diff --git a/mtp-configs/asn2net-vpnrtr.turnsys.net b/mtp-configs/asn2net-vpnrtr.turnsys.net index 9a96fe1..e862df6 100644 --- a/mtp-configs/asn2net-vpnrtr.turnsys.net +++ b/mtp-configs/asn2net-vpnrtr.turnsys.net @@ -306,39 +306,6 @@ brendan@10.30.1.48 - - - 1448729688 - pass - wan - inet - - - - - - - - keep state - - tcp - - - - - - 1198 - - - - - brendan@108.90.6.147 - - - - brendan@108.90.6.147 - - 1496065921 @@ -405,39 +372,6 @@ admin@10.253.1.2 - - - 1496549172 - pass - wan - inet - - - - - - - - keep state - - tcp - - - - - - 1200 - - - - - admin@10.253.1.2 - - - - admin@10.253.1.2 - - 1496067458 @@ -536,39 +470,6 @@ charles@108.90.6.147 - - - 1446317032 - pass - wan - inet - - - - - - - - keep state - - udp - - - - - - 1196 - - - - - charles@72.182.34.126 - - - - charles@72.182.34.126 - - 1446903164 @@ -1234,44 +1135,6 @@ 1 - - 3 - p2p_shared_key - UDP - tun - - wan - 1196 - - - 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 - AES-128-CBC - SHA1 - none - 192.168.196.0/30 - - - - - - - - - - - - yes - - none - - - - 0 - - - 1 - subnet - 4 p2p_shared_key @@ -1310,52 +1173,10 @@ 1 subnet - - 5 - p2p_tls - TCP - tun - - wan - 1198 - - - 55f489fd77719 - - 565eef8ab3359 - 1024 - 1 - BF-CBC - SHA1 - none - 192.168.203.0/30 - - - - - - - - - - yes - - yes - - none - - - - 0 - - - 3 - subnet - 6 p2p_shared_key - TCP + UDP tun wan @@ -1390,47 +1211,6 @@ 3 - - 7 - p2p_shared_key - TCP - tun - - wan - 1200 - - push route 10.251.0.0 255.255.0.0; -push route 10.253.0.0 255.255.0.0; -push route 10.40.0.0 255.255.0.0; -push route 172.16.80.0 255.255.255.0; - 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 - AES-128-CBC - SHA1 - none - 192.168.120.0/30 - - - - - - - - - - - - yes - subnet - - none - - - - 0 - - - 1 - 8 server_tls @@ -1490,9 +1270,9 @@ push route 192.168.120.0 255.255.255.252 - - - admin@10.40.50.77 + + + admin@10.251.100.101 @@ -1564,10 +1344,10 @@ push route 192.168.120.0 255.255.255.252 wan 158.69.183.166 WANGW - + 1 inet - + diff --git a/mtp-configs/ovh-core-rtr01.turnsys.net b/mtp-configs/ovh-core-rtr01.turnsys.net index 88f8e5b..dfec20e 100644 --- a/mtp-configs/ovh-core-rtr01.turnsys.net +++ b/mtp-configs/ovh-core-rtr01.turnsys.net @@ -1,1256 +1,896 @@ - - 15.8 - - - normal - ovh-core-rtr01 - turnsys.net - - all - - system - 1998 - - - admins - - system - 1999 - 0 - page-all - - - admin - - system - admins - $2b$10$7JpSzVedN7s.PnnMwkAy3.0J6sKliUJerfIL1HlY64kaPVSrZ8c9u - 0 - user-shell-access - 2 - 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 - - pfSense.css - - - 2000 - 2000 - pfv-ucs.turnsys.net ovh-ucs.turnsys.net satx-ucs.turnsys.net - - https - - 59344eda4e727 - 2 - - 2 - pfSense.css - - - - - hadp - hadp - hadp - - monthly - - America/Chicago - - enabled - - 115200 - serial - enabled - - - - - - yes - - - en_US - none - 10.253.3.201 - - - - - - em0 - - - - 00:50:56:00:d6:9d - 158.69.183.161 - 29 - WANGW - - - - vtnet0 - - - 10.253.9.254 - 24 - - - - vtnet1 - - - 10.253.3.254 - 24 - - - - vtnet2 - - - 10.253.6.254 - 24 - - - - vtnet3 - - - 10.253.7.254 - 24 - - - - vtnet4 - - - 10.253.44.254 - 24 - - - - - - - 10.253.9.10 - 10.253.9.244 - - - - - - - ::1000 - ::2000 - - assist - medium - - - - OVH - prodtechopsalerts@turnsys.com - kn3lmgmt - - - - - - - - - - 161 - - 162 - - opt1 - - - - - - 50 - 10.253.3.99 - - - - ipv4 - - - - - - automatic - - - - - - - -
158.69.183.165
- 443 -
- tcp - 10.253.9.78 - 443 - wan - - nat_597cd1cc065ba8.01190462 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - -
158.69.183.163
- 443 -
- tcp - 10.253.9.80 - 443 - wan - - nat_597cf3dd295c23.13339274 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - -
158.69.183.165
- 80 -
- tcp - 10.253.9.78 - 80 - wan - - nat_597cd1ed051541.16634797 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - - wanip - 80 - - tcp - 10.253.9.79 - 80 - wan - - nat_597cd453ac8360.78302498 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - - - - - - - -
158.69.183.163
- 80 -
- tcp - 10.253.9.80 - 80 - wan - - nat_597cf3be0f90f7.84639417 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - - wanip - 443 - - tcp - 10.253.9.79 - 443 - wan - - nat_597cd476a20e84.00129509 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - - -
- - - - - - wan - tcp - -
10.253.9.78
- 443 -
- - nat_597cd1cc065ba8.01190462 - 1501352396 - - - NAT Port Forward - -
- - - - - wan - tcp - -
10.253.9.78
- 80 -
- - nat_597cd1ed051541.16634797 - 1501352429 - - - NAT Port Forward - -
- - - 1501352532 - pass - wan - inet - - - - - - - - keep state - - tcp - - - - -
158.69.183.165
- 443 -
- - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - wan - tcp - -
10.253.9.79
- 80 -
- - nat_597cd453ac8360.78302498 - 1501353043 - - - NAT Port Forward - -
- - - - - wan - tcp - -
10.253.9.79
- 443 -
- - nat_597cd476a20e84.00129509 - 1501353078 - - - NAT Port Forward - -
- - - - - wan - tcp - -
10.253.9.80
- 80 -
- - nat_597cf3be0f90f7.84639417 - 1501361086 - - - NAT Port Forward - -
- - - - - wan - tcp - -
10.253.9.80
- 443 -
- - nat_597cf3dd295c23.13339274 - 1501361117 - - - NAT Port Forward - -
- - pass - inet - - lan - 0100000101 - - lan - - - - - - - pass - inet6 - - lan - 0100000102 - - lan - - - - - - - - 1496615387 - pass - openvpn - inet - - - - - - - - keep state - - -
172.16.80.0/24
- - - - - - - - admin@10.253.9.2 - - - - admin@172.16.80.2 - -
- - - 1498336605 - pass - openvpn - inet - - - - - - - - keep state - - -
192.168.120.0/30
- - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - -
- - - 1496615599 - pass - openvpn - inet - - - - - - - - keep state - - -
10.251.100.0/24
- - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - -
- - - 1498339856 - pass - openvpn - inet - - - - - - - - keep state - - -
192.168.197.0/30
- - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - -
- - - 1505584953 - pass - openvpn - inet - - - - - - - - keep state - - -
10.40.50.0/24
- - - - - - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - 1508046007 - pass - openvpn - inet - - - - - - - - keep state - - -
10.40.100.0/24
- - - - - - - - admin@10.40.50.17 - - - - admin@10.40.50.17 - -
- - - 1505665799 - pass - openvpn - inet - - - - - - - - keep state - - -
10.251.30.0/24
- - - - - - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - 1505666009 - pass - openvpn - inet - - - - - - - - keep state - - -
10.251.22.0/24
- - - - - - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - 1496707746 - pass - opt1 - inet - - - - - - - - keep state - - - opt1 - - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - - - - - 1496707927 - pass - opt2 - inet - - - - - - - - keep state - - - opt2 - - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - - - - - - - - -
- - - - - - - 1,31 - 0-5 - * - * - * - root - /usr/bin/nice -n20 adjkerntz -a - - - 1 - 3 - 1 - * - * - root - /usr/bin/nice -n20 /etc/rc.update_bogons.sh - - - */60 - * - * - * - * - root - /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout - - - */60 - * - * - * - * - root - /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 webConfiguratorlockout - - - 1 - 1 - * - * - * - root - /usr/bin/nice -n20 /etc/rc.dyndns.update - - - */60 - * - * - * - * - root - /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot - - - 30 - 12 - * - * - * - root - /usr/bin/nice -n20 /etc/rc.update_urltables - - - - - - - - - ICMP - icmp - - - - - TCP - tcp - - - - - HTTP - http - - - / - - 200 - - - - HTTPS - https - - - / - - 200 - - - - SMTP - send - - - - 220 * - - - - - system_information:col1:show,interfaces:col2:show - 10 - - - - - - 1 - UDP - tun - - wan - - 158.69.183.162 - 1194 - - - - none - - - - p2p_shared_key - subnet - - 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 - AES-128-CBC - SHA1 - none - 192.168.194.0/30 - - - - - - - - - - 1 - - - - - - - - - - - - - - - - - admin@10.40.50.77 - - - 59344eda4e727 - - server - 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 - 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 - - - - - wan - 158.69.183.166 - WANGW - 1 - - - - - - - OpenBGPD - - 0.11_9 - https://doc.pfsense.org/index.php/OpenBGPD_package - openbgpd.xml - - - iperf - http://www.freshports.org/benchmarks/iperf/ - - 2.0.5.5_3 - https://doc.pfsense.org/index.php/Iperf_package - iperf.xml - - - nmap - - 1.4.4_1 - https://doc.pfsense.org/index.php/Nmap_package - nmap.xml - - - mtr-nox11 - - http://www.bitwizard.nl/mtr/ - 0.85.6_1 - mtr-nox11.xml - - - ntopng - http://www.ntop.org/ - - 0.8.6_1 - ntopng.xml - true - - - softflowd - http://code.google.com/p/softflowd/ - - 1.2.2 - softflowd.xml - - - OpenBGPD -
Services
- /pkg_edit.php?xml=openbgpd.xml&id=0 -
- - iperf Client - Run iperf in client mode. -
Diagnostics
- /pkg_edit.php?xml=iperf.xml -
- - iperf Server - Run iperf in server mode. -
Diagnostics
- /pkg_edit.php?xml=iperfserver.xml -
- - NMap -
Diagnostics
- nmap.xml -
- - mtr -
Diagnostics
- /pkg_edit.php?xml=mtr-nox11.xml -
- - ntopng Settings - Set ntopng settings such as password and port. -
Diagnostics
- /pkg_edit.php?xml=ntopng.xml -
- - ntopng - Access ntopng -
Diagnostics
- /ntopng_redirect.php -
- - softflowd - Modify softflowd settings. -
Services
- softflowd.xml - /pkg_edit.php?xml=softflowd.xml -
- - bgpd - bgpd.sh - bgpd - - - - iperf - iperf - - mwexec("/usr/bin/killall iperf"); - - - ntopng - ntopng.sh - ntopng - - - - softflowd - softflowd.sh - softflowd - - - - - - - - 64522 - - yes - 192.168.194.2 - 192.168.194.2 - none - - 10.253.0.0/24 - - - 10.253.1.0/24 - - - 10.253.2.0/24 - - - 10.253.3.0/24 - - - 10.253.5.0/24 - - - 10.253.6.0/24 - - - 10.253.7.0/24 - - - 10.253.8.0/24 - - - 10.253.9.0/24 - - - - - - - 192.168.194.1 - - - - - remote-as - 64517 - - - - - - enabled - lan,opt1,opt2,opt3,opt4,wan - 10.253.3.99 - 9996 - - - 9 - full - 300 - 100 - 300 - 100 - 10 - 10 - 100 - - -
- - - - ipalias - wan - 5935fb59669c7 - - single - 29 - 158.69.183.164 - - - ipalias - wan - 5935fba3df38c - - single - 29 - 158.69.183.165 - - - ipalias - wan - 597ce7c0c0655 - - single - 29 - 158.69.183.163 - - - - - - - PHP-Growl - pfSense growl alert - - - tsys-cloud-www.turnsys.net - 25 - prodtechopsalerts@turnsys.com - - - PLAIN - ovh-core-rtr01@turnsys.net - - - - lan - yes - yes - - - - 128 - - - -
+ + opnsense + + + Disable the pf ftp proxy handler. + debug.pfftpproxy + default + + + Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html + vfs.read_max + default + + + Set the ephemeral port range to be lower. + net.inet.ip.portrange.first + default + + + Drop packets to closed TCP ports without returning a RST + net.inet.tcp.blackhole + default + + + Do not send ICMP port unreachable messages for closed UDP ports + net.inet.udp.blackhole + default + + + Randomize the ID field in IP packets (default is 0: sequential IP IDs) + net.inet.ip.random_id + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.sourceroute + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.accept_sourceroute + default + + + + Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects + to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect + packets without returning a response. + + net.inet.icmp.drop_redirect + default + + + + This option turns off the logging of redirect packets because there is no limit and this could fill + up your logs consuming your whole hard drive. + + net.inet.icmp.log_redirect + default + + + Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) + net.inet.tcp.drop_synfin + default + + + Enable sending IPv4 redirects + net.inet.ip.redirect + default + + + Enable sending IPv6 redirects + net.inet6.ip6.redirect + default + + + Enable privacy settings for IPv6 (RFC 4941) + net.inet6.ip6.use_tempaddr + default + + + Prefer privacy addresses and use them over the normal addresses + net.inet6.ip6.prefer_tempaddr + default + + + Generate SYN cookies for outbound SYN-ACK packets + net.inet.tcp.syncookies + default + + + Maximum incoming/outgoing TCP datagram size (receive) + net.inet.tcp.recvspace + default + + + Maximum incoming/outgoing TCP datagram size (send) + net.inet.tcp.sendspace + default + + + Do not delay ACK to try and piggyback it onto a data packet + net.inet.tcp.delayed_ack + default + + + Maximum outgoing UDP datagram size + net.inet.udp.maxdgram + default + + + Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) + net.link.bridge.pfil_onlyip + default + + + Set to 1 to additionally filter on the physical interface for locally destined packets + net.link.bridge.pfil_local_phys + default + + + Set to 0 to disable filtering on the incoming and outgoing member interfaces. + net.link.bridge.pfil_member + default + + + Set to 1 to enable filtering on the bridge interface + net.link.bridge.pfil_bridge + default + + + Allow unprivileged access to tap(4) device nodes + net.link.tap.user_open + default + + + Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) + kern.randompid + default + + + Maximum size of the IP input queue + net.inet.ip.intr_queue_maxlen + default + + + Disable CTRL+ALT+Delete reboot from keyboard. + hw.syscons.kbd_reboot + default + + + Enable TCP extended debugging + net.inet.tcp.log_debug + default + + + Set ICMP Limits + net.inet.icmp.icmplim + default + + + TCP Offload Engine + net.inet.tcp.tso + default + + + UDP Checksums + net.inet.udp.checksum + default + + + Maximum socket buffer size + kern.ipc.maxsockbuf + default + + + + normal + ovh-core-rtr01 + turnsys.net + + admins + System Administrators + system + 1999 + 0 + user-shell-access + page-all + + + root + System Administrator + system + admins + $2b$10$k7UpLMTFYZHVQqDpnlXr1.tMDVslyuzDVWfvMg9.MNwC1SydPyxoy + 0 + + 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 + + + + 2000 + 2000 + America/Chicago + 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org + + http + 5acd29581b4ba + + + + + + yes + 1 + 1 + 1 + 1 + 1 + 1 + hadp + hadp + hadp + + monthly + + 1 + 60 + aesni + 1 + 1 + en_US + 10.253.3.201 + 8.8.8.8 + 8.8.4.4 + 115200 + video + + 1 + lan,opt1 + enabled + 1 + + basic + + + + + none + none + none + none + none + none + none + none + + + + em0 + WAN + 1 + + 1 + 1 + 158.69.183.161 + 29 + GW_WAN + + + + + + vtnet0 + TSYS + 1 + + 10.253.9.252 + 24 + + + + + + + vtnet1 + mgmt + 1 + + 10.253.3.252 + 24 + + + + + + + 1 + 1 + openvpn + OpenVPN + group + 1 + + + + + + + 10.253.9.10 + 10.253.9.244 + + + + + on + + + + + public + + + + + + + automatic + + + tcp + wan + inet + Allow HTTP to tsys-cloud-www + + + + pass + 10.253.9.80 + 80 + + 1 + + +
158.69.183.163
+ 80 +
+ + root@10.251.100.101 + + /firewall_nat_edit.php made changes + + + root@10.40.50.77 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + inet + Allow HTTPS to tsys-cloud-www + + + + pass + 10.253.9.80 + 443 + + 1 + + +
158.69.183.163
+ 443 +
+ + root@10.251.100.101 + + /firewall_nat_edit.php made changes + + + root@10.40.50.77 + + /firewall_nat_edit.php made changes + +
+
+ + + pass + wan + inet + keep state + tcp + + 1 + + +
158.69.183.163
+ 443 +
+ + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + +
+ + pass + wan + inet + keep state + tcp + + 1 + + +
158.69.183.163
+ 80 +
+ + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + +
+ + pass + inet + Default allow LAN to any rule + lan + + lan + + + + + + + pass + inet6 + Default allow LAN IPv6 to any rule + lan + + lan + + + + + + + pass + openvpn + inet + keep state + + 1 + + + 1 + + + root@10.253.9.2 + + /firewall_rules_edit.php made changes + + + root@10.253.9.2 + + /firewall_rules_edit.php made changes + + + + pass + opt1 + inet6 + keep state + Default allow LAN IPv6 to any rule + + opt1 + + + 1 + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + + pass + opt1 + inet + keep state + Default allow LAN to any rule + + opt1 + + + 1 + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + + pass + opt1 + inet + keep state + Allow traffic to management VLAN + + 1 + + + 1 + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + +
+ + + + + + ICMP + icmp + ICMP + + + + TCP + tcp + Generic TCP + + + + HTTP + http + Generic HTTP + + / + + 200 + + + + HTTPS + https + Generic HTTPS + + / + + 200 + + + + SMTP + send + Generic SMTP + + + 220 * + + + + + 0.opnsense.pool.ntp.org + + + system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show + 2 + + + root@10.40.50.77 + + /firewall_virtual_ip_edit.php made changes + + + + + + + + + + + + + wan + v9 + + + + 0 + + + + + + + + + 0 + 0 + 0 + wan + 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 + + + W0D23 + 4 + ac + 0 + 0 + + + + + 0 + + + + 1 + 1 + + + + + + 0 + on + strip + 1 + 0 + admin@localhost.local + + + + 0 + /var/squid/cache + 256 + + 100 + 16 + 256 + 0 + 0 + + + + 0 + 2048 + 1024 + 1024 + 256 + + + + lan + 3128 + 3129 + 0 + 0 + + + 4 + 5 + + 2121 + 0 + 1 + 0 + + + + + + + + + 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http + 443:https + + + + + + + 0 + icap://[::1]:1344/avscan + icap://[::1]:1344/avscan + 1 + 0 + 0 + X-Username + 1 + 1024 + 60 + + + + + OPNsense proxy authentication + 2 + 5 + + + + + + + + + + + 1 + 64522 + 10.253.9.0/24,10.253.3.0/24,192.168.194.0/30 + + + + 1 +
192.168.194.1
+ 64517 + openvpn + 0 + 0 + + + + +
+
+ + + +
+ + 1 + 0 + notifications + 0 + notifications + +
+
+ + 5acd29581b4ba + Web GUI SSL certificate + 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 + LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUpRZ0lCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQ1N3d2dna29BZ0VBQW9JQ0FRRFZ1SHAwY1pKOE5GNDMKSnp3V2Y3cWdZT1RLYWVQTnFFRUx5QkdKZmZSaDNBZzllcUdKdGdvR0IxaEJoM2lIaUhkY003Tmg3YVZoNU5SbwpSbDhPVlV1TlpxdjhjdHFjYnpjQ2J6RTR1N0NrR0FXd2d3dDlNWUFPb0VMQTluVDJCSVRRNHE2OFlRK1Bib2Z6CktFekhkWTU2aE51OE1JblZZRnVnSFZFdlo5T1lXY2FyWHBJamFKUHZwWEFEZWxNRElTaGw4VmgvRjBzalNLZVAKSys3dUp3RUE4eEk2SmpQU1pGWlJoM2NiN242dHZnRVIwakxBdU1JYnU4bnRjRFo1aXQ1N3J0dGxMTG1QbGJqTApOd3RFeWNXeDF6NmhEUWJBaU90Tm5RTHI5NlBSQ05XVTBNTkkrRnppOEZtQ1ZYWFo3K3FiTUszYXc1em1vcSt1CnhHYXNJWCsxSE5US281aUdTL0crd2Vmem1BMlRRbzFlVWpROXhYZHhveVBnVkZUbXZ1dGtPZ2VBMzlNdGtTSVIKOVFGYlJnamVjUWdXUnk2dFhIYWNubHlwblJqNUpza3dDRGs1b2RXcnFvU0dXMERXUStnQ0o2cWxvSHV5aUlJNApjK0E3NEk1ZmtnSDVBdmVHKzl6VERob2w3Z0Q0b00wcVpESk9JS1lockNSSWkxWnAyUmhQUktCWG1EVUVsdTArCitzbUQ0M2RhTHZBbTh1UDI2Qjc5U1cxYTQ3S3p2SzNaZmdlVlpVREJNZjliUUxETzVsRE9XY3pyellhN3htbVUKdGVUUDB3Sk5OMmVlRUdyNFRKNnVUZkkzbzNjUjlIWGU4Nkt2ZFJXa1JSVVNnbWlVTU1YZ09MVGpVYWxWS2VwTgpRRElycUYzVUJrUnE1VEJPdklnZnFiV1g1UUgrMndJREFRQUJBb0lDQUJBdzhxNEJzS3hTTjFVTVZ1UUpkelVSClFpUUhrNmVQK0tXUTJhdEY3STdCWWFwdXNQQkM1MDEvbnZNUDlWU25SUXVxS3d2Zk9pbEpjY0lZbXJqMlEwd0sKSER0NjVBNzM2ZjM0T0kxb3dzQWJ4Y3FTa3Z0QUZjaUY0YWpHd3lPa1FmK2xQTUd1eE1RRUJxNm9QZkRhZWhuVQpHT1dQODlGRGhJMkR5eFBCVk9sMDI3VTk2K3BjME9CVjh6K0FNK3ZIeGt5NjFRNkQwRUJ6RDZhc0dHVFlkWjRCCnpENjFpRFdIUG5iY3dXeFBUQytUZG5kSUttb3BWU05PdmNTTVBNUkdmZ1oydjg1UmJobHZxVmxUNlRtajQ2Tk8KZ0VNcFBucTFwTVh6Z0RZcVE3SGhiblRndi9xMlBpcy9ORGpJaXE0aEcrLzM1eVBzcitWVksrUWNvdjZsWnd4SgpDRG9oRnFvQlZzNlBiK2YvSGZjUlBCRnBmY1FjeDNnQ2ZWTWh5a3dPN3dBak56cGh1SDNZSlZucGN0Lytnc2p3CkUzMVVLbkZ0eEhmM0NCemNhVDFiR21idzMxekFLalZRTUdOcjFJd2x5Q2o5RmdLdERURzFqcWVKS3pFZy9qMUQKakl6TUo2QUVJMVR1cjlxTi8rZmxQVE53YXVjRmpUMWRRMzVpeG92RFpyY3ZKMEhlTStkSUdTVnNqKzl1K0NTdApzb3ZvdGprWGpsWmdIUngvY1hId1dEbUQ3SFp3MlRuNnBBeGE0aEplRFc0MlJOQURrODRSM3dpSzZzVEl1VHZZClFGUGJJN0I3a3BlMWlzVTduamVjbkcweS8wcjJkbUZNUFpncUNPYXFtSTYwMTl4N09zVjFUNkxHSXBkMDRHY1YKUlYrN1ZuWmcrS0NHenhHaTEvWlJBb0lCQVFENVlhY1NCTGlmYnoxeHpjWEM2bEJ3cE5KNW5wT1M2SG16QlJocQpJcHI4WlVWcDBHTkw3SnBJYzE0cDY4RzRlWDB0NTh5eDRKMDRTdVZDVDMvOFMwamtaV01RckVmbTg0ZmM3RitsCk1vakxEcS9uWmQ2a1ZnUjdCSU5DZjJpaXc2ZEpkOFVTWWc3K2pLakpYK2J2cGsvbWdoYW9yRE1FYVZaN2UvQUoKM0VNenV5TVMrSWgvRGJRYTEyNUV2QkZzdm1CR3NveWNGYmJMMHFDc3BBNjBzcTd2UHNCdlIvVVN3d1ZyVGhmagoxV0ltSmtNdHlwVVNLSVBSZXJUaHZjMlhCL1R0Zk9ieXJnc0l6RnRMOTFtOWRDNXNRTzhSUzZWYTloc3hhMTZZCkVlSGZ2N3NuTTY3M2w1YVgzd2ZrclpWN3g5ZEJCNU5sek9Wa2lkNzZKSmlvb1JYREFvSUJBUURiWklueno4T1IKV013cXNsQWVqLzVXTk8wYzE1U0RoOTB1RkVneFJ1Qmw2dDNqRVZlV0g5U1VLRlRoUkQxWGxsRkpGY3k0YmdBTApIaEQvakE5QTVSdnowczhlVHduODcxM0o1YmdNMWFOb092MVJTS2dZeFN1UWwzdkRYSHFNQ3Rrd3JUOFhsL3lEClo3bU9LVXU4bHhnS1Q1UllXc1dtZ3FuQXJMSG1Ca1FKMU4zdVpiVHU0cWx0WGtoelhaL2swN1B5ZlZvOFMrb2UKU1hwVy85RkpDcEd0Z21PT05WSXcvbU1MNy9ZZ3hFTFRRUS9udmIrSkFKb2xQWWp6ZkVFYy9TYkQ1ckFob09XcwpCYmRKYXkyWGRmWC83ZVZZQnptblllZ2Zod2h4WDVTWGZ3b2lCc2c1VUtvekhaSVhpckVkeTQrdk1wUzl0eWs3Cks1bkN0Mk1QOUNrSkFvSUJBUURLRml4QkdicFMyTjQ5L3JZbmdhRzE1cHI1RzF3VFRIaHliY3FmRjNQbzNGZ24KcTBzTUY2dmUwajZZVWdnbDZhMWJLZUJpdE5ZeTY5NWtvZS9oRDFEK1pIcW01RFZRSGtFVzhpVi94VGU4OVNYdQpxa3FGZVg4Z0FVUXMrdnBjQzVqZ25FSUM1NXVuQTIwejRwZE4xTVFpMDRCeEp6b2dkUXd6L1BkRHhrNWUrV011CjJHQWtOWUtoemJuNTBUMTlsYmlIRWVHSUNzQ2E0eEI1Vm1qa1hYZ05RQmpKRk5Ld1pZRmF0Mm44b3NwcWg4OGcKcUcyc3pWQWt6UDhQZjdPK2xDQVM0NGh6V0Q1dzNzbU5BZUNpK2ljMGFscFE5YkFGeWpHM0ZuOE5WRkJwOVFGQQpmMDFtTGwxR3JPSEVtalhzbk1EK1habEFnWTNTcnpjV0ZkbnZyTG5wQW9JQkFERXlVbDBCOGZEZDRLcVNZYlQ0CnhTZS9wb3daSzR4ekl2MzZQbFlPZHJOai8yMnpyZGhVT3U4ZVBDcG5pdm5oRTBrNFFqZjVNcmxMZkxSUlMvcFoKWmZNL0NvTFpabnY1a1NaOUJOQ2I5NUNmNmI0WWRObFpIWFBIQkZIQ294aFVObS9iNlpINDJ2NzhlM2VOZXhaSApLM1RrYzNkOG8yVzdWeVdGbEQ3b21NazdtcWlpMWZmYmkvS2llY3lrNmYzK0d4UDlXQWE5WHpwN2I1dWlzZU9YCkl5T3RZWFc2THp3ZFQwaVYvck5LVDFIZi9Sa1NTNmtGSVl2SVNMV1EzMmtJdTNDaWdreUlML2hyTDdhZStoSkUKdVcweWc0TkIyNFBWU0tBSlA3TnNvMzExVjJoWjdQd3RRbjFEM0VhN0t3eHJZVVVBS3FxQU1CYThxRFlwdVdVUwpjMEVDZ2dFQWRudXFjWENTeFNicXFQbEc3VU5VZ0dyS28zMHJyWDJaSFlxVkNPc0c4TmZBZC9Id3dRc3pmMEpmCmJqc1JGQlVEYzFLdTk1dFRpWU5VWnArd211S2pxcEZIcjFhNmtQOEgxNWFTUllSTTNITHYwUDYxSGVqa29NeUMKZ3A4QlJibDRuUzh1N3o5YjNWV3FuOVJKOEIrWFRDTGh5Qy9DVTZRZEZCZC9ZUXpOTGNNQktEckppd0pNN3U4YgpFSUZ5MWpRZVlOTC9WcWNuSDY0dm9INEdDZzc5eFJLdlBmWnhBaUZTckhIUVdQWWVJRllDRnlVTUhwMmpTdE43CjVOZ01RWXArbkZZL2d5cWJId2JHQ0JtYWp0bWVYRU1WcnR5SzZ2QXE1RUM2djFrWS9tVFRDb1Jtdmk1djE2ZWoKbWx4azdLanhCWTAvd2tHREY5bkhEMGNEVHpYaHdBPT0KLS0tLS1FTkQgUFJJVkFURSBLRVktLS0tLQo= + + + + + vtnet0 + 9 + 0 + tsys + vtnet0_vlan9 + + + vtnet1 + 3 + 0 + mgmt + vtnet1_vlan3 + + + + + Interface WAN Gateway + 1 + inet + wan + 158.69.183.166 + 1 + GW_WAN + 1 + 1 + + + Interface WAN Gateway + 1 + inet + wan + 158.69.183.166 + 1 + GW_WAN + 1 + 1 + + + + + UDP + tun + 158.69.183.162 + 1194 + none + ASN2NET Backbone + p2p_shared_key + AES-128-CBC + SHA1 + none + 192.168.194.0/30 + 1 + wan + 1 + + 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 + + + + + + single + 29 + carp + wan + tsys-cloud-www + 158.69.183.163 + 1 + 0 + 1 + 123 + + + single + 24 + carp + lan + floating gw tsys + 10.253.9.254 + 2 + 0 + 1 + vip123 + + + single + 24 + carp + opt1 + toolbox/ucs + 10.253.3.254 + 3 + 0 + 1 + c0l0rad0 + + +
diff --git a/mtp-configs/pfv-core-rtr02.pfv.turnsys.net b/mtp-configs/pfv-core-rtr02.pfv.turnsys.net new file mode 100644 index 0000000..14430c4 --- /dev/null +++ b/mtp-configs/pfv-core-rtr02.pfv.turnsys.net @@ -0,0 +1,1011 @@ + + + opnsense + + + Disable the pf ftp proxy handler. + debug.pfftpproxy + default + + + Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html + vfs.read_max + default + + + Set the ephemeral port range to be lower. + net.inet.ip.portrange.first + default + + + Drop packets to closed TCP ports without returning a RST + net.inet.tcp.blackhole + default + + + Do not send ICMP port unreachable messages for closed UDP ports + net.inet.udp.blackhole + default + + + Randomize the ID field in IP packets (default is 0: sequential IP IDs) + net.inet.ip.random_id + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.sourceroute + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.accept_sourceroute + default + + + + Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects + to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect + packets without returning a response. + + net.inet.icmp.drop_redirect + default + + + + This option turns off the logging of redirect packets because there is no limit and this could fill + up your logs consuming your whole hard drive. + + net.inet.icmp.log_redirect + default + + + Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) + net.inet.tcp.drop_synfin + default + + + Enable sending IPv4 redirects + net.inet.ip.redirect + default + + + Enable sending IPv6 redirects + net.inet6.ip6.redirect + default + + + Enable privacy settings for IPv6 (RFC 4941) + net.inet6.ip6.use_tempaddr + default + + + Prefer privacy addresses and use them over the normal addresses + net.inet6.ip6.prefer_tempaddr + default + + + Generate SYN cookies for outbound SYN-ACK packets + net.inet.tcp.syncookies + default + + + Maximum incoming/outgoing TCP datagram size (receive) + net.inet.tcp.recvspace + default + + + Maximum incoming/outgoing TCP datagram size (send) + net.inet.tcp.sendspace + default + + + Do not delay ACK to try and piggyback it onto a data packet + net.inet.tcp.delayed_ack + default + + + Maximum outgoing UDP datagram size + net.inet.udp.maxdgram + default + + + Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) + net.link.bridge.pfil_onlyip + default + + + Set to 1 to additionally filter on the physical interface for locally destined packets + net.link.bridge.pfil_local_phys + default + + + Set to 0 to disable filtering on the incoming and outgoing member interfaces. + net.link.bridge.pfil_member + default + + + Set to 1 to enable filtering on the bridge interface + net.link.bridge.pfil_bridge + default + + + Allow unprivileged access to tap(4) device nodes + net.link.tap.user_open + default + + + Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) + kern.randompid + default + + + Maximum size of the IP input queue + net.inet.ip.intr_queue_maxlen + default + + + Disable CTRL+ALT+Delete reboot from keyboard. + hw.syscons.kbd_reboot + default + + + Enable TCP extended debugging + net.inet.tcp.log_debug + default + + + Set ICMP Limits + net.inet.icmp.icmplim + default + + + TCP Offload Engine + net.inet.tcp.tso + default + + + UDP Checksums + net.inet.udp.checksum + default + + + Maximum socket buffer size + kern.ipc.maxsockbuf + default + + + Page Table Isolation (Meltdown mitigation, requires reboot.) + vm.pmap.pti + default + + + Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) + hw.ibrs_disable + default + + + + normal + pfv-core-rtr02 + pfv.turnsys.net + + admins + System Administrators + system + 1999 + 0 + user-shell-access + page-all + + + root + System Administrator + system + admins + $2b$10$A6E8slPQ47ZeKAAWEZikquT4cKDePehCLY547YFCcOIlQGPcaTeSu + 0 + + c3NoLXJzYSBBQUFBQjNOemFDMXljMkVBQUFBREFRQUJBQUFCQVFDbzVUMEZFVUtvWWF4Umhqczl5V3pLdEV5WHVLSnZUV29scnlEMzk1ZXF5QkoweE94YmtYSis4RU13S3RXTTZOVzVxYXFXYlQySkovVnpPSWNvWW14QXUrK3F3U1dPZXNrVnIrRnhQcjJ5cGFXRDk4bkp5K0NwWjlSTjZQdzZLaWtIYWt5cXpTVVdLWGRvdldpVHBkenFSTytqMExtSm1nVWlUM05zaDQyZXlidnQvVDdKTWtWRzRXK2pvUlgrRENTNFVJUlJRZ01SRDRUcUJRL2pyOW03VnMwYUpuMWxmbGdzcHJzYWNnb2crc0hsRXppdHd3Y1JxTU5wcDVKbTBEZmhqNlBxQXZzZ0tKWVdPT01GVm93dkdzcW5ROXdxSm81QWxsbGJUR1YxUkhlSUJPM2ZSUlU4VWQ5VFBBM0FmeDE2L2FwZjFua0xoVjhRWDltSXhFV3A= + + + + 2000 + 2000 + America/Chicago + 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org + + https + 5ab5ea42ad218 + + + + + + yes + 1 + 1 + 1 + 1 + 1 + + hadp + hadp + hadp + + monthly + + + 60 + aesni + 1 + 1 + 1 + en_US + 10.251.30.71 + 115200 + video + + 1 + + enabled + 1 + + none + none + none + none + none + none + none + none + + + + 1 + ue0 + dhcp + dhcp6 + 32 + + on + + + 0 + WAN + + + 1 + bge0_vlan100 + 10.251.100.253 + 24 + + + + + + + LAN + + + 1 + 1 + openvpn + OpenVPN + group + 1 + + + bge0_vlan30 + ProductionManagement + 1 + + 10.251.30.253 + 24 + + + bge0_vlan22 + HouseServices + 1 + + 10.251.22.253 + 24 + + + bge0_vlan200 + Nerdbone + 1 + + 10.251.200.253 + 24 + + + bge0_vlan5 + RRVOIP + 1 + + 10.251.5.253 + 24 + + + bge0_vlan3 + RRAP + 1 + + 10.251.3.253 + 24 + + + + + 1 + + + 10.251.100.10 + 10.251.100.245 + + 10.251.30.71 + + + + on + + + + 1 + 1 + 1 + 1 + 1 + 1 + + 1 + kn3lmgmt + 161 + + + + 162 + + opt1 + + + 1 + 50 + 10.253.3.99 + + + + ipv4 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + + + + automatic + + + + + pass + inet + Default allow LAN to any rule + lan + + lan + + + + + + + pass + inet6 + Default allow LAN IPv6 to any rule + lan + + lan + + + + + + + pass + openvpn + inet + keep state + allow full transit across vpn + + 1 + + + 1 + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + + pass + openvpn + inet + keep state + allow bgp + tcp + +
192.168.198.1/30
+ + +
192.168.198.2/30
+ 179 +
+ + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + +
+ + pass + opt1 + inet + keep state + + lan + + + opt1 + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + + pass + opt1 + inet + keep state + +
10.40.50.0/24
+ + + opt1 + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + +
+ + pass + opt1 + inet + keep state + +
10.253.3.0/24
+ + + opt1 + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + +
+ + pass + opt2 + inet + keep state + + lan + + + opt2 + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + + pass + opt3 + inet + keep state + + lan + + + opt3 + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + +
+ + + + + + ICMP + icmp + ICMP + + + + TCP + tcp + Generic TCP + + + + HTTP + http + Generic HTTP + + / + + 200 + + + + HTTPS + https + Generic HTTPS + + / + + 200 + + + + SMTP + send + Generic SMTP + + + 220 * + + + + + 0.opnsense.pool.ntp.org + + + system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show + 2 + + + root@10.40.50.77 + + /services_snmp.php made changes + + + + + + + + + + + + + + + + + + + + + 0 + 0 + 0 + wan + 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 + + + W0D23 + 4 + ac + 0 + 0 + + + + + 0 + + + + 1 + 1 + + + + + + 0 + on + strip + 1 + 0 + admin@localhost.local + + + + 0 + /var/squid/cache + 256 + + 100 + 16 + 256 + 0 + 0 + + + + 0 + 2048 + 1024 + 1024 + 256 + + + + lan + 3128 + 3129 + 0 + 0 + + + 4 + 5 + + 2121 + 0 + 1 + 0 + + + + + + + + + 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http + 443:https + + + + + + + 0 + icap://[::1]:1344/avscan + icap://[::1]:1344/avscan + 1 + 0 + 0 + X-Username + 1 + 1024 + 60 + + + + + OPNsense proxy authentication + 2 + 5 + + + + + + + wan + v9 + + + + 0 + + + + + 1 + 1 + debugging + 0 + notifications + + + 1 + 64524 + 10.251.0.0/16,192.168.198.0/30 + + + + 1 +
192.168.198.1
+ 64517 + openvpn + 0 + 0 + + + + +
+
+ + + +
+
+ + + 0 + 0 + 1 + 10 + 100 + 30 + 20 + 0 + 0 + 0 + 1 + 1 + 0 + 1 + 0 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 0 + 100M + 25M + 16 + 10000 + 0 + database.clamav.net + 60 + + +
+ + + bge0 + 100 + bge0_vlan100 + + + bge0 + 100 + bge0_vlan100 + + + bge0 + 30 + 0 + ProductionManagement + bge0_vlan30 + + + bge0 + 200 + 0 + Nerdbone + bge0_vlan200 + + + bge0 + 22 + 0 + LabManagement + bge0_vlan22 + + + bge0 + 3 + 0 + RR-AP + bge0_vlan3 + + + bge0 + 4 + 0 + RR-SW + bge0_vlan4 + + + bge0 + 5 + 0 + RR-VOIP + bge0_vlan5 + + + bge0 + 6 + 0 + RR-RTR-LAN1 + bge0_vlan6 + + + bge0 + 7 + 0 + RR-IPTV + bge0_vlan7 + + + bge0 + 8 + 0 + RR-PeanutGallery1 + bge0_vlan8 + + + bge0 + 9 + 0 + RR-MalZoo + bge0_vlan9 + + + bge0 + 10 + 0 + RR-Fstack1 + bge0_vlan10 + + + bge0 + 11 + 0 + RR-RTRWAN-1 + bge0_vlan11 + + + + 5ab5ea42ad218 + Web GUI SSL certificate + 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 + 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 + + + + + UDP + tun + 158.69.183.162 + 1199 + none + asn2net + p2p_shared_key + AES-128-CBC + SHA1 + none + 192.168.198.0/30 + no + 5 + wan + 1 + + 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 + + + + + single + 24 + carp + opt2 + lan gw - vl22 + 10.251.22.254 + 1 + 0 + 1 + vippw + + + single + 24 + carp + opt1 + langw - vl30 + 10.251.30.254 + 2 + 0 + 1 + vippw + + + single + 24 + carp + opt3 + 10.251.200.254 + 3 + 0 + 1 + carpvip + + + +
diff --git a/rundeck/tsys-nodes b/rundeck/tsys-nodes index 4fd92bd..5f647bf 100644 --- a/rundeck/tsys-nodes +++ b/rundeck/tsys-nodes @@ -37,4 +37,7 @@ ovh-ucs.turnsys.net: hostname: ovh-ucs.turnsys.net username: root ssh-keypath: /var/lib/rundeck/ssh-keys/tsys_root.key - +rackrental-app.turnsys.net: + hostname: rackrental-app.turnsys.net + username: root + ssh-keypath: /var/lib/rundeck/ssh-keys/tsys_root.key diff --git a/slack/prod/ovh/files/etc/issue b/slack/prod/ovh/files/etc/issue new file mode 100644 index 0000000..a6e88dc --- /dev/null +++ b/slack/prod/ovh/files/etc/issue @@ -0,0 +1,10 @@ +=============================================================================== + + This is a private computer system. These resources, including all + related equipment, networks, and devices, are provided for authorized + use only. The system may be monitored for all lawful purposes. Evidence + of unauthorized use collected during monitoring may be used for criminal + prosecution by staff, legal counsel, and law enforcement agencies. + +=============================================================================== + diff --git a/slack/prod/ovh/files/etc/issue.net b/slack/prod/ovh/files/etc/issue.net new file mode 100644 index 0000000..a6e88dc --- /dev/null +++ b/slack/prod/ovh/files/etc/issue.net @@ -0,0 +1,10 @@ +=============================================================================== + + This is a private computer system. These resources, including all + related equipment, networks, and devices, are provided for authorized + use only. The system may be monitored for all lawful purposes. Evidence + of unauthorized use collected during monitoring may be used for criminal + prosecution by staff, legal counsel, and law enforcement agencies. + +=============================================================================== + diff --git a/slack/prod/pfv/files/etc/issue b/slack/prod/pfv/files/etc/issue new file mode 100644 index 0000000..a6e88dc --- /dev/null +++ b/slack/prod/pfv/files/etc/issue @@ -0,0 +1,10 @@ +=============================================================================== + + This is a private computer system. These resources, including all + related equipment, networks, and devices, are provided for authorized + use only. The system may be monitored for all lawful purposes. Evidence + of unauthorized use collected during monitoring may be used for criminal + prosecution by staff, legal counsel, and law enforcement agencies. + +=============================================================================== + diff --git a/slack/prod/pfv/files/etc/issue.net b/slack/prod/pfv/files/etc/issue.net new file mode 100644 index 0000000..a6e88dc --- /dev/null +++ b/slack/prod/pfv/files/etc/issue.net @@ -0,0 +1,10 @@ +=============================================================================== + + This is a private computer system. These resources, including all + related equipment, networks, and devices, are provided for authorized + use only. The system may be monitored for all lawful purposes. Evidence + of unauthorized use collected during monitoring may be used for criminal + prosecution by staff, legal counsel, and law enforcement agencies. + +=============================================================================== + diff --git a/slack/prod/satx/files/etc/issue b/slack/prod/satx/files/etc/issue new file mode 100644 index 0000000..a6e88dc --- /dev/null +++ b/slack/prod/satx/files/etc/issue @@ -0,0 +1,10 @@ +=============================================================================== + + This is a private computer system. These resources, including all + related equipment, networks, and devices, are provided for authorized + use only. The system may be monitored for all lawful purposes. Evidence + of unauthorized use collected during monitoring may be used for criminal + prosecution by staff, legal counsel, and law enforcement agencies. + +=============================================================================== + diff --git a/slack/prod/satx/files/etc/issue.net b/slack/prod/satx/files/etc/issue.net new file mode 100644 index 0000000..a6e88dc --- /dev/null +++ b/slack/prod/satx/files/etc/issue.net @@ -0,0 +1,10 @@ +=============================================================================== + + This is a private computer system. These resources, including all + related equipment, networks, and devices, are provided for authorized + use only. The system may be monitored for all lawful purposes. Evidence + of unauthorized use collected during monitoring may be used for criminal + prosecution by staff, legal counsel, and law enforcement agencies. + +=============================================================================== +