 'rquotad', 'description': 'Remote Quota Server Daemon', 'ports': [['875', 'tcp'], ['875', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'pmcd': {'version': '', 'short': 'Performance metrics collector (pmcd)', 'description': 'This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.', 'ports': [['44321', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'mqtt': {'version': '', 'short': 'mqtt', 'description': 'The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.', 'ports': [['1883', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'zerotier': {'version': '', 'short': 'ZeroTier', 'description': 'ZeroTier creates secure networks between on-premise, cloud, desktop, and mobile devices.', 'ports': [['9993', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'anno-1800': {'version': '', 'short': 'Anno 1800', 'description': ' Anno 1800 - Lead the Industrial Revolution! Welcome to the dawn of the Industrial Age. The path you choose will define your world. Are you an innovator or an exploiter? A conqueror or a liberator? How the world remembers your name is up to you. ', 'ports': [['18000', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'nrpe': {'version': '', 'short': 'NRPE', 'description': 'NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.', 'ports': [['5666', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kube-api': {'version': '', 'short': 'Kubernetes Kubelet', 'description': 'Backwards compatibility after service renaming', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['kubelet'], 'helpers': []}, 'ldaps': {'version': '', 'short': 'LDAPS', 'description': 'Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server', 'ports': [['636', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'tftp': {'version': '', 'short': 'TFTP', 'description': 'The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in a simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).', 'ports': [['69', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': ['tftp']}, 'bitcoin-rpc': {'version': '', 'short': 'Bitcoin RPC', 'description': 'Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.', 'ports': [['8332', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'mssql': {'version': '', 'short': 'mssql', 'description': 'Microsoft SQL Server', 'ports': [['1433', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bitcoin-testnet-rpc': {'version': '', 'short': 'Bitcoin testnet RPC', 'description': 'Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.', 'ports': [['18332', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ws-discovery': {'version': '', 'short': 'WS-Discovery', 'description': 'Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['ws-discovery-tcp', 'ws-discovery-udp'], 'helpers': []}, 'samba': {'version': '', 'short': 'Samba', 'description': 'This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.', 'ports': [['139', 'tcp'], ['445', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['samba-client'], 'helpers': []}, 'ntp': {'version': '', 'short': 'Network Time Protocol (NTP) Server', 'description': 'The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.', 'ports': [['123', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'amqp': {'version': '', 'short': 'amqp', 'description': 'The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.', 'ports': [['5672', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'xmpp-client': {'version': '', 'short': 'XMPP (Jabber) client', 'description': 'Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.', 'ports': [['5222', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'git': {'version': '', 'short': 'git', 'description': 'The git daemon for supporting git:// access to git repositories.', 'ports': [['9418', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'etcd-server': {'version': '', 'short': 'etcd Server', 'description': 'etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.', 'ports': [['2380', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'imaps': {'version': '', 'short': 'IMAP over SSL', 'description': 'The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.', 'ports': [['993', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'warpinator': {'version': '', 'short': 'Warpinator', 'description': 'Warpinator is a file sharing app developed by Linux Mint. Warpinator allows you to send and receive files between computers that are on the same network without the need for any servers or special configuration.', 'ports': [['42000', 'tcp'], ['42000', 'udp'], ['42001', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'freeipa-trust': {'version': '', 'short': 'FreeIPA trust setup', 'description': 'FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory', 'ports': [['135', 'tcp'], ['138-139', 'tcp'], ['138-139', 'udp'], ['389', 'tcp'], ['389', 'udp'], ['445', 'tcp'], ['445', 'udp'], ['49152-65535', 'tcp'], ['3268', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'apcupsd': {'version': '', 'short': 'apcupsd', 'description': 'The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.', 'ports': [['3551', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'rpc-bind': {'version': '', 'short': 'rpc-bind', 'description': 'Remote Procedure Call Bind', 'ports': [['111', 'tcp'], ['111', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ldap': {'version': '', 'short': 'LDAP', 'description': 'Lightweight Directory Access Protocol (LDAP) server', 'ports': [['389', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'audit': {'version': '', 'short': 'Audit', 'description': 'The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.', 'ports': [['60', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bacula-client': {'version': '', 'short': 'Bacula Client', 'description': 'This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.', 'ports': [['9102', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'nbd': {'version': '', 'short': 'NBD', 'description': 'Network Block Device (NBD) is a high-performance protocol for exporting disk images between machines.', 'ports': [['10809', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'managesieve': {'version': '', 'short': 'ManageSieve', 'description': 'The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.', 'ports': [['4190', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'postgresql': {'version': '', 'short': 'PostgreSQL', 'description': 'PostgreSQL Database Server', 'ports': [['5432', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'jenkins': {'version': '', 'short': 'jenkins', 'description': 'Jenkins is an open source automation server written in Java.', 'ports': [['8080', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'anno-1602': {'version': '', 'short': 'Anno 1602', 'description': ' Anno 1602 is a construction and management video game. Set in the early modern period, it requires the player to build colonies on small islands and manage resources, exploration, diplomacy and trade. ', 'ports': [['47624', 'tcp'], ['2300-2400', 'tcp'], ['2300-2400', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'zabbix-agent': {'version': '', 'short': 'Zabbix Agent', 'description': 'Listen port used by Zabbix agents deployed on monitoring targets.', 'ports': [['10050', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ausweisapp2': {'version': '1.17.1', 'short': 'AusweisApp2', 'description': 'AusweisApp2 is an official government application to provide electronic identification services (eID) in conjunction with an approved electronic identification document such as the german nPA. In order to use your Smartphone as a card reader enable this service.', 'ports': [['24727', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ident': {'version': '', 'short': 'Ident Protocol', 'description': 'The Identification Protocol as specified in RFC 1413, which is used to determine the identity of a user of a particular TCP connection.', 'ports': [['113', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'llmnr-udp': {'version': '', 'short': 'LLMNR (UDP)', 'description': ' Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. ', 'ports': [['5355', 'udp']], 'modules': [], 'destination': {'ipv4': '224.0.0.252', 'ipv6': 'ff02::1:3'}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'pmwebapis': {'version': '', 'short': 'Secure performance metrics web API (pmwebapis)', 'description': 'This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.', 'ports': [['44324', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'spideroak-lansync': {'version': '', 'short': 'SpiderOak ONE LAN-Sync', 'description': 'SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.', 'ports': [['21327', 'udp'], ['21328', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kdeconnect': {'version': '', 'short': 'KDE Connect', 'description': 'KDE Connect is an application to connect your phone to your computer.', 'ports': [['1714-1764', 'tcp'], ['1714-1764', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'freeipa-ldaps': {'version': '', 'short': 'FreeIPA with LDAPS (deprecated)', 'description': 'This service is deprecated. Please use freeipa-4 service instead.', 'ports': [['80', 'tcp'], ['443', 'tcp'], ['88', 'tcp'], ['88', 'udp'], ['464', 'tcp'], ['464', 'udp'], ['123', 'udp'], ['636', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'openvpn': {'version': '', 'short': 'OpenVPN', 'description': 'OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.', 'ports': [['1194', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'snmptls-trap': {'version': '', 'short': 'Secure SNMPTRAP (TLS)', 'description': 'Secure SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message. This port is protected by TLS.', 'ports': [['10162', 'tcp'], ['10162', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'amanda-k5-client': {'version': '', 'short': 'Amanda Backup Client (kerberized)', 'description': 'The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication', 'ports': [['10082', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': ['amanda']}, 'collectd': {'version': '', 'short': 'Collectd', 'description': 'Collectd is a monitoring system that allows metrics to be sent over the network. This rule allows incoming collectd traffic from remote boxes.', 'ports': [['25826', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'grafana': {'version': '', 'short': 'grafana', 'description': 'Grafana is an open platform for beautiful analytics and monitoring', 'ports': [['3000', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kubelet': {'version': '', 'short': 'Kubernetes Kubelet', 'description': 'The kubelet API is used to communicate between kube-scheduler and the node.', 'ports': [['10250', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kadmin': {'version': '', 'short': 'kadmin', 'description': 'Kerberos Administration Protocol', 'ports': [['749', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ganglia-client': {'version': '', 'short': 'ganglia-client', 'description': 'Ganglia monitoring daemon', 'ports': [['8660', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'terraria': {'version': '', 'short': 'Terraria', 'description': ' Dig, fight, explore, build! Nothing is impossible in this action-packed adventure game. Four Pack also available! ', 'ports': [['7777', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'proxy-dhcp': {'version': '', 'short': 'Proxy DHCP', 'description': 'PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.', 'ports': [['4011', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'sane': {'version': '', 'short': 'SANE network daemon (saned)', 'description': 'The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.', 'ports': [['6566', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': ['sane']}, 'civilization-v': {'version': '', 'short': "Sid Meier's Civilization V", 'description': ' Become Ruler of the World by establishing and leading a civilization from the dawn of man into the space age: Wage war, conduct diplomacy, discover new technologies, go head-to-head with some of history’s greatest leaders and build the most powerful empire the world has ever known. ', 'ports': [['1745', 'tcp'], ['1795', 'tcp'], ['3074', 'tcp'], ['27015-27030', 'tcp'], ['27036-27037', 'tcp'], ['1745', 'udp'], ['1795', 'udp'], ['3064', 'udp'], ['3074', 'udp'], ['4380', 'udp'], ['27000-27031', 'udp'], ['27036', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'llmnr': {'version': '', 'short': 'LLMNR', 'description': ' Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. In order to allow this host to resolve other hosts, use the llmnr-client service. ', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['llmnr-tcp', 'llmnr-udp'], 'helpers': []}, 'checkmk-agent': {'version': '', 'short': 'checkmk agent', 'description': 'The checkmk monitoring agent runs on clients to provide detailed host state.', 'ports': [['6556', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bgp': {'version': '', 'short': 'BGP service listen', 'description': 'Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet', 'ports': [['179', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'radius': {'version': '', 'short': 'RADIUS', 'description': 'The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.', 'ports': [['1812', 'tcp'], ['1812', 'udp'], ['1813', 'tcp'], ['1813', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'rdp': {'version': '', 'short': 'rdp', 'description': "Microsoft's Remote Desktop Protocol", 'ports': [['3389', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bacula': {'version': '', 'short': 'Bacula', 'description': 'Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.', 'ports': [['9101', 'tcp'], ['9102', 'tcp'], ['9103', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'dds-multicast': {'version': '', 'short': 'OMG DDS', 'description': 'Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast service for domains with ID 0 to 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.', 'ports': [['7400-7401', 'udp'], ['7650-7651', 'udp'], ['7900-7901', 'udp'], ['8150-8151', 'udp'], ['8400-8401', 'udp'], ['8650-8651', 'udp'], ['8900-8901', 'udp'], ['9150-9151', 'udp'], ['9400-9401', 'udp'], ['9650-9651', 'udp'], ['9900-9901', 'udp']], 'modules': [], 'destination': {'ipv4': '239.255.0.1'}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'etcd-client': {'version': '', 'short': 'etcd Client', 'description': 'etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.', 'ports': [['2379', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kube-scheduler': {'version': '', 'short': 'Kubernetes Scheduler', 'description': 'The Kubernetes scheduler is a policy-rich, topology-aware, workload-specific function that significantly impacts availability, performance, and capacity.', 'ports': [['10251', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'opentelemetry': {'version': '', 'short': 'OTLP', 'description': 'OpenTelemetry Protocol (OTLP) specification describes the encoding, transport, and delivery mechanism of telemetry data between telemetry sources, intermediate nodes such as collectors and telemetry backends.', 'ports': [['4317', 'tcp'], ['4318', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'dns-over-tls': {'version': '', 'short': 'DNS over TLS', 'description': 'DNS over TLS (DoT) is a security protocol for encrypting and wrapping Domain Name System (DNS) queries and answers via the Transport Layer Security (TLS) protocol', 'ports': [['853', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'mongodb': {'version': '', 'short': 'mongodb', 'description': 'MongoDB is a free and open-source cross-platform document-oriented database program.', 'ports': [['27017', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'slp': {'version': '', 'short': 'SLP', 'description': 'The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.', 'ports': [['427', 'tcp'], ['427', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'afp': {'version': '', 'short': 'AFP', 'description': 'The Apple Filing Protocol (AFP), formerly AppleTalk Filing Protocol, is a proprietary network protocol, and part of the Apple File Service (AFS), that offers file services for macOS and the classic Mac OS.', 'ports': [['548', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'elasticsearch': {'version': '', 'short': 'Elasticsearch', 'description': 'Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.', 'ports': [['9300', 'tcp'], ['9200', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'dds-unicast': {'version': '', 'short': 'OMG DDS', 'description': 'Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast service for domains with ID 0 ito 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.', 'ports': [['7402-7649', 'udp'], ['7652-7899', 'udp'], ['7902-8149', 'udp'], ['8152-8339', 'udp'], ['8402-8649', 'udp'], ['8652-8899', 'udp'], ['8902-9149', 'udp'], ['9152-9339', 'udp'], ['9402-9649', 'udp'], ['9652-9899', 'udp'], ['9902-10149', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'privoxy': {'version': '', 'short': 'Privoxy - A Privacy Enhancing Proxy Server', 'description': 'Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.', 'ports': [['8118', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'dhcpv6-client': {'version': '', 'short': 'DHCPv6 Client', 'description': 'This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.', 'ports': [['546', 'udp']], 'modules': [], 'destination': {'ipv6': 'fe80::/64'}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bareos-director': {'version': '', 'short': 'Bareos Director Daemon (bareos-dir)', 'description': 'This option allows connections to a local Bareos Director. These connections are typically initiated by Bareos consoles (bconsole). Bareos WebUI and Bareos File Daemon (when using Client Initiated Connections).', 'ports': [['9101', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kprop': {'version': '', 'short': 'kprop', 'description': 'Kerberos KDC Propagation Protocol', 'ports': [['754', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'minecraft': {'version': '', 'short': 'Minecraft', 'description': ' Minecraft is a sandbox game developed by Mojang Studios. ', 'ports': [['25565', 'tcp'], ['25565', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kubelet-readonly': {'version': '', 'short': 'Kubernetes Kubelet read', 'description': 'The kubelet API is used to communicate between kube-scheduler and the node.', 'ports': [['10255', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'mysql': {'version': '', 'short': 'MySQL', 'description': 'MySQL Database Server', 'ports': [['3306', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'gre': {'version': '', 'short': '', 'description': '', 'ports': [], 'modules': [], 'destination': {}, 'protocols': ['gre'], 'source_ports': [], 'includes': [], 'helpers': ['proto-gre']}, 'ceph-exporter': {'version': '', 'short': 'ceph-exporter', 'description': 'The Prometheus module running on Ceph manager to expose metrics.', 'ports': [['9283', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'gpsd': {'version': '', 'short': 'gpsd', 'description': 'gpsd is a service daemon that monitors one or more GPSes or AIS receivers attached to a host computer through serial or USB ports, making all data on the location/course/velocity of the sensors available to be queried on TCP port 2947 of the host computer.', 'ports': [['2947', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'imap': {'version': '', 'short': 'IMAP', 'description': 'The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.', 'ports': [['143', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'civilization-iv': {'version': '', 'short': "Sid Meier's Civilization IV", 'description': ' Civilization IV is a 4X turn-based strategy computer game and the fourth installment of the Civilization series. ', 'ports': [['2033', 'tcp'], ['2056', 'tcp'], ['3783', 'tcp'], ['6500', 'tcp'], ['6667', 'tcp'], ['28900', 'tcp'], ['29900-29901', 'tcp'], ['2033', 'udp'], ['2302-2400', 'udp'], ['6500', 'udp'], ['6515', 'udp'], ['13139', 'udp'], ['27900', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'nfs': {'version': '', 'short': 'NFS4', 'description': 'The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.', 'ports': [['2049', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'xdmcp': {'version': '', 'short': 'XDMCP', 'description': 'The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.', 'ports': [['177', 'tcp'], ['177', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ms-wbt': {'version': '', 'short': 'ms-wbt', 'description': 'Microsoft Windows-based Terminal Server', 'ports': [], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['rdp'], 'helpers': []}, 'pmwebapi': {'version': '', 'short': 'Performance metrics web API (pmwebapi)', 'description': 'This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.', 'ports': [['44323', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'sips': {'version': '', 'short': 'SIP-TLS (SIPS)', 'description': 'SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.', 'ports': [['5061', 'tcp'], ['5061', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'supertuxkart': {'version': '', 'short': 'SuperTuxKart', 'description': ' SuperTuxKart is a 3D open-source kart racing game. It aims towards fun for players of all skill levels, with item boxes giving random items, nitro, drifting and more. ', 'ports': [['2759', 'tcp'], ['2759', 'udp'], ['2757', 'udp'], ['2757', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'nebula': {'version': '', 'short': 'Nebula', 'description': 'Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. The port needs to be open if the host is set as lighthouse.', 'ports': [['4242', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'zabbix-web-service': {'version': '', 'short': 'Zabbix Web Service', 'description': 'Listen port of Zabbix web service for receiving HTTP based reporting requests.', 'ports': [['10053', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'bareos-filedaemon': {'version': '', 'short': 'Bareos File Daemon (bareos-fd)', 'description': 'This option allows a Bareos Director to connect to the local Bareos File Daemon.', 'ports': [['9102', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ptp': {'version': '', 'short': 'Precision Time Protocol (PTP) Master', 'description': 'The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.', 'ports': [['319', 'udp'], ['320', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ipsec': {'version': '', 'short': 'IPsec', 'description': 'Internet Protocol Security (IPsec) is the standardized IETF VPN architecture defined in RFC 4301. IPsec is negotiated using the IKEv1 (RFC 2409) or IKEv2 (RFC 7296) protocol, which in itself uses encryption and authentication. IPsec provides Internet Protocol (IP) packet encryption and authentication. Both IKE and IPsec can be encapsulated in UDP (RFC 3948) or TCP (RFC 8229 to make it easier to traverse NAT. Enabling this service will enable IKE, IPsec and their encapsulation protocols and ports. Note that IKE and IPsec can also be configured to use non-default ports, but this is not common practice.', 'ports': [['500', 'udp'], ['4500', 'udp'], ['4500', 'tcp']], 'modules': [], 'destination': {}, 'protocols': ['ah', 'esp'], 'source_ports': [], 'includes': [], 'helpers': []}, 'klogin': {'version': '', 'short': 'klogin', 'description': 'The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.', 'ports': [['543', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'rtsp': {'version': '', 'short': 'RTSP', 'description': 'The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.', 'ports': [['554', 'tcp'], ['554', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kube-controller-manager': {'version': '', 'short': 'Kubernetes Controller Manager', 'description': 'The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes.', 'ports': [['10252', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'distcc': {'version': '', 'short': 'distcc', 'description': 'Distcc is a protocol used for distributed compilation.', 'ports': [['3632', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'puppetmaster': {'version': '', 'short': 'Puppet Master', 'description': 'Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.', 'ports': [['8140', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'plex': {'version': '', 'short': 'PLEX', 'description': 'Plex Media Server (PMS) is the back-end media server component of Plex. It organizes content from personal media libraries and streams it to the network.', 'ports': [['32400', 'tcp'], ['32400', 'udp'], ['32469', 'tcp'], ['3005', 'tcp'], ['8324', 'tcp'], ['32410', 'udp'], ['32412', 'udp'], ['32413', 'udp'], ['32414', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['ssdp'], 'helpers': []}, 'foreman-proxy': {'version': '', 'short': 'foreman-proxy', 'description': 'The Smart Proxy is a project which provides a restful API to various sub-systems.', 'ports': [['8443', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['foreman'], 'helpers': []}, 'kpasswd': {'version': '', 'short': 'Kpasswd', 'description': 'Kerberos password (Kpasswd) server', 'ports': [['464', 'tcp'], ['464', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ceph-mon': {'version': '', 'short': 'ceph-mon', 'description': "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", 'ports': [['3300', 'tcp'], ['6789', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'rsh': {'version': '', 'short': 'rsh', 'description': 'Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.', 'ports': [['514', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'tile38': {'version': '', 'short': 'tile38', 'description': 'Tile38 is a geospatial database, spatial index, and realtime geofence.', 'ports': [['9851', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'wireguard': {'version': '', 'short': 'WireGuard', 'description': 'WireGuard is the simple, fast and modern VPN. The port needs to be open if a peer has this host explicitly configured as endpoint.', 'ports': [['51820', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'memcache': {'version': '', 'short': 'memcache', 'description': 'memcache is a high-performance object caching system.', 'ports': [['11211', 'tcp'], ['11211', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'matrix': {'version': '', 'short': 'Matrix', 'description': "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", 'ports': [['8448', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': ['https'], 'helpers': []}, 'netbios-ns': {'version': '', 'short': 'NetBIOS NS', 'description': 'This allows you to find Windows (Samba) servers that share files and printers.', 'ports': [['137', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': ['netbios-ns']}, 'freeipa-replication': {'version': '', 'short': 'FreeIPA replication (deprecated)', 'description': 'This service is deprecated. Please use freeipa-4 service instead.', 'ports': [['7389', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'isns': {'version': '', 'short': 'iSNS', 'description': 'The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.', 'ports': [['3205', 'tcp'], ['3205', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'wbem-https': {'version': '', 'short': 'wbem-https', 'description': 'Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments', 'ports': [['5989', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'wbem-http': {'version': '', 'short': 'wbem-http', 'description': 'Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.', 'ports': [['5988', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'spotify-sync': {'version': '', 'short': 'Spotify Client Sync', 'description': 'The Spotify Client allows you to sync local music files with your phone.', 'ports': [['57621', 'udp'], ['57621', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'mdns': {'version': '', 'short': 'Multicast DNS (mDNS)', 'description': 'mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.', 'ports': [['5353', 'udp']], 'modules': [], 'destination': {'ipv4': '224.0.0.251', 'ipv6': 'ff02::fb'}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'salt-master': {'version': '', 'short': 'Salt Master', 'description': 'Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.', 'ports': [['4505', 'tcp'], ['4506', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'zabbix-java-gateway': {'version': '', 'short': 'Zabbix Java Gateway', 'description': 'Listen port for Zabbix Java Gateway for monitoring Java applications over JMX.', 'ports': [['10052', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'ipp': {'version': '', 'short': 'Network Printing Server (IPP)', 'description': 'The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.', 'ports': [['631', 'tcp'], ['631', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'kshell': {'version': '', 'short': 'kshell', 'description': 'Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5', 'ports': [['544', 'tcp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}, 'svdrp': {'version': '', 'short': 'SVDRP', 'description': 'The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.', 'ports': [['6419', 'tcp'], ['6419', 'udp']], 'modules': [], 'destination': {}, 'protocols': [], 'source_ports': [], 'includes': [], 'helpers': []}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "0-AD": { "description": " 0 A.D. is a real-time strategy (RTS) game of ancient warfare. It's a historically-based war/economy game that allows players to relive or rewrite the history of thirteen ancient civilizations, each depicted at their peak of economic growth and military prowess. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "20595", "udp" ] ], "protocols": [], "short": "0 A.D.", "source_ports": [], "version": "" }, "RH-Satellite-6": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "destination": {}, "helpers": [], "includes": [ "foreman" ], "modules": [], "ports": [ [ "5000", "tcp" ], [ "5646-5647", "tcp" ], [ "5671", "tcp" ], [ "8000", "tcp" ], [ "8080", "tcp" ], [ "9090", "tcp" ] ], "protocols": [], "short": "Red Hat Satellite 6", "source_ports": [], "version": "" }, "RH-Satellite-6-capsule": { "description": "Red Hat Satellite 6 is a systems management server that can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.", "destination": {}, "helpers": [], "includes": [ "RH-Satellite-6" ], "modules": [], "ports": [ [ "8443", "tcp" ] ], "protocols": [], "short": "Red Hat Satellite 6 Capsule", "source_ports": [], "version": "" }, "afp": { "description": "The Apple Filing Protocol (AFP), formerly AppleTalk Filing Protocol, is a proprietary network protocol, and part of the Apple File Service (AFS), that offers file services for macOS and the classic Mac OS.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "548", "tcp" ] ], "protocols": [], "short": "AFP", "source_ports": [], "version": "" }, "amanda-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.", "destination": {}, "helpers": [ "amanda" ], "includes": [], "modules": [], "ports": [ [ "10080", "udp" ], [ "10080", "tcp" ] ], "protocols": [], "short": "Amanda Backup Client", "source_ports": [], "version": "" }, "amanda-k5-client": { "description": "The Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful. This service specifically allows krb5 authentication", "destination": {}, "helpers": [ "amanda" ], "includes": [], "modules": [], "ports": [ [ "10082", "tcp" ] ], "protocols": [], "short": "Amanda Backup Client (kerberized)", "source_ports": [], "version": "" }, "amqp": { "description": "The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5672", "tcp" ] ], "protocols": [], "short": "amqp", "source_ports": [], "version": "" }, "amqps": { "description": "The Advanced Message Queuing Protocol (AMQP) over SSL is an open standard application layer protocol for message-oriented middleware.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5671", "tcp" ] ], "protocols": [], "short": "amqps", "source_ports": [], "version": "" }, "anno-1602": { "description": " Anno 1602 is a construction and management video game. Set in the early modern period, it requires the player to build colonies on small islands and manage resources, exploration, diplomacy and trade. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "47624", "tcp" ], [ "2300-2400", "tcp" ], [ "2300-2400", "udp" ] ], "protocols": [], "short": "Anno 1602", "source_ports": [], "version": "" }, "anno-1800": { "description": " Anno 1800 - Lead the Industrial Revolution! Welcome to the dawn of the Industrial Age. The path you choose will define your world. Are you an innovator or an exploiter? A conqueror or a liberator? How the world remembers your name is up to you. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18000", "udp" ] ], "protocols": [], "short": "Anno 1800", "source_ports": [], "version": "" }, "apcupsd": { "description": "The American Power Conversion (APC) uninterruptible power supply (UPS) daemon protocol allows to monitor and control APC UPS devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3551", "tcp" ] ], "protocols": [], "short": "apcupsd", "source_ports": [], "version": "" }, "audit": { "description": "The Linux Audit subsystem is used to log security events. Enable this option, if you plan to aggregate audit events to/from a remote server/client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "60", "tcp" ] ], "protocols": [], "short": "Audit", "source_ports": [], "version": "" }, "ausweisapp2": { "description": "AusweisApp2 is an official government application to provide electronic identification services (eID) in conjunction with an approved electronic identification document such as the german nPA. In order to use your Smartphone as a card reader enable this service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "24727", "udp" ] ], "protocols": [], "short": "AusweisApp2", "source_ports": [], "version": "1.17.1" }, "bacula": { "description": "Bacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9101", "tcp" ], [ "9102", "tcp" ], [ "9103", "tcp" ] ], "protocols": [], "short": "Bacula", "source_ports": [], "version": "" }, "bacula-client": { "description": "This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9102", "tcp" ] ], "protocols": [], "short": "Bacula Client", "source_ports": [], "version": "" }, "bareos-director": { "description": "This option allows connections to a local Bareos Director. These connections are typically initiated by Bareos consoles (bconsole). Bareos WebUI and Bareos File Daemon (when using Client Initiated Connections).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9101", "tcp" ] ], "protocols": [], "short": "Bareos Director Daemon (bareos-dir)", "source_ports": [], "version": "" }, "bareos-filedaemon": { "description": "This option allows a Bareos Director to connect to the local Bareos File Daemon.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9102", "tcp" ] ], "protocols": [], "short": "Bareos File Daemon (bareos-fd)", "source_ports": [], "version": "" }, "bareos-storage": { "description": "This option allows Bareos Director and File Daemons to connect to the local Bareos Storage Daemon to send/receive data and manage volumes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9103", "tcp" ] ], "protocols": [], "short": "Bareos Storage Daemon (bareos-sd)", "source_ports": [], "version": "" }, "bb": { "description": "Big Brother is a plain text protocol for sending and receiving client data, reports, and queries to a BB-compatible monitoring server or proxy. The standard IANA port for a listening Big Brother service is 1984, because of course it is.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1984", "tcp" ], [ "1984", "udp" ] ], "protocols": [], "short": "Big Brother", "source_ports": [], "version": "" }, "bgp": { "description": "Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "179", "tcp" ] ], "protocols": [], "short": "BGP service listen", "source_ports": [], "version": "" }, "bitcoin": { "description": "The default port used by Bitcoin. Enable this option if you plan to be a full Bitcoin node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8333", "tcp" ] ], "protocols": [], "short": "Bitcoin", "source_ports": [], "version": "" }, "bitcoin-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface. This is not required when connecting on localhost.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8332", "tcp" ] ], "protocols": [], "short": "Bitcoin RPC", "source_ports": [], "version": "" }, "bitcoin-testnet": { "description": "The default port used by Bitcoin testnet. Enable this option if you plan to be a Bitcoin full node on the test network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18333", "tcp" ] ], "protocols": [], "short": "Bitcoin testnet", "source_ports": [], "version": "" }, "bitcoin-testnet-rpc": { "description": "Enable this option if you need access to the Bitcoin RPC interface running on the testnet. This is not required when connecting on localhost.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18332", "tcp" ] ], "protocols": [], "short": "Bitcoin testnet RPC", "source_ports": [], "version": "" }, "bittorrent-lsd": { "description": "Local Peer Discovery is a protocol designed to support the discovery of BitTorrent peers on a local area network. Enable this service if you run a BitTorrent client.", "destination": { "ipv4": "239.192.152.143", "ipv6": "ff15::efc0:988f" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6771", "udp" ] ], "protocols": [], "short": "BitTorrent Local Peer Discovery (LSD)", "source_ports": [], "version": "" }, "ceph": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS), or Manager Daemons (MGR).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6800-7568", "tcp" ] ], "protocols": [], "short": "ceph", "source_ports": [], "version": "" }, "ceph-exporter": { "description": "The Prometheus module running on Ceph manager to expose metrics.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9283", "tcp" ] ], "protocols": [], "short": "ceph-exporter", "source_ports": [], "version": "" }, "ceph-mon": { "description": "Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3300", "tcp" ], [ "6789", "tcp" ] ], "protocols": [], "short": "ceph-mon", "source_ports": [], "version": "" }, "cfengine": { "description": "CFEngine server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5308", "tcp" ] ], "protocols": [], "short": "CFEngine", "source_ports": [], "version": "" }, "checkmk-agent": { "description": "The checkmk monitoring agent runs on clients to provide detailed host state.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6556", "tcp" ] ], "protocols": [], "short": "checkmk agent", "source_ports": [], "version": "" }, "civilization-iv": { "description": " Civilization IV is a 4X turn-based strategy computer game and the fourth installment of the Civilization series. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2033", "tcp" ], [ "2056", "tcp" ], [ "3783", "tcp" ], [ "6500", "tcp" ], [ "6667", "tcp" ], [ "28900", "tcp" ], [ "29900-29901", "tcp" ], [ "2033", "udp" ], [ "2302-2400", "udp" ], [ "6500", "udp" ], [ "6515", "udp" ], [ "13139", "udp" ], [ "27900", "udp" ] ], "protocols": [], "short": "Sid Meier's Civilization IV", "source_ports": [], "version": "" }, "civilization-v": { "description": " Become Ruler of the World by establishing and leading a civilization from the dawn of man into the space age: Wage war, conduct diplomacy, discover new technologies, go head-to-head with some of history’s greatest leaders and build the most powerful empire the world has ever known. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1745", "tcp" ], [ "1795", "tcp" ], [ "3074", "tcp" ], [ "27015-27030", "tcp" ], [ "27036-27037", "tcp" ], [ "1745", "udp" ], [ "1795", "udp" ], [ "3064", "udp" ], [ "3074", "udp" ], [ "4380", "udp" ], [ "27000-27031", "udp" ], [ "27036", "udp" ] ], "protocols": [], "short": "Sid Meier's Civilization V", "source_ports": [], "version": "" }, "cockpit": { "description": "Cockpit lets you access and configure your server remotely.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9090", "tcp" ] ], "protocols": [], "short": "Cockpit", "source_ports": [], "version": "" }, "collectd": { "description": "Collectd is a monitoring system that allows metrics to be sent over the network. This rule allows incoming collectd traffic from remote boxes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25826", "udp" ] ], "protocols": [], "short": "Collectd", "source_ports": [], "version": "" }, "condor-collector": { "description": "The HT Condor Collector is needed to organize the condor worker nodes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9618", "tcp" ] ], "protocols": [], "short": "HT Condor Collector", "source_ports": [], "version": "" }, "cratedb": { "description": "CrateDB is a distributed SQL database management system that integrates a fully searchable document oriented data store.", "destination": {}, "helpers": [], "includes": [ "postgresql" ], "modules": [], "ports": [ [ "4200", "tcp" ], [ "4300", "tcp" ] ], "protocols": [], "short": "CrateDB", "source_ports": [], "version": "" }, "ctdb": { "description": "CTDB is a cluster implementation of the TDB database used by Samba and other projects to store temporary data.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4379", "tcp" ], [ "4379", "udp" ] ], "protocols": [], "short": "CTDB", "source_ports": [], "version": "" }, "dds": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast and multicast service for domains with ID 0 through 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": {}, "helpers": [], "includes": [ "dds-multicast", "dds-unicast" ], "modules": [], "ports": [], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dds-multicast": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast service for domains with ID 0 to 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": { "ipv4": "239.255.0.1" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7400-7401", "udp" ], [ "7650-7651", "udp" ], [ "7900-7901", "udp" ], [ "8150-8151", "udp" ], [ "8400-8401", "udp" ], [ "8650-8651", "udp" ], [ "8900-8901", "udp" ], [ "9150-9151", "udp" ], [ "9400-9401", "udp" ], [ "9650-9651", "udp" ], [ "9900-9901", "udp" ] ], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dds-unicast": { "description": "Open Management Group (OMG) Data Distribution Service (DDS) is protocol supporting various applications. It is usally found in control systems. This is the unicast service for domains with ID 0 ito 10 and maximal possible applications (120). Please see https://community.rti.com/content/forum-topic/statically-configure-firewall-let-omg-dds-traffic-through for details.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7402-7649", "udp" ], [ "7652-7899", "udp" ], [ "7902-8149", "udp" ], [ "8152-8339", "udp" ], [ "8402-8649", "udp" ], [ "8652-8899", "udp" ], [ "8902-9149", "udp" ], [ "9152-9339", "udp" ], [ "9402-9649", "udp" ], [ "9652-9899", "udp" ], [ "9902-10149", "udp" ] ], "protocols": [], "short": "OMG DDS", "source_ports": [], "version": "" }, "dhcp": { "description": "This allows a DHCP server to accept messages from DHCP clients and relay agents.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "67", "udp" ] ], "protocols": [], "short": "DHCP", "source_ports": [], "version": "" }, "dhcpv6": { "description": "This allows a DHCPv6 server to accept messages from DHCPv6 clients and relay agents.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "547", "udp" ] ], "protocols": [], "short": "DHCPv6", "source_ports": [], "version": "" }, "dhcpv6-client": { "description": "This option allows a DHCP for IPv6 (DHCPv6) client to obtain addresses and other IPv6 settings from DHCPv6 server.", "destination": { "ipv6": "fe80::/64" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "546", "udp" ] ], "protocols": [], "short": "DHCPv6 Client", "source_ports": [], "version": "" }, "distcc": { "description": "Distcc is a protocol used for distributed compilation.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3632", "tcp" ] ], "protocols": [], "short": "distcc", "source_ports": [], "version": "" }, "dns": { "description": "The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "53", "tcp" ], [ "53", "udp" ] ], "protocols": [], "short": "DNS", "source_ports": [], "version": "" }, "dns-over-tls": { "description": "DNS over TLS (DoT) is a security protocol for encrypting and wrapping Domain Name System (DNS) queries and answers via the Transport Layer Security (TLS) protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "853", "tcp" ] ], "protocols": [], "short": "DNS over TLS", "source_ports": [], "version": "" }, "docker-registry": { "description": "Docker Registry is the protocol used to serve Docker images. If you plan to make your Docker Registry server publicly available, enable this option. This option is not required for developing Docker images locally.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5000", "tcp" ] ], "protocols": [], "short": "Docker Registry", "source_ports": [], "version": "" }, "docker-swarm": { "description": "Natively managed cluster of Docker Engines (>=1.12.0), where you deploy services.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2377", "tcp" ], [ "7946", "tcp" ], [ "7946", "udp" ], [ "4789", "udp" ] ], "protocols": [ "esp" ], "short": "Docker integrated swarm mode", "source_ports": [], "version": "" }, "dropbox-lansync": { "description": "Dropbox LAN sync", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "17500", "udp" ], [ "17500", "tcp" ] ], "protocols": [], "short": "dropboxlansync", "source_ports": [], "version": "1.0" }, "elasticsearch": { "description": "Elasticsearch is a distributed, open source search and analytics engine, designed for horizontal scalability, reliability, and easy management.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9300", "tcp" ], [ "9200", "tcp" ] ], "protocols": [], "short": "Elasticsearch", "source_ports": [], "version": "" }, "etcd-client": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the client side port.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2379", "tcp" ] ], "protocols": [], "short": "etcd Client", "source_ports": [], "version": "" }, "etcd-server": { "description": "etcd implements a distributed key value store that provides a reliably way to store data across a cluster of machines. This is the server side port.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2380", "tcp" ] ], "protocols": [], "short": "etcd Server", "source_ports": [], "version": "" }, "factorio": { "description": " Factorio is a game about building and creating automated factories to produce items of increasing complexity, within an infinite 2D world. Use your imagination to design your factory, combine simple elements into ingenious structures, and finally protect it from the creatures who don't really like you. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "34197", "udp" ] ], "protocols": [], "short": "Factorio", "source_ports": [], "version": "" }, "finger": { "description": "Finger is a protocol for obtaining information about users on remote hosts.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "79", "tcp" ] ], "protocols": [], "short": "finger", "source_ports": [], "version": "" }, "foreman": { "description": "Foreman is a complete lifecycle management tool for physical and virtual servers.", "destination": {}, "helpers": [], "includes": [ "dns", "http", "https", "dhcp", "tftp" ], "modules": [], "ports": [ [ "68", "udp" ], [ "8140", "tcp" ] ], "protocols": [], "short": "foreman", "source_ports": [], "version": "" }, "foreman-proxy": { "description": "The Smart Proxy is a project which provides a restful API to various sub-systems.", "destination": {}, "helpers": [], "includes": [ "foreman" ], "modules": [], "ports": [ [ "8443", "tcp" ] ], "protocols": [], "short": "foreman-proxy", "source_ports": [], "version": "" }, "freeipa-4": { "description": "FreeIPA is an integrated identity and authentication solution with Kerberos, LDAP, PKI, and web UI. Enable this option if you plan to provide a FreeIPA server. Enable the 'dns' service if this FreeIPA server provides DNS services, 'ntp' service if this FreeIPA server provides NTP services, and 'freeipa-trust' for cross-forest trusts with Active Directory.", "destination": {}, "helpers": [], "includes": [ "http", "https", "kerberos", "kpasswd", "ldap", "ldaps" ], "modules": [], "ports": [], "protocols": [], "short": "FreeIPA 4 server", "source_ports": [], "version": "" }, "freeipa-ldap": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ], [ "443", "tcp" ], [ "88", "tcp" ], [ "88", "udp" ], [ "464", "tcp" ], [ "464", "udp" ], [ "123", "udp" ], [ "389", "tcp" ] ], "protocols": [], "short": "FreeIPA with LDAP (deprecated)", "source_ports": [], "version": "" }, "freeipa-ldaps": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ], [ "443", "tcp" ], [ "88", "tcp" ], [ "88", "udp" ], [ "464", "tcp" ], [ "464", "udp" ], [ "123", "udp" ], [ "636", "tcp" ] ], "protocols": [], "short": "FreeIPA with LDAPS (deprecated)", "source_ports": [], "version": "" }, "freeipa-replication": { "description": "This service is deprecated. Please use freeipa-4 service instead.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7389", "tcp" ] ], "protocols": [], "short": "FreeIPA replication (deprecated)", "source_ports": [], "version": "" }, "freeipa-trust": { "description": "FreeIPA is an LDAP and Kerberos domain controller for Linux systems. Enable this option of you plan to deploy cross-forest trusts with FreeIPA and Active Directory", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "135", "tcp" ], [ "138-139", "tcp" ], [ "138-139", "udp" ], [ "389", "tcp" ], [ "389", "udp" ], [ "445", "tcp" ], [ "445", "udp" ], [ "49152-65535", "tcp" ], [ "3268", "tcp" ] ], "protocols": [], "short": "FreeIPA trust setup", "source_ports": [], "version": "" }, "ftp": { "description": "FTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.", "destination": {}, "helpers": [ "ftp" ], "includes": [], "modules": [], "ports": [ [ "21", "tcp" ] ], "protocols": [], "short": "FTP", "source_ports": [], "version": "" }, "galera": { "description": "MariaDB-Galera Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3306", "tcp" ], [ "4567", "tcp" ], [ "4568", "tcp" ], [ "4444", "tcp" ] ], "protocols": [], "short": "Galera", "source_ports": [], "version": "" }, "ganglia-client": { "description": "Ganglia monitoring daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8660", "tcp" ] ], "protocols": [], "short": "ganglia-client", "source_ports": [], "version": "" }, "ganglia-master": { "description": "Ganglia collector", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8651", "tcp" ] ], "protocols": [], "short": "ganglia-master", "source_ports": [], "version": "" }, "git": { "description": "The git daemon for supporting git:// access to git repositories.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9418", "tcp" ] ], "protocols": [], "short": "git", "source_ports": [], "version": "" }, "gpsd": { "description": "gpsd is a service daemon that monitors one or more GPSes or AIS receivers attached to a host computer through serial or USB ports, making all data on the location/course/velocity of the sensors available to be queried on TCP port 2947 of the host computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2947", "tcp" ] ], "protocols": [], "short": "gpsd", "source_ports": [], "version": "" }, "grafana": { "description": "Grafana is an open platform for beautiful analytics and monitoring", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3000", "tcp" ] ], "protocols": [], "short": "grafana", "source_ports": [], "version": "" }, "gre": { "description": "", "destination": {}, "helpers": [ "proto-gre" ], "includes": [], "modules": [], "ports": [], "protocols": [ "gre" ], "short": "", "source_ports": [], "version": "" }, "high-availability": { "description": "This allows you to use the Red Hat High Availability (previously named Red Hat Cluster Suite). Ports are opened for corosync, pcsd, pacemaker_remote, dlm and corosync-qnetd.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2224", "tcp" ], [ "3121", "tcp" ], [ "5403", "tcp" ], [ "5404", "udp" ], [ "5405-5412", "udp" ], [ "9929", "tcp" ], [ "9929", "udp" ], [ "21064", "tcp" ] ], "protocols": [], "short": "Red Hat High Availability", "source_ports": [], "version": "" }, "http": { "description": "HTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "80", "tcp" ] ], "protocols": [], "short": "WWW (HTTP)", "source_ports": [], "version": "" }, "http3": { "description": "HTTP/3 is a protocol used to serve Web pages that uses QUIC as the transport protocol. If you plan to make your HTTP/3 compatible Web server publicly available, enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "443", "udp" ] ], "protocols": [], "short": "WWW (HTTP/3)", "source_ports": [], "version": "" }, "https": { "description": "HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "443", "tcp" ] ], "protocols": [], "short": "Secure WWW (HTTPS)", "source_ports": [], "version": "" }, "ident": { "description": "The Identification Protocol as specified in RFC 1413, which is used to determine the identity of a user of a particular TCP connection.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "113", "tcp" ] ], "protocols": [], "short": "Ident Protocol", "source_ports": [], "version": "" }, "imap": { "description": "The Internet Message Access Protocol(IMAP) allows a local client to access email on a remote server. If you plan to provide a IMAP service (e.g. with dovecot), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "143", "tcp" ] ], "protocols": [], "short": "IMAP", "source_ports": [], "version": "" }, "imaps": { "description": "The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "993", "tcp" ] ], "protocols": [], "short": "IMAP over SSL", "source_ports": [], "version": "" }, "ipfs": { "description": "The InterPlanetary File System (IPFS) is a peer-to-peer hypermedia protocol designed to make the web faster, safer, and more open", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4001", "tcp" ], [ "4001", "udp" ] ], "protocols": [], "short": "IPFS", "source_ports": [], "version": "" }, "ipp": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "631", "tcp" ], [ "631", "udp" ] ], "protocols": [], "short": "Network Printing Server (IPP)", "source_ports": [], "version": "" }, "ipp-client": { "description": "The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "631", "udp" ] ], "protocols": [], "short": "Network Printing Client (IPP)", "source_ports": [], "version": "" }, "ipsec": { "description": "Internet Protocol Security (IPsec) is the standardized IETF VPN architecture defined in RFC 4301. IPsec is negotiated using the IKEv1 (RFC 2409) or IKEv2 (RFC 7296) protocol, which in itself uses encryption and authentication. IPsec provides Internet Protocol (IP) packet encryption and authentication. Both IKE and IPsec can be encapsulated in UDP (RFC 3948) or TCP (RFC 8229 to make it easier to traverse NAT. Enabling this service will enable IKE, IPsec and their encapsulation protocols and ports. Note that IKE and IPsec can also be configured to use non-default ports, but this is not common practice.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "500", "udp" ], [ "4500", "udp" ], [ "4500", "tcp" ] ], "protocols": [ "ah", "esp" ], "short": "IPsec", "source_ports": [], "version": "" }, "irc": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6667", "tcp" ] ], "protocols": [], "short": "IRC", "source_ports": [], "version": "" }, "ircs": { "description": "An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6697", "tcp" ] ], "protocols": [], "short": "IRC TLS/SSL", "source_ports": [], "version": "" }, "iscsi-target": { "description": "Internet SCSI target is a storage resource located on an iSCSI server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3260", "tcp" ], [ "3260", "udp" ] ], "protocols": [], "short": "iSCSI target", "source_ports": [], "version": "" }, "isns": { "description": "The Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management and configuration of iSCSI and Fibre Channel devices on a TCP/IP network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3205", "tcp" ], [ "3205", "udp" ] ], "protocols": [], "short": "iSNS", "source_ports": [], "version": "" }, "jenkins": { "description": "Jenkins is an open source automation server written in Java.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8080", "tcp" ] ], "protocols": [], "short": "jenkins", "source_ports": [], "version": "" }, "kadmin": { "description": "Kerberos Administration Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "749", "tcp" ] ], "protocols": [], "short": "kadmin", "source_ports": [], "version": "" }, "kdeconnect": { "description": "KDE Connect is an application to connect your phone to your computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1714-1764", "tcp" ], [ "1714-1764", "udp" ] ], "protocols": [], "short": "KDE Connect", "source_ports": [], "version": "" }, "kerberos": { "description": "Kerberos network authentication protocol server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "88", "tcp" ], [ "88", "udp" ] ], "protocols": [], "short": "Kerberos", "source_ports": [], "version": "" }, "kibana": { "description": "Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics that can be combined into custom dashboards that help you share insights from your data far and wide.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5601", "tcp" ] ], "protocols": [], "short": "Kibana", "source_ports": [], "version": "" }, "klogin": { "description": "The kerberized rlogin server accepts BSD-style rlogin sessions, but uses Kerberos 5 authentication.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "543", "tcp" ] ], "protocols": [], "short": "klogin", "source_ports": [], "version": "" }, "kpasswd": { "description": "Kerberos password (Kpasswd) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "464", "tcp" ], [ "464", "udp" ] ], "protocols": [], "short": "Kpasswd", "source_ports": [], "version": "" }, "kprop": { "description": "Kerberos KDC Propagation Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "754", "tcp" ] ], "protocols": [], "short": "kprop", "source_ports": [], "version": "" }, "kshell": { "description": "Kerberized rshell server accepts rshell commands authenticated and encrypted with Kerberos 5", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "544", "tcp" ] ], "protocols": [], "short": "kshell", "source_ports": [], "version": "" }, "kube-api": { "description": "Backwards compatibility after service renaming", "destination": {}, "helpers": [], "includes": [ "kubelet" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kube-apiserver": { "description": "The Kubernetes API server validates and configures data for the api objects which include pods, services, replicationcontrollers, and others.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6443", "tcp" ] ], "protocols": [], "short": "Kubernetes Api Server", "source_ports": [], "version": "" }, "kube-control-plane": { "description": "The Kubernetes Control-plane Node runs all the services of the Kubernetes Control Plane. This includes kube-apiserver, etcd, kube-schedule, kube-controller-manager, cloud-controller-manager, and others", "destination": {}, "helpers": [], "includes": [ "etcd-client", "etcd-server", "kube-apiserver", "kube-controller-manager", "kube-scheduler" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Control-plane Node", "source_ports": [], "version": "" }, "kube-control-plane-secure": { "description": "The Kubernetes Control-plane Node runs all the services of the Kubernetes Control Plane. This includes kube-apiserver, etcd, kube-schedule, kube-controller-manager, cloud-controller-manager, and others", "destination": {}, "helpers": [], "includes": [ "etcd-client", "etcd-server", "kube-apiserver", "kube-controller-manager-secure", "kube-scheduler-secure" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Control-plane Node - secure", "source_ports": [], "version": "" }, "kube-controller-manager": { "description": "The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10252", "tcp" ] ], "protocols": [], "short": "Kubernetes Controller Manager", "source_ports": [], "version": "" }, "kube-controller-manager-secure": { "description": "The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10257", "tcp" ] ], "protocols": [], "short": "Kubernetes Controller Manager - Secure", "source_ports": [], "version": "" }, "kube-nodeport-services": { "description": "Services of type NodePort expose a port on each worker", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "30000-32767", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kube-scheduler": { "description": "The Kubernetes scheduler is a policy-rich, topology-aware, workload-specific function that significantly impacts availability, performance, and capacity.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10251", "tcp" ] ], "protocols": [], "short": "Kubernetes Scheduler", "source_ports": [], "version": "" }, "kube-scheduler-secure": { "description": "The Kubernetes scheduler is a policy-rich, topology-aware, workload-specific function that significantly impacts availability, performance, and capacity.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10259", "tcp" ] ], "protocols": [], "short": "Kubernetes Scheduler - secure", "source_ports": [], "version": "" }, "kube-worker": { "description": "The Kubernetes Worker Node runs some (or sometimes all) of the workloads of the Kubernetes cluster. There might be NodoPort services associated with these workloads.", "destination": {}, "helpers": [], "includes": [ "kubelet", "kube-nodeport-services" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Worker Node", "source_ports": [], "version": "" }, "kubelet": { "description": "The kubelet API is used to communicate between kube-scheduler and the node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10250", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet", "source_ports": [], "version": "" }, "kubelet-readonly": { "description": "The kubelet API is used to communicate between kube-scheduler and the node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10255", "tcp" ] ], "protocols": [], "short": "Kubernetes Kubelet read", "source_ports": [], "version": "" }, "kubelet-worker": { "description": "Backwards compatibility after service renaming", "destination": {}, "helpers": [], "includes": [ "kube-worker" ], "modules": [], "ports": [], "protocols": [], "short": "Kubernetes Worker Node", "source_ports": [], "version": "" }, "ldap": { "description": "Lightweight Directory Access Protocol (LDAP) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "389", "tcp" ] ], "protocols": [], "short": "LDAP", "source_ports": [], "version": "" }, "ldaps": { "description": "Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "636", "tcp" ] ], "protocols": [], "short": "LDAPS", "source_ports": [], "version": "" }, "libvirt": { "description": "Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "16509", "tcp" ] ], "protocols": [], "short": "Virtual Machine Management", "source_ports": [], "version": "" }, "libvirt-tls": { "description": "Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "16514", "tcp" ] ], "protocols": [], "short": "Virtual Machine Management (TLS)", "source_ports": [], "version": "" }, "lightning-network": { "description": "The default port used by Lightning Network. Enable this option if you plan to be a Lightning Network node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9735", "tcp" ] ], "protocols": [], "short": "Lightning Network", "source_ports": [], "version": "" }, "llmnr": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. In order to allow this host to resolve other hosts, use the llmnr-client service. ", "destination": {}, "helpers": [], "includes": [ "llmnr-tcp", "llmnr-udp" ], "modules": [], "ports": [], "protocols": [], "short": "LLMNR", "source_ports": [], "version": "" }, "llmnr-client": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service allows incoming LLMNR responses. Due to protocol details the service matches by source port and thus allows unsolicited responses. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "LLMNR Client", "source_ports": [ [ "5355", "udp" ] ], "version": "" }, "llmnr-tcp": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5355", "tcp" ] ], "protocols": [], "short": "LLMNR (TCP)", "source_ports": [], "version": "" }, "llmnr-udp": { "description": " Link-Local Multicast Name Resolution (LLMNR) allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network. This service matches incoming queries; it will allow this host to be resolved by other hosts. ", "destination": { "ipv4": "224.0.0.252", "ipv6": "ff02::1:3" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5355", "udp" ] ], "protocols": [], "short": "LLMNR (UDP)", "source_ports": [], "version": "" }, "managesieve": { "description": "The ManageSieve Protocol allows a local client to manage eMail sieve scripts on a remote server. If you plan to provide a ManageSieve service (e.g. with dovecot pigeonhole), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4190", "tcp" ] ], "protocols": [], "short": "ManageSieve", "source_ports": [], "version": "" }, "matrix": { "description": "Matrix is an ambitious new ecosystem for open federated Instant Messaging and VoIP. Port 443 is the 'client' port, whereas port 8448 is the Federation port. Federation is the process by which users on different servers can participate in the same room.", "destination": {}, "helpers": [], "includes": [ "https" ], "modules": [], "ports": [ [ "8448", "tcp" ] ], "protocols": [], "short": "Matrix", "source_ports": [], "version": "" }, "mdns": { "description": "mDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.", "destination": { "ipv4": "224.0.0.251", "ipv6": "ff02::fb" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5353", "udp" ] ], "protocols": [], "short": "Multicast DNS (mDNS)", "source_ports": [], "version": "" }, "memcache": { "description": "memcache is a high-performance object caching system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "11211", "tcp" ], [ "11211", "udp" ] ], "protocols": [], "short": "memcache", "source_ports": [], "version": "" }, "minecraft": { "description": " Minecraft is a sandbox game developed by Mojang Studios. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25565", "tcp" ], [ "25565", "udp" ] ], "protocols": [], "short": "Minecraft", "source_ports": [], "version": "" }, "minidlna": { "description": "MiniDLNA is a simple media server software with the aim to be fully compliant with DLNA/UPNP-AV clients. Enable this service if you run minidlna service.", "destination": {}, "helpers": [], "includes": [ "ssdp" ], "modules": [], "ports": [ [ "8200", "tcp" ] ], "protocols": [], "short": "MiniDLNA", "source_ports": [], "version": "" }, "mongodb": { "description": "MongoDB is a free and open-source cross-platform document-oriented database program.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "27017", "tcp" ] ], "protocols": [], "short": "mongodb", "source_ports": [], "version": "" }, "mosh": { "description": "Mosh is a remote terminal application that supports intermittent network connectivity, roaming to different IP address without dropping the connection, intelligent local echo and line editing to reduct the effects of \"network lag\" on high-latency connections.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "60000-61000", "udp" ] ], "protocols": [], "short": "Mobile shell that supports roaming and intelligent local echo.", "source_ports": [], "version": "" }, "mountd": { "description": "NFS Mount Lock Daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "20048", "tcp" ], [ "20048", "udp" ] ], "protocols": [], "short": "mountd", "source_ports": [], "version": "" }, "mqtt": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol is unencrypted.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1883", "tcp" ] ], "protocols": [], "short": "mqtt", "source_ports": [], "version": "" }, "mqtt-tls": { "description": "The Message Queuing Telemetry Transport (MQTT) is a machine-to-machine connectivity protocol. This variant of the protocol uses TLS encryption.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8883", "tcp" ] ], "protocols": [], "short": "mqtt-tls", "source_ports": [], "version": "" }, "ms-wbt": { "description": "Microsoft Windows-based Terminal Server", "destination": {}, "helpers": [], "includes": [ "rdp" ], "modules": [], "ports": [], "protocols": [], "short": "ms-wbt", "source_ports": [], "version": "" }, "mssql": { "description": "Microsoft SQL Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1433", "tcp" ] ], "protocols": [], "short": "mssql", "source_ports": [], "version": "" }, "murmur": { "description": "Murmur is the server of the Mumble VoIP chat system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "64738", "tcp" ], [ "64738", "udp" ] ], "protocols": [], "short": "Murmur", "source_ports": [], "version": "" }, "mysql": { "description": "MySQL Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3306", "tcp" ] ], "protocols": [], "short": "MySQL", "source_ports": [], "version": "" }, "nbd": { "description": "Network Block Device (NBD) is a high-performance protocol for exporting disk images between machines.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10809", "tcp" ] ], "protocols": [], "short": "NBD", "source_ports": [], "version": "" }, "nebula": { "description": "Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. The port needs to be open if the host is set as lighthouse.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4242", "udp" ] ], "protocols": [], "short": "Nebula", "source_ports": [], "version": "" }, "need-for-speed-most-wanted": { "description": " Need for Speed: Most Wanted is a 2005 open-world racing video game, and the ninth installment in the Need for Speed series. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "13505", "tcp" ], [ "30900-30999", "tcp" ], [ "3658", "udp" ] ], "protocols": [], "short": "Need for Speed: Most Wanted", "source_ports": [], "version": "" }, "netbios-ns": { "description": "This allows you to find Windows (Samba) servers that share files and printers.", "destination": {}, "helpers": [ "netbios-ns" ], "includes": [], "modules": [], "ports": [ [ "137", "udp" ] ], "protocols": [], "short": "NetBIOS NS", "source_ports": [], "version": "" }, "netdata-dashboard": { "description": "Netdata dashboard is a place to view the results of the netdata monitoring agent", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "19999", "tcp" ] ], "protocols": [], "short": "Netdata Dashboard", "source_ports": [], "version": "" }, "nfs": { "description": "The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2049", "tcp" ] ], "protocols": [], "short": "NFS4", "source_ports": [], "version": "" }, "nfs3": { "description": "The NFS3 protocol is used to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2049", "tcp" ], [ "2049", "udp" ] ], "protocols": [], "short": "NFS3", "source_ports": [], "version": "" }, "nmea-0183": { "description": "NMEA-0183 Navigational Data server for use with Global Navigation Satellite System (GNSS) devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10110", "tcp" ], [ "10110", "udp" ] ], "protocols": [], "short": "nmea-0183", "source_ports": [], "version": "" }, "nrpe": { "description": "NRPE allows you to execute Nagios plugins on a remote host in as transparent a manner as possible.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5666", "tcp" ] ], "protocols": [], "short": "NRPE", "source_ports": [], "version": "" }, "ntp": { "description": "The Network Time Protocol (NTP) allows to synchronize computers to a time server. Enable this option, if you are providing a NTP server. You need the ntp or chrony package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "123", "udp" ] ], "protocols": [], "short": "Network Time Protocol (NTP) Server", "source_ports": [], "version": "" }, "nut": { "description": "Network UPS Tools (NUT) is a protocol that allows to monitor and control power devices like uninterruptible power supplies.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3493", "tcp" ] ], "protocols": [], "short": "NUT", "source_ports": [], "version": "" }, "opentelemetry": { "description": "OpenTelemetry Protocol (OTLP) specification describes the encoding, transport, and delivery mechanism of telemetry data between telemetry sources, intermediate nodes such as collectors and telemetry backends.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4317", "tcp" ], [ "4318", "tcp" ] ], "protocols": [], "short": "OTLP", "source_ports": [], "version": "" }, "openvpn": { "description": "OpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1194", "udp" ] ], "protocols": [], "short": "OpenVPN", "source_ports": [], "version": "" }, "ovirt-imageio": { "description": "oVirt Image I/O simplifies the workflow of introducing new oVirt images into the oVirt environment.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "54322", "tcp" ] ], "protocols": [], "short": "oVirt Image I/O", "source_ports": [], "version": "" }, "ovirt-storageconsole": { "description": "oVirt Storage Console is a web-based storage management platform specially designed to efficiently manage oVirt's storage-defined storage.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "55863", "tcp" ], [ "39543", "tcp" ] ], "protocols": [], "short": "oVirt Storage-Console", "source_ports": [], "version": "" }, "ovirt-vmconsole": { "description": "oVirt VM Consoles enables secure access to virtual machine serial console.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2223", "tcp" ] ], "protocols": [], "short": "oVirt VM Console", "source_ports": [], "version": "" }, "plex": { "description": "Plex Media Server (PMS) is the back-end media server component of Plex. It organizes content from personal media libraries and streams it to the network.", "destination": {}, "helpers": [], "includes": [ "ssdp" ], "modules": [], "ports": [ [ "32400", "tcp" ], [ "32400", "udp" ], [ "32469", "tcp" ], [ "3005", "tcp" ], [ "8324", "tcp" ], [ "32410", "udp" ], [ "32412", "udp" ], [ "32413", "udp" ], [ "32414", "udp" ] ], "protocols": [], "short": "PLEX", "source_ports": [], "version": "" }, "pmcd": { "description": "This option allows PCP (Performance Co-Pilot) monitoring. If you need to allow remote hosts to connect directly to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44321", "tcp" ] ], "protocols": [], "short": "Performance metrics collector (pmcd)", "source_ports": [], "version": "" }, "pmproxy": { "description": "This option allows indirect PCP (Performance Co-Pilot) monitoring via a proxy. If you need to allow remote hosts to connect through your machine to monitor aspects of performance of one or more proxied hosts, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44322", "tcp" ] ], "protocols": [], "short": "Performance metrics proxy (pmproxy)", "source_ports": [], "version": "" }, "pmwebapi": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44323", "tcp" ] ], "protocols": [], "short": "Performance metrics web API (pmwebapi)", "source_ports": [], "version": "" }, "pmwebapis": { "description": "This option allows web clients to use PCP (Performance Co-Pilot) monitoring services over a secure connection. If you need to allow remote web clients to connect to your machine to monitor aspects of its performance, and you consider that information to be sensitive, enable this option. You need the pcp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "44324", "tcp" ] ], "protocols": [], "short": "Secure performance metrics web API (pmwebapis)", "source_ports": [], "version": "" }, "pop3": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "110", "tcp" ] ], "protocols": [], "short": "POP-3", "source_ports": [], "version": "" }, "pop3s": { "description": "The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "995", "tcp" ] ], "protocols": [], "short": "POP-3 over SSL", "source_ports": [], "version": "" }, "postgresql": { "description": "PostgreSQL Database Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5432", "tcp" ] ], "protocols": [], "short": "PostgreSQL", "source_ports": [], "version": "" }, "privoxy": { "description": "Privoxy is a web proxy for enhancing privacy by filtering web page content, managing cookies, controlling access, removing ads, banners, pop-ups and other obnoxious Internet junk. It does not cache web content. Enable this if you run Privoxy and would like to configure your web browser to browse the Internet via Privoxy.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8118", "tcp" ] ], "protocols": [], "short": "Privoxy - A Privacy Enhancing Proxy Server", "source_ports": [], "version": "" }, "prometheus": { "description": "The Prometheus monitoring system and time series database.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9090", "tcp" ] ], "protocols": [], "short": "prometheus", "source_ports": [], "version": "" }, "prometheus-node-exporter": { "description": "The node-exporter agent for Prometheus monitoring system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9100", "tcp" ] ], "protocols": [], "short": "prometheus-node-exporter", "source_ports": [], "version": "" }, "proxy-dhcp": { "description": "PXE redirection service (Proxy DHCP) responds to PXE clients and provides redirection to PXE boot servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4011", "udp" ] ], "protocols": [], "short": "Proxy DHCP", "source_ports": [], "version": "" }, "ps2link": { "description": "ps2link is a protocol used for interacting with a PlayStation 2 system.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "18194", "udp" ], [ "18193", "tcp" ] ], "protocols": [], "short": "ps2link", "source_ports": [], "version": "" }, "ps3netsrv": { "description": "PS3 Network Server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "38008", "tcp" ] ], "protocols": [], "short": "ps3netsrv", "source_ports": [], "version": "" }, "ptp": { "description": "The Precision Time Protocol (PTP) allows to synchronize computers to a time master. Enable this option, if you are providing a PTP master. You need the linuxptp package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "319", "udp" ], [ "320", "udp" ] ], "protocols": [], "short": "Precision Time Protocol (PTP) Master", "source_ports": [], "version": "" }, "pulseaudio": { "description": "A PulseAudio server provides an ability to stream audio over network. You want to enable this service in case you are using module-native-protocol-tcp in the PulseAudio configuration. If you are using module-zeroconf-publish you want also enable mdns service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4713", "tcp" ] ], "protocols": [], "short": "PulseAudio", "source_ports": [], "version": "" }, "puppetmaster": { "description": "Puppet is a network tool for managing many disparate systems. Puppet Master is a server which Puppet Agents pull their configurations from.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8140", "tcp" ] ], "protocols": [], "short": "Puppet Master", "source_ports": [], "version": "" }, "quassel": { "description": "Quassel is a distributed IRC client, meaning that one or more clients can attach to and detach from the central core.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4242", "tcp" ] ], "protocols": [], "short": "Quassel IRC", "source_ports": [], "version": "" }, "radius": { "description": "The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1812", "tcp" ], [ "1812", "udp" ], [ "1813", "tcp" ], [ "1813", "udp" ] ], "protocols": [], "short": "RADIUS", "source_ports": [], "version": "" }, "rdp": { "description": "Microsoft's Remote Desktop Protocol", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3389", "tcp" ] ], "protocols": [], "short": "rdp", "source_ports": [], "version": "" }, "redis": { "description": "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6379", "tcp" ] ], "protocols": [], "short": "redis", "source_ports": [], "version": "" }, "redis-sentinel": { "description": "Redis Sentinel provides high availability for Redis.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "26379", "tcp" ] ], "protocols": [], "short": "redis-sentinel", "source_ports": [], "version": "" }, "rpc-bind": { "description": "Remote Procedure Call Bind", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "111", "tcp" ], [ "111", "udp" ] ], "protocols": [], "short": "rpc-bind", "source_ports": [], "version": "" }, "rquotad": { "description": "Remote Quota Server Daemon", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "875", "tcp" ], [ "875", "udp" ] ], "protocols": [], "short": "rquotad", "source_ports": [], "version": "" }, "rsh": { "description": "Rsh is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling rsh is not recommended.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "514", "tcp" ] ], "protocols": [], "short": "rsh", "source_ports": [], "version": "" }, "rsyncd": { "description": "Rsync in daemon mode works as a central server, in order to house centralized files and keep them synchronized.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "873", "tcp" ], [ "873", "udp" ] ], "protocols": [], "short": "Rsync in daemon mode", "source_ports": [], "version": "" }, "rtsp": { "description": "The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "554", "tcp" ], [ "554", "udp" ] ], "protocols": [], "short": "RTSP", "source_ports": [], "version": "" }, "salt-master": { "description": "Salt is a protocol used for infrastructure management via a dynamic communication bus. These ports are required on the salt master node.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "4505", "tcp" ], [ "4506", "tcp" ] ], "protocols": [], "short": "Salt Master", "source_ports": [], "version": "" }, "samba": { "description": "This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "samba-client" ], "modules": [], "ports": [ [ "139", "tcp" ], [ "445", "tcp" ] ], "protocols": [], "short": "Samba", "source_ports": [], "version": "" }, "samba-client": { "description": "This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "netbios-ns" ], "modules": [], "ports": [ [ "138", "udp" ] ], "protocols": [], "short": "Samba Client", "source_ports": [], "version": "" }, "samba-dc": { "description": "This option allows you to use this computer as a Samba Active Directory Domain Controller. You need the samba-dc package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [ "samba", "dns", "kerberos", "ldap", "ldaps", "kpasswd" ], "modules": [], "ports": [ [ "135", "tcp" ], [ "389", "udp" ], [ "49152-65535", "tcp" ], [ "3268", "tcp" ], [ "3269", "tcp" ] ], "protocols": [], "short": "Samba DC", "source_ports": [], "version": "" }, "sane": { "description": "The SANE (Scanner Access Now Easy) daemon allows remote clients to access image acquisition devices available on the local host.", "destination": {}, "helpers": [ "sane" ], "includes": [], "modules": [], "ports": [ [ "6566", "tcp" ] ], "protocols": [], "short": "SANE network daemon (saned)", "source_ports": [], "version": "" }, "settlers-history-collection": { "description": "The Settlers History Collection includes History Editions of all seven previous Settlers games, which includes gold versions of each game with all expansions.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1005", "udp" ], [ "1100", "udp" ], [ "3074", "udp" ], [ "6200", "udp" ], [ "6300", "udp" ] ], "protocols": [], "short": "The Settlers History Collection", "source_ports": [], "version": "" }, "sip": { "description": "The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.", "destination": {}, "helpers": [ "sip" ], "includes": [], "modules": [], "ports": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "protocols": [], "short": "SIP", "source_ports": [], "version": "" }, "sips": { "description": "SIP-TLS is a modified SIP (Session Initiation Protocol) using TLS for secure signaling.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5061", "tcp" ], [ "5061", "udp" ] ], "protocols": [], "short": "SIP-TLS (SIPS)", "source_ports": [], "version": "" }, "slp": { "description": "The Service Location Protocol (SLP) is used for discovering services in a local network without prior configuration.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "427", "tcp" ], [ "427", "udp" ] ], "protocols": [], "short": "SLP", "source_ports": [], "version": "" }, "smtp": { "description": "This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "25", "tcp" ] ], "protocols": [], "short": "Mail (SMTP)", "source_ports": [], "version": "" }, "smtp-submission": { "description": "SMTP-Submission allows remote users to submit mail over port 587.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "587", "tcp" ] ], "protocols": [], "short": "Mail (SMTP-Submission)", "source_ports": [], "version": "" }, "smtps": { "description": "This option allows incoming SMTPs mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail in a secure way, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "465", "tcp" ] ], "protocols": [], "short": "Mail (SMTP over SSL)", "source_ports": [], "version": "" }, "snmp": { "description": "Simple Network Management Protocol is an \"Internet-standard protocol for managing devices on IP networks\". Enable this service if you run SNMP agent (server).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "161", "tcp" ], [ "161", "udp" ] ], "protocols": [], "short": "SNMP", "source_ports": [], "version": "" }, "snmptls": { "description": "Simple Network Management Protocol over TLS/DTLS is an \"Internet-standard protocol for managing devices on IP networks\" protected by TLS. Enable this service if you run SNMP agent (server).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10161", "tcp" ], [ "10161", "udp" ] ], "protocols": [], "short": "Secure SNMP (TLS)", "source_ports": [], "version": "" }, "snmptls-trap": { "description": "Secure SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message. This port is protected by TLS.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10162", "tcp" ], [ "10162", "udp" ] ], "protocols": [], "short": "Secure SNMPTRAP (TLS)", "source_ports": [], "version": "" }, "snmptrap": { "description": "SNMP traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "162", "tcp" ], [ "162", "udp" ] ], "protocols": [], "short": "SNMPTRAP", "source_ports": [], "version": "" }, "spideroak-lansync": { "description": "SpiderOak ONE is online backup and file hosting service that allows users to access, synchronize and share data using a cloud-based server. Enable this option if you use LAN-Sync option of SpiderOak.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "21327", "udp" ], [ "21328", "udp" ] ], "protocols": [], "short": "SpiderOak ONE LAN-Sync", "source_ports": [], "version": "" }, "spotify-sync": { "description": "The Spotify Client allows you to sync local music files with your phone.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "57621", "udp" ], [ "57621", "tcp" ] ], "protocols": [], "short": "Spotify Client Sync", "source_ports": [], "version": "" }, "squid": { "description": "Squid HTTP proxy server", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3128", "tcp" ] ], "protocols": [], "short": "squid", "source_ports": [], "version": "" }, "ssdp": { "description": "The Simple Service Discovery Protocol (SSDP) is a network protocol based on the Internet protocol suite for advertisement and discovery of network services and presence information.", "destination": { "ipv4": "239.255.255.250", "ipv6": "ff02::c" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1900", "udp" ] ], "protocols": [], "short": "Simple Service Discovery Protocol (SSDP)", "source_ports": [], "version": "" }, "ssh": { "description": "Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22", "tcp" ] ], "protocols": [], "short": "SSH", "source_ports": [], "version": "" }, "statsrv": { "description": " Statistics Server protocol provides a way to give statistics about a system to the outside world. Defined in RFC-996", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "133", "tcp" ], [ "133", "udp" ] ], "protocols": [], "short": "Statistics Server", "source_ports": [], "version": "" }, "steam-streaming": { "description": "Steam in-home streaming allows you to play a game on one computer when the game process is actually running on another computer elsewhere in your home. Through Steam, game audio and video is captured on the remote computer and sent to the player's computer. The game input (keyboard, mouse or gamepad) is sent from the player's computer to the game process on the remote computer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "27036", "tcp" ], [ "27037", "tcp" ], [ "27031-27036", "udp" ] ], "protocols": [], "short": "Steam In-Home Streaming", "source_ports": [], "version": "" }, "stellaris": { "description": " Explore a galaxy full of wonders in this sci-fi grand strategy game from Paradox Development Studios. Interact with diverse alien races, discover strange new worlds with unexpected events and expand the reach of your empire. Each new adventure holds almost limitless possibilities. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "17780-17785", "udp" ] ], "protocols": [], "short": "Stellaris", "source_ports": [], "version": "" }, "stronghold-crusader": { "description": " The highly anticipated sequel to the best-selling Stronghold, Stronghold Crusader (HD) throws you into historic battles and castle sieges from the Crusades with fiendish AI opponents, new units, 4 historical campaigns and over 100 unique skirmish missions. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2300-2400", "tcp" ], [ "47624", "tcp" ], [ "2300-2400", "udp" ] ], "protocols": [], "short": "Stronghold Crusader", "source_ports": [], "version": "" }, "supertuxkart": { "description": " SuperTuxKart is a 3D open-source kart racing game. It aims towards fun for players of all skill levels, with item boxes giving random items, nitro, drifting and more. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "2759", "tcp" ], [ "2759", "udp" ], [ "2757", "udp" ], [ "2757", "tcp" ] ], "protocols": [], "short": "SuperTuxKart", "source_ports": [], "version": "" }, "svdrp": { "description": "The Simple Video Disk Recorder Protocol (SVDRP) allows to control video disk recorder functionality.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6419", "tcp" ], [ "6419", "udp" ] ], "protocols": [], "short": "SVDRP", "source_ports": [], "version": "" }, "svn": { "description": "The custom, unencrypted protocol used the Subversion Version Control System.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3690", "tcp" ] ], "protocols": [], "short": "Subversion", "source_ports": [], "version": "" }, "syncthing": { "description": "Syncthing is a peer-to-peer file synchronization service. Enable this option, if you plan to run the Syncthing service.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22000", "tcp" ], [ "22000", "udp" ], [ "21027", "udp" ] ], "protocols": [], "short": "Syncthing", "source_ports": [], "version": "" }, "syncthing-gui": { "description": "Enable this option in addition to the Syncthing option to allow traffic to the Syncthing web interface. (Be sure to secure it accordingly).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8384", "tcp" ] ], "protocols": [], "short": "Syncthing GUI", "source_ports": [], "version": "" }, "syncthing-relay": { "description": "Syncthing is a peer-to-peer file synchronization service. Only enable this option if you run a Syncthing relay server. This separate program (syncthing-relaysrv or relaysrv) is not needed for normal Syncthing usage.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "22067", "tcp" ], [ "22070", "tcp" ] ], "protocols": [], "short": "Syncthing Relay", "source_ports": [], "version": "" }, "synergy": { "description": "Synergy lets you easily share your mouse and keyboard between multiple computers, where each computer has its own display. No special hardware is required, all you need is a local area network. Synergy is supported on Windows, Mac OS X and Linux. Redirecting the mouse and keyboard is as simple as moving the mouse off the edge of your screen.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "24800", "tcp" ] ], "protocols": [], "short": "Synergy", "source_ports": [], "version": "" }, "syscomlan": { "description": "Local system communication", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "1065", "tcp" ], [ "1065", "udp" ] ], "protocols": [], "short": "syscomlan", "source_ports": [], "version": "" }, "syslog": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "514", "udp" ] ], "protocols": [], "short": "syslog", "source_ports": [], "version": "" }, "syslog-tls": { "description": "Syslog is a client/server protocol: a logging application transmits a text message to the syslog receiver. The receiver is commonly called syslogd, syslog daemon or syslog server. Syslog-tls uses TLS encryption to protect the messages during transport.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "6514", "tcp" ], [ "6514", "udp" ] ], "protocols": [], "short": "syslog-tls", "source_ports": [], "version": "" }, "telnet": { "description": "Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "23", "tcp" ] ], "protocols": [], "short": "Telnet", "source_ports": [], "version": "" }, "tentacle": { "description": "Tentacle is a protocol for monitoring computer networks. Pandora FMS is one server implementation.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "41121", "tcp" ] ], "protocols": [], "short": "tentacle", "source_ports": [], "version": "" }, "terraria": { "description": " Dig, fight, explore, build! Nothing is impossible in this action-packed adventure game. Four Pack also available! ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "7777", "tcp" ] ], "protocols": [], "short": "Terraria", "source_ports": [], "version": "" }, "tftp": { "description": "The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in a simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).", "destination": {}, "helpers": [ "tftp" ], "includes": [], "modules": [], "ports": [ [ "69", "udp" ] ], "protocols": [], "short": "TFTP", "source_ports": [], "version": "" }, "tile38": { "description": "Tile38 is a geospatial database, spatial index, and realtime geofence.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9851", "tcp" ] ], "protocols": [], "short": "tile38", "source_ports": [], "version": "" }, "tinc": { "description": "tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "655", "tcp" ], [ "655", "udp" ] ], "protocols": [], "short": "tinc VPN", "source_ports": [], "version": "" }, "tor-socks": { "description": "Tor enables online anonymity and censorship resistance by directing Internet traffic through a network of relays. It conceals user's location from anyone conducting network surveillance and traffic analysis. A user wishing to use Tor for anonymity can configure a program such as a web browser to direct traffic to a Tor client using its SOCKS proxy port. Enable this if you run Tor and would like to configure your web browser or other programs to channel their traffic through the Tor SOCKS proxy port. It is recommended that you make this service available only for your computer or your internal networks.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9050", "tcp" ] ], "protocols": [], "short": "Tor - SOCKS Proxy", "source_ports": [], "version": "" }, "transmission-client": { "description": "Transmission is a lightweight BitTorrent client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "51413", "tcp" ], [ "51413", "udp" ] ], "protocols": [], "short": "Transmission", "source_ports": [], "version": "" }, "upnp-client": { "description": "Universal Plug and Play client for auto-configuration of network routers (use only in trusted zones).", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "UPnP Client", "source_ports": [ [ "1900", "udp" ] ], "version": "" }, "vdsm": { "description": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "54321", "tcp" ], [ "5900-6923", "tcp" ], [ "49152-49216", "tcp" ] ], "protocols": [], "short": "oVirt's Virtual Desktop and Server Manager", "source_ports": [], "version": "" }, "vnc-server": { "description": "A VNC server provides an external accessible X session. Enable this option if you plan to provide a VNC server with direct access. The access will be possible for displays :0 to :3. If you plan to provide access with SSH, do not open this option and use the via option of the VNC viewer.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5900-5903", "tcp" ] ], "protocols": [], "short": "Virtual Network Computing Server (VNC)", "source_ports": [], "version": "" }, "warpinator": { "description": "Warpinator is a file sharing app developed by Linux Mint. Warpinator allows you to send and receive files between computers that are on the same network without the need for any servers or special configuration.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "42000", "tcp" ], [ "42000", "udp" ], [ "42001", "tcp" ] ], "protocols": [], "short": "Warpinator", "source_ports": [], "version": "" }, "wbem-http": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. This is the unencrypted protocol variant.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5988", "tcp" ] ], "protocols": [], "short": "wbem-http", "source_ports": [], "version": "" }, "wbem-https": { "description": "Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5989", "tcp" ] ], "protocols": [], "short": "wbem-https", "source_ports": [], "version": "" }, "wireguard": { "description": "WireGuard is the simple, fast and modern VPN. The port needs to be open if a peer has this host explicitly configured as endpoint.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "51820", "udp" ] ], "protocols": [], "short": "WireGuard", "source_ports": [], "version": "" }, "ws-discovery": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": {}, "helpers": [], "includes": [ "ws-discovery-tcp", "ws-discovery-udp" ], "modules": [], "ports": [], "protocols": [], "short": "WS-Discovery", "source_ports": [], "version": "" }, "ws-discovery-client": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network. Use only in trusted zones.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [], "protocols": [], "short": "WS-Discovery Client", "source_ports": [ [ "3702", "udp" ] ], "version": "" }, "ws-discovery-tcp": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3702", "tcp" ] ], "protocols": [], "short": "WS-Discovery (TCP)", "source_ports": [], "version": "" }, "ws-discovery-udp": { "description": "Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network.", "destination": { "ipv4": "239.255.255.250", "ipv6": "ff02::c" }, "helpers": [], "includes": [], "modules": [], "ports": [ [ "3702", "udp" ] ], "protocols": [], "short": "WS-Discovery (UDP)", "source_ports": [], "version": "" }, "wsman": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol is unencrypted", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5985", "tcp" ] ], "protocols": [], "short": "wsman", "source_ports": [], "version": "" }, "wsmans": { "description": "Web Services for Management (WSMAN) is a protocol for managing PCs, servers, devices, Web services and other applications. This variant of the protocol uses TLS encryption.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5986", "tcp" ] ], "protocols": [], "short": "wsmans", "source_ports": [], "version": "" }, "xdmcp": { "description": "The X Display Manager Control Protocol (XDMCP) allows to remotely log in to an X desktop environment from any X Window System compatible client.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "177", "tcp" ], [ "177", "udp" ] ], "protocols": [], "short": "XDMCP", "source_ports": [], "version": "" }, "xmpp-bosh": { "description": "Extensible Messaging and Presence Protocol (XMPP) web client protocol allows web based chat clients such as JWChat to connect to the XMPP (Jabber) server. This is also known as the Bidirectional-streams Over Synchronous HTTP (BOSH) protocol. Enable this if you run an XMPP (Jabber) server and you wish web clients to connect to your server.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5280", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) web client", "source_ports": [], "version": "" }, "xmpp-client": { "description": "Extensible Messaging and Presence Protocol (XMPP) client connection protocol allows XMPP (Jabber) clients such as Empathy, Pidgin, Kopete and Jitsi to connect to an XMPP (Jabber) server. Enable this if you run an XMPP (Jabber) server and you wish clients to be able to connect to the server and communicate with each other.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5222", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) client", "source_ports": [], "version": "" }, "xmpp-local": { "description": "Serverless XMPP-like communication over local networks based on zero-configuration networking.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5298", "tcp" ] ], "protocols": [], "short": "XMPP Link-Local Messaging", "source_ports": [], "version": "" }, "xmpp-server": { "description": "Extensible Messaging and Presence Protocol (XMPP) server connection protocols allows multiple XMPP (Jabber) servers to work in a federated fashion. Users on one server will be able to see the presence of and communicate with users on another servers. Enable this if you run an XMPP (Jabber) server and you wish users on your server to communicate with users on other XMPP servers.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "5269", "tcp" ] ], "protocols": [], "short": "XMPP (Jabber) server", "source_ports": [], "version": "" }, "zabbix-agent": { "description": "Listen port used by Zabbix agents deployed on monitoring targets.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10050", "tcp" ] ], "protocols": [], "short": "Zabbix Agent", "source_ports": [], "version": "" }, "zabbix-java-gateway": { "description": "Listen port for Zabbix Java Gateway for monitoring Java applications over JMX.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10052", "tcp" ] ], "protocols": [], "short": "Zabbix Java Gateway", "source_ports": [], "version": "" }, "zabbix-server": { "description": "This is an alias for zabbix-trapper. This definition is deprecated in favor of zabbix-trapper.", "destination": {}, "helpers": [], "includes": [ "zabbix-trapper" ], "modules": [], "ports": [], "protocols": [], "short": "Zabbix Server", "source_ports": [], "version": "" }, "zabbix-trapper": { "description": "Trapper port to receive monitoring data used by the Zabbix server and Zabbix proxy.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10051", "tcp" ] ], "protocols": [], "short": "Zabbix Trapper", "source_ports": [], "version": "" }, "zabbix-web-service": { "description": "Listen port of Zabbix web service for receiving HTTP based reporting requests.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "10053", "tcp" ] ], "protocols": [], "short": "Zabbix Web Service", "source_ports": [], "version": "" }, "zero-k": { "description": " With 100+ truly unique units, Zero-K is an RTS of freedom and creativity, tempered by a decade of refinement. Sculpt land into a castle and throw invaders off it with a Jugglenaut. Explore a massive campaign, solo or co-op. Hop online for epic 32 player battles or fast paced 1v1, on 100s of maps. ", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "8452", "udp" ] ], "protocols": [], "short": "Zero-K", "source_ports": [], "version": "" }, "zerotier": { "description": "ZeroTier creates secure networks between on-premise, cloud, desktop, and mobile devices.", "destination": {}, "helpers": [], "includes": [], "modules": [], "ports": [ [ "9993", "udp" ] ], "protocols": [], "short": "ZeroTier", "source_ports": [], "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'tos-host-unreachable': {'version': '', 'short': 'TOS Host Unreachable', 'description': 'This message is sent if the host is unreachable for the type of service.', 'destination': ['ipv4']}, 'host-unknown': {'version': '', 'short': 'Host Unknown', 'description': 'This error message is sent if the destination host is unknown.', 'destination': ['ipv4']}, 'host-prohibited': {'version': '', 'short': 'Host Prohibited', 'description': 'This error message is sent if access from a host administratively prohibited.', 'destination': ['ipv4']}, 'host-unreachable': {'version': '', 'short': 'Host Unreachable', 'description': 'This error message is sent if the destination host is unreachable.', 'destination': ['ipv4']}, 'failed-policy': {'version': '', 'short': 'Failed Policy', 'description': 'This error message is generated if the source address failed ingress/egress policy.', 'destination': ['ipv6']}, 'network-prohibited': {'version': '', 'short': 'Network Prohibited', 'description': 'This message is sent if the network is administratively prohibited.', 'destination': ['ipv4']}, 'source-quench': {'version': '', 'short': 'Source Quench', 'description': 'This error message is generated to tell a host to reduce the pace at which it is sending packets.', 'destination': ['ipv4']}, 'unknown-header-type': {'version': '', 'short': 'Unknown Header Type', 'description': 'This error message is sent if an unrecognized Next Header type encountered.', 'destination': ['ipv6']}, 'router-solicitation': {'version': '', 'short': 'Router Solicitation', 'description': 'This message is used by a host attached to a multicast link to request a Router Advertisement.', 'destination': []}, 'tos-network-redirect': {'version': '', 'short': 'TOS Network Redirect', 'description': 'This message is sent if the datagram is redirected for the type of service and network.', 'destination': ['ipv4']}, 'tos-host-redirect': {'version': '', 'short': 'TOS Host Redirect', 'description': 'This message is the datagram is redirected for the type of service and host.', 'destination': ['ipv4']}, 'neighbour-solicitation': {'version': '', 'short': 'Neighbour Solicitation (Neighbor Solicitation)', 'description': 'This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.', 'destination': ['ipv6']}, 'timestamp-reply': {'version': '', 'short': 'Timestamp Reply', 'description': 'This message is used to reply to a timestamp message.', 'destination': ['ipv4']}, 'ttl-zero-during-reassembly': {'version': '', 'short': 'TTL Zero During Reassembly', 'description': 'This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.', 'destination': ['ipv4', 'ipv6']}, 'redirect': {'version': '', 'short': 'Redirect', 'description': 'This error message informs a host to send packets on another route.', 'destination': []}, 'timestamp-request': {'version': '', 'short': 'Timestamp Request', 'description': 'This message is used for time synchronization.', 'destination': ['ipv4']}, 'destination-unreachable': {'version': '', 'short': 'Destination Unreachable', 'description': 'This error message is generated by a host or gateway if the destination is not reachable.', 'destination': []}, 'port-unreachable': {'version': '', 'short': 'Port Unreachable', 'description': 'This error message is sent if the port unreachable.', 'destination': ['ipv4', 'ipv6']}, 'host-redirect': {'version': '', 'short': 'Host Redirect', 'description': 'This message is sent if the datagram is redirected for the host.', 'destination': ['ipv4']}, 'neighbour-advertisement': {'version': '', 'short': 'Neighbour Advertisement (Neighbor Advertisement)', 'description': 'This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.', 'destination': ['ipv6']}, 'precedence-cutoff': {'version': '', 'short': 'Precedence Cutoff', 'description': 'This message is sent if the precedence is lower than the required minimum.', 'destination': ['ipv4']}, 'beyond-scope': {'version': '', 'short': 'Beyond Scope', 'description': 'This error message is sent if transmitting a package would cross a zone boundary of the scope of the source address.', 'destination': ['ipv6']}, 'protocol-unreachable': {'version': '', 'short': 'Protocol Unreachable', 'description': 'This message is sent if the destination protocol is unreachable.', 'destination': ['ipv4']}, 'bad-header': {'version': '', 'short': 'Bad Header', 'description': 'This error message is created if there has been an error in the header of a packet.', 'destination': ['ipv6']}, 'tos-network-unreachable': {'version': '', 'short': 'TOS Network Unreachable', 'description': 'This error message is sent if the network is unreachable for the type of service.', 'destination': ['ipv4']}, 'host-precedence-violation': {'version': '', 'short': 'Host Precedence Violation', 'description': 'This error message is sent if the communication administratively prohibited.', 'destination': ['ipv4']}, 'source-route-failed': {'version': '', 'short': 'Source Route Failed', 'description': 'This message is sent if the source route has failed.', 'destination': ['ipv4']}, 'packet-too-big': {'version': '', 'short': 'Packet Too Big', 'description': 'This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.', 'destination': ['ipv6']}, 'router-advertisement': {'version': '', 'short': 'Router Advertisement', 'description': 'This message is used by routers to periodically announce the IP address of a multicast interface.', 'destination': []}, 'parameter-problem': {'version': '', 'short': 'Parameter Problem', 'description': 'This error message is generated if the IP header is bad, either by a missing option or bad length.', 'destination': []}, 'network-unknown': {'version': '', 'short': 'Network Unknown', 'description': 'This message is sent if the destination network is unknown.', 'destination': ['ipv4']}, 'required-option-missing': {'version': '', 'short': 'Required Option Missing', 'description': 'This message is sent if a required option is missing.', 'destination': ['ipv4']}, 'network-unreachable': {'version': '', 'short': 'Network Unreachable', 'description': 'This message is sent if the destination network is unreachable.', 'destination': ['ipv4']}, 'reject-route': {'version': '', 'short': 'Reject Route', 'description': 'This error message is sent if the route to destination is rejected.', 'destination': ['ipv6']}, 'unknown-option': {'version': '', 'short': 'Unknown Option', 'description': 'This error message is sent if an unrecognized IPv6 option encountered.', 'destination': ['ipv6']}, 'ttl-zero-during-transit': {'version': '', 'short': 'TTL Zero During Transit', 'description': 'This error message is sent if the time to live exceeded in transit.', 'destination': ['ipv4', 'ipv6']}, 'fragmentation-needed': {'version': '', 'short': 'Fragmentation Needed', 'description': 'This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.', 'destination': ['ipv4']}, 'ip-header-bad': {'version': '', 'short': 'Ip Header Bad', 'description': 'This error message is sent if the IP header is bad.', 'destination': ['ipv4']}, 'communication-prohibited': {'version': '', 'short': 'Communication Prohibited', 'description': 'This error message is sent if communication with destination administratively prohibited.', 'destination': ['ipv4', 'ipv6']}, 'time-exceeded': {'version': '', 'short': 'Time Exceeded', 'description': 'This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.', 'destination': []}, 'address-unreachable': {'version': '', 'short': 'Address Unreachable', 'description': 'This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.', 'destination': ['ipv6']}, 'no-route': {'version': '', 'short': 'No Route', 'description': 'This error message is set if there is no route to the destination.', 'destination': ['ipv6']}, 'network-redirect': {'version': '', 'short': 'Network Redirect', 'description': 'This message is sent if the datagram is redirected for the network.', 'destination': ['ipv4']}, 'echo-request': {'version': '', 'short': 'Echo Request (ping)', 'description': 'This message is used to test if a host is reachable mostly with the ping utility.', 'destination': []}, 'echo-reply': {'version': '', 'short': 'Echo Reply (pong)', 'description': 'This message is the answer to an Echo Request.', 'destination': []}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "address-unreachable": { "description": "This error message is generated by a router, or by the IPv6 layer in the originating node, in response to a packet that cannot be delivered to its destination address for reasons other than congestion.", "destination": [ "ipv6" ], "short": "Address Unreachable", "version": "" }, "bad-header": { "description": "This error message is created if there has been an error in the header of a packet.", "destination": [ "ipv6" ], "short": "Bad Header", "version": "" }, "beyond-scope": { "description": "This error message is sent if transmitting a package would cross a zone boundary of the scope of the source address.", "destination": [ "ipv6" ], "short": "Beyond Scope", "version": "" }, "communication-prohibited": { "description": "This error message is sent if communication with destination administratively prohibited.", "destination": [ "ipv4", "ipv6" ], "short": "Communication Prohibited", "version": "" }, "destination-unreachable": { "description": "This error message is generated by a host or gateway if the destination is not reachable.", "destination": [], "short": "Destination Unreachable", "version": "" }, "echo-reply": { "description": "This message is the answer to an Echo Request.", "destination": [], "short": "Echo Reply (pong)", "version": "" }, "echo-request": { "description": "This message is used to test if a host is reachable mostly with the ping utility.", "destination": [], "short": "Echo Request (ping)", "version": "" }, "failed-policy": { "description": "This error message is generated if the source address failed ingress/egress policy.", "destination": [ "ipv6" ], "short": "Failed Policy", "version": "" }, "fragmentation-needed": { "description": "This error message is sent if fragmentation is required, and Don not Fragment (DF) flag is set.", "destination": [ "ipv4" ], "short": "Fragmentation Needed", "version": "" }, "host-precedence-violation": { "description": "This error message is sent if the communication administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Precedence Violation", "version": "" }, "host-prohibited": { "description": "This error message is sent if access from a host administratively prohibited.", "destination": [ "ipv4" ], "short": "Host Prohibited", "version": "" }, "host-redirect": { "description": "This message is sent if the datagram is redirected for the host.", "destination": [ "ipv4" ], "short": "Host Redirect", "version": "" }, "host-unknown": { "description": "This error message is sent if the destination host is unknown.", "destination": [ "ipv4" ], "short": "Host Unknown", "version": "" }, "host-unreachable": { "description": "This error message is sent if the destination host is unreachable.", "destination": [ "ipv4" ], "short": "Host Unreachable", "version": "" }, "ip-header-bad": { "description": "This error message is sent if the IP header is bad.", "destination": [ "ipv4" ], "short": "Ip Header Bad", "version": "" }, "neighbour-advertisement": { "description": "This informational message is sent in response to a neighbour-solicitation message in order to (unreliably) propagate new information quickly.", "destination": [ "ipv6" ], "short": "Neighbour Advertisement (Neighbor Advertisement)", "version": "" }, "neighbour-solicitation": { "description": "This informational message is sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Solicitations are also used for Duplicate Address Detection.", "destination": [ "ipv6" ], "short": "Neighbour Solicitation (Neighbor Solicitation)", "version": "" }, "network-prohibited": { "description": "This message is sent if the network is administratively prohibited.", "destination": [ "ipv4" ], "short": "Network Prohibited", "version": "" }, "network-redirect": { "description": "This message is sent if the datagram is redirected for the network.", "destination": [ "ipv4" ], "short": "Network Redirect", "version": "" }, "network-unknown": { "description": "This message is sent if the destination network is unknown.", "destination": [ "ipv4" ], "short": "Network Unknown", "version": "" }, "network-unreachable": { "description": "This message is sent if the destination network is unreachable.", "destination": [ "ipv4" ], "short": "Network Unreachable", "version": "" }, "no-route": { "description": "This error message is set if there is no route to the destination.", "destination": [ "ipv6" ], "short": "No Route", "version": "" }, "packet-too-big": { "description": "This error message is sent by a router in response to a packet that it cannot forward because the packet is larger than the MTU of the outgoing link.", "destination": [ "ipv6" ], "short": "Packet Too Big", "version": "" }, "parameter-problem": { "description": "This error message is generated if the IP header is bad, either by a missing option or bad length.", "destination": [], "short": "Parameter Problem", "version": "" }, "port-unreachable": { "description": "This error message is sent if the port unreachable.", "destination": [ "ipv4", "ipv6" ], "short": "Port Unreachable", "version": "" }, "precedence-cutoff": { "description": "This message is sent if the precedence is lower than the required minimum.", "destination": [ "ipv4" ], "short": "Precedence Cutoff", "version": "" }, "protocol-unreachable": { "description": "This message is sent if the destination protocol is unreachable.", "destination": [ "ipv4" ], "short": "Protocol Unreachable", "version": "" }, "redirect": { "description": "This error message informs a host to send packets on another route.", "destination": [], "short": "Redirect", "version": "" }, "reject-route": { "description": "This error message is sent if the route to destination is rejected.", "destination": [ "ipv6" ], "short": "Reject Route", "version": "" }, "required-option-missing": { "description": "This message is sent if a required option is missing.", "destination": [ "ipv4" ], "short": "Required Option Missing", "version": "" }, "router-advertisement": { "description": "This message is used by routers to periodically announce the IP address of a multicast interface.", "destination": [], "short": "Router Advertisement", "version": "" }, "router-solicitation": { "description": "This message is used by a host attached to a multicast link to request a Router Advertisement.", "destination": [], "short": "Router Solicitation", "version": "" }, "source-quench": { "description": "This error message is generated to tell a host to reduce the pace at which it is sending packets.", "destination": [ "ipv4" ], "short": "Source Quench", "version": "" }, "source-route-failed": { "description": "This message is sent if the source route has failed.", "destination": [ "ipv4" ], "short": "Source Route Failed", "version": "" }, "time-exceeded": { "description": "This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.", "destination": [], "short": "Time Exceeded", "version": "" }, "timestamp-reply": { "description": "This message is used to reply to a timestamp message.", "destination": [ "ipv4" ], "short": "Timestamp Reply", "version": "" }, "timestamp-request": { "description": "This message is used for time synchronization.", "destination": [ "ipv4" ], "short": "Timestamp Request", "version": "" }, "tos-host-redirect": { "description": "This message is the datagram is redirected for the type of service and host.", "destination": [ "ipv4" ], "short": "TOS Host Redirect", "version": "" }, "tos-host-unreachable": { "description": "This message is sent if the host is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Host Unreachable", "version": "" }, "tos-network-redirect": { "description": "This message is sent if the datagram is redirected for the type of service and network.", "destination": [ "ipv4" ], "short": "TOS Network Redirect", "version": "" }, "tos-network-unreachable": { "description": "This error message is sent if the network is unreachable for the type of service.", "destination": [ "ipv4" ], "short": "TOS Network Unreachable", "version": "" }, "ttl-zero-during-reassembly": { "description": "This error message is sent if a host fails to reassemble a fragmented datagram within its time limit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Reassembly", "version": "" }, "ttl-zero-during-transit": { "description": "This error message is sent if the time to live exceeded in transit.", "destination": [ "ipv4", "ipv6" ], "short": "TTL Zero During Transit", "version": "" }, "unknown-header-type": { "description": "This error message is sent if an unrecognized Next Header type encountered.", "destination": [ "ipv6" ], "short": "Unknown Header Type", "version": "" }, "unknown-option": { "description": "This error message is sent if an unrecognized IPv6 option encountered.", "destination": [ "ipv6" ], "short": "Unknown Option", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'pptp': {'version': '', 'short': '', 'description': '', 'family': 'ipv4', 'module': 'nf_conntrack_pptp', 'port': [['1723', 'tcp']]}, 'Q.931': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_h323', 'port': [['1720', 'tcp']]}, 'irc': {'version': '', 'short': '', 'description': '', 'family': 'ipv4', 'module': 'nf_conntrack_irc', 'port': [['194', 'tcp']]}, 'ftp': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_ftp', 'port': [['21', 'tcp']]}, 'h323': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_h323', 'port': []}, 'snmp': {'version': '', 'short': '', 'description': '', 'family': 'ipv4', 'module': 'nf_conntrack_snmp', 'port': [['161', 'udp']]}, 'sip': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_sip', 'port': [['5060', 'tcp'], ['5060', 'udp']]}, 'proto-gre': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_proto_gre', 'port': []}, 'tftp': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_tftp', 'port': [['69', 'udp']]}, 'sane': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_sane', 'port': [['6566', 'tcp']]}, 'amanda': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_amanda', 'port': [['10080', 'udp']]}, 'RAS': {'version': '', 'short': '', 'description': '', 'family': '', 'module': 'nf_conntrack_h323', 'port': [['1719', 'udp']]}, 'netbios-ns': {'version': '', 'short': '', 'description': '', 'family': 'ipv4', 'module': 'nf_conntrack_netbios_ns', 'port': [['137', 'udp']]}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "Q.931": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1720", "tcp" ] ], "short": "", "version": "" }, "RAS": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [ [ "1719", "udp" ] ], "short": "", "version": "" }, "amanda": { "description": "", "family": "", "module": "nf_conntrack_amanda", "port": [ [ "10080", "udp" ] ], "short": "", "version": "" }, "ftp": { "description": "", "family": "", "module": "nf_conntrack_ftp", "port": [ [ "21", "tcp" ] ], "short": "", "version": "" }, "h323": { "description": "", "family": "", "module": "nf_conntrack_h323", "port": [], "short": "", "version": "" }, "irc": { "description": "", "family": "ipv4", "module": "nf_conntrack_irc", "port": [ [ "194", "tcp" ] ], "short": "", "version": "" }, "netbios-ns": { "description": "", "family": "ipv4", "module": "nf_conntrack_netbios_ns", "port": [ [ "137", "udp" ] ], "short": "", "version": "" }, "pptp": { "description": "", "family": "ipv4", "module": "nf_conntrack_pptp", "port": [ [ "1723", "tcp" ] ], "short": "", "version": "" }, "proto-gre": { "description": "", "family": "", "module": "nf_conntrack_proto_gre", "port": [], "short": "", "version": "" }, "sane": { "description": "", "family": "", "module": "nf_conntrack_sane", "port": [ [ "6566", "tcp" ] ], "short": "", "version": "" }, "sip": { "description": "", "family": "", "module": "nf_conntrack_sip", "port": [ [ "5060", "tcp" ], [ "5060", "udp" ] ], "short": "", "version": "" }, "snmp": { "description": "", "family": "ipv4", "module": "nf_conntrack_snmp", "port": [ [ "161", "udp" ] ], "short": "", "version": "" }, "tftp": { "description": "", "family": "", "module": "nf_conntrack_tftp", "port": [ [ "69", "udp" ] ], "short": "", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'allow-host-ipv6': {'description': 'Allows basic IPv6 functionality for the host running firewalld.', 'egress_zones': ['HOST'], 'forward_ports': [], 'icmp_blocks': [], 'ingress_zones': ['ANY'], 'masquerade': False, 'ports': [], 'priority': -15000, 'protocols': [], 'rich_rules': ['rule family="ipv6" icmp-type name="neighbour-advertisement" accept', 'rule family="ipv6" icmp-type name="neighbour-solicitation" accept', 'rule family="ipv6" icmp-type name="router-advertisement" accept', 'rule family="ipv6" icmp-type name="redirect" accept'], 'services': [], 'short': 'Allow host IPv6', 'source_ports': [], 'target': 'CONTINUE', 'version': ''}}) => { "ansible_loop_var": "item", "changed": false, "false_condition": "item is not mapping", "item": { "allow-host-ipv6": { "description": "Allows basic IPv6 functionality for the host running firewalld.", "egress_zones": [ "HOST" ], "forward_ports": [], "icmp_blocks": [], "ingress_zones": [ "ANY" ], "masquerade": false, "ports": [], "priority": -15000, "protocols": [], "rich_rules": [ "rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept", "rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept", "rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept", "rule family=\"ipv6\" icmp-type name=\"redirect\" accept" ], "services": [], "short": "Allow host IPv6", "source_ports": [], "target": "CONTINUE", "version": "" } }, "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [Fail if custom firewall_config is not its previous value] **************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:111 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.238) 0:00:24.139 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_config.custom != __previous_firewall_config.custom", "skip_reason": "Conditional result was False" } TASK [Fail if default zone differs] ******************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:116 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.017) 0:00:24.157 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_config.default_zone != __previous_firewall_config.default_zone", "skip_reason": "Conditional result was False" } TASK [Cleanup] ***************************************************************** task path: /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:122 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.014) 0:00:24.172 ******* included: fedora.linux_system_roles.firewall for sut => (item=(censored due to no_log)) TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.048) 0:00:24.221 ******* included: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.029) 0:00:24.250 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.027) 0:00:24.277 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.018) 0:00:24.296 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if transactional-update exists in /sbin] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:22 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.015) 0:00:24.311 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Set flag if transactional-update exists] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:27 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.015) 0:00:24.327 ******* skipping: [sut] => { "changed": false, "false_condition": "not __firewall_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Saturday 10 August 2024 05:28:12 +0000 (0:00:00.013) 0:00:24.340 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Notify user that reboot is needed to apply changes] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:43 Saturday 10 August 2024 05:28:14 +0000 (0:00:01.985) 0:00:26.326 ******* skipping: [sut] => { "false_condition": "__firewall_is_transactional | d(false)" } TASK [fedora.linux_system_roles.firewall : Reboot transactional update systems] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:48 Saturday 10 August 2024 05:28:14 +0000 (0:00:00.015) 0:00:26.342 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Fail if reboot is needed and not set] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:53 Saturday 10 August 2024 05:28:14 +0000 (0:00:00.014) 0:00:26.356 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Saturday 10 August 2024 05:28:14 +0000 (0:00:00.013) 0:00:26.369 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Saturday 10 August 2024 05:28:14 +0000 (0:00:00.012) 0:00:26.381 ******* skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "false_condition": "firewall_disable_conflicting_services | bool", "item": "ufw", "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Saturday 10 August 2024 05:28:14 +0000 (0:00:00.016) 0:00:26.398 ******* ok: [sut] => { "changed": false, "name": "firewalld", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestamp": "Sat 2024-08-10 05:27:55 UTC", "ActiveEnterTimestampMonotonic": "627361673", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service dbus-broker.service basic.target sysinit.target system.slice dbus.socket", "AllowIsolate": "no", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-08-10 05:27:53 UTC", "AssertTimestampMonotonic": "625947144", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "2022211000", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ConditionTimestampMonotonic": "625947140", "ConfigurationDirectoryMode": "0755", "Conflicts": "nftables.service shutdown.target ip6tables.service ipset.service iptables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlGroupId": "5701", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5290", "ExecMainStartTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ExecMainStartTimestampMonotonic": "625960114", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-08-10 05:27:53 UTC", "InactiveExitTimestampMonotonic": "625960429", "InvocationID": "46bffcc6387846b1917c4fe16148beeb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "5290", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "35266560", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service dbus-org.fedoraproject.FirewallD1.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestamp": "Sat 2024-08-10 05:27:55 UTC", "StateChangeTimestampMonotonic": "627361673", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "4", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.373) 0:00:26.771 ******* ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "AccessSELinuxContext": "system_u:object_r:firewalld_unit_file_t:s0", "ActiveEnterTimestamp": "Sat 2024-08-10 05:27:55 UTC", "ActiveEnterTimestampMonotonic": "627361673", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "polkit.service dbus-broker.service basic.target sysinit.target system.slice dbus.socket", "AllowIsolate": "no", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-08-10 05:27:53 UTC", "AssertTimestampMonotonic": "625947144", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "2022211000", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ConditionTimestampMonotonic": "625947140", "ConfigurationDirectoryMode": "0755", "Conflicts": "nftables.service shutdown.target ip6tables.service ipset.service iptables.service ebtables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlGroupId": "5701", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "DefaultStartupMemoryLow": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DropInPaths": "/usr/lib/systemd/system/service.d/10-timeout-abort.conf", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5290", "ExecMainStartTimestamp": "Sat 2024-08-10 05:27:53 UTC", "ExecMainStartTimestampMonotonic": "625960114", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[Sat 2024-08-10 05:27:53 UTC] ; stop_time=[n/a] ; pid=5290 ; code=(null) ; status=0/0 }", "ExitType": "main", "ExtensionImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FileDescriptorStorePreserve": "restart", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "2", "IOSchedulingPriority": "4", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-08-10 05:27:53 UTC", "InactiveExitTimestampMonotonic": "625960429", "InvocationID": "46bffcc6387846b1917c4fe16148beeb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14754", "LimitNPROCSoft": "14754", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14754", "LimitSIGPENDINGSoft": "14754", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "5290", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "35266560", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryKSM": "no", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemoryPressureThresholdUSec": "200ms", "MemoryPressureWatch": "auto", "MemorySwapMax": "infinity", "MemoryZSwapMax": "infinity", "MountAPIVFS": "no", "MountImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service dbus-org.fedoraproject.FirewallD1.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "ReloadSignal": "1", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartMaxDelayUSec": "infinity", "RestartMode": "normal", "RestartSteps": "0", "RestartUSec": "100ms", "RestartUSecNext": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RootEphemeral": "no", "RootImagePolicy": "root=verity+signed+encrypted+unprotected+absent:usr=verity+signed+encrypted+unprotected+absent:home=encrypted+unprotected+absent:srv=encrypted+unprotected+absent:tmp=encrypted+unprotected+absent:var=encrypted+unprotected+absent", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "RuntimeRandomizedExtraUSec": "0", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StartupMemoryHigh": "18446744073709551615", "StartupMemoryLow": "0", "StartupMemoryMax": "18446744073709551615", "StartupMemorySwapMax": "18446744073709551615", "StartupMemoryZSwapMax": "18446744073709551615", "StateChangeTimestamp": "Sat 2024-08-10 05:27:55 UTC", "StateChangeTimestampMonotonic": "627361673", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "4", "TasksMax": "4426", "TimeoutAbortUSec": "45s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "45s", "TimeoutStopFailureMode": "abort", "TimeoutStopUSec": "45s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.395) 0:00:27.166 ******* ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python3.12", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.050) 0:00:27.216 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.033) 0:00:27.250 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.024) 0:00:27.274 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.044) 0:00:27.319 ******* skipping: [sut] => { "changed": false, "skipped_reason": "No items in the list" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.041) 0:00:27.360 ******* skipping: [sut] => { "changed": false, "false_condition": "'detailed' in fw[0]", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.023) 0:00:27.384 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.018) 0:00:27.403 ******* skipping: [sut] => { "changed": false, "false_condition": "firewall == None or firewall | length == 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.022) 0:00:27.426 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.012) 0:00:27.438 ******* skipping: [sut] => { "changed": false, "false_condition": "__firewall_previous_replaced | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.015) 0:00:27.454 ******* skipping: [sut] => { "false_condition": "__firewall_previous_replaced | bool" } PLAY RECAP ********************************************************************* sut : ok=49 changed=2 unreachable=0 failed=0 skipped=96 rescued=0 ignored=0 Saturday 10 August 2024 05:28:15 +0000 (0:00:00.019) 0:00:27.473 ******* =============================================================================== fedora.linux_system_roles.firewall : Gather firewall config information --- 2.75s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 fedora.linux_system_roles.firewall : Install firewalld ------------------ 2.26s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 2.18s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Install firewalld ------------------ 2.12s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 fedora.linux_system_roles.firewall : Get config files, checksums before and remove --- 2.03s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 fedora.linux_system_roles.firewall : Install firewalld ------------------ 2.00s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 fedora.linux_system_roles.firewall : Install firewalld ------------------ 2.00s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 fedora.linux_system_roles.firewall : Install firewalld ------------------ 1.99s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:31 Gathering Facts --------------------------------------------------------- 1.00s /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:2 ---------------- Modify firewalld configuration ------------------------------------------ 0.69s /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:56 --------------- fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.56s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Get default zone -------------------------------------------------------- 0.49s /WORKDIR/git-weekly-cin8oy7k7n/tests/tests_firewall_fact.yml:15 --------------- fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.40s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.39s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.39s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.39s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.38s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.38s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.37s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.37s /WORKDIR/git-weekly-cin8oy7k7n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [DEPRECATION WARNING]: ANSIBLE_COLLECTIONS_PATHS option, does not fit var naming standard, use the singular form ANSIBLE_COLLECTIONS_PATH instead. This feature will be removed from ansible-core in version 2.19. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. [WARNING]: Platform linux on host sut is using the discovered Python interpreter at /usr/bin/python3.12, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.17/reference_appendices/interpreter_discovery.html for more information. ---^---^---^---^---^---