-
Notifications
You must be signed in to change notification settings - Fork 741
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vfat added to dev-sec.conf, but efi is used #288
Comments
Workaround i used is adding |
very courius, I did some googling an even the Debian Docs mention, that cheking for another way would be to do a |
I'm also checked the docs and other sources, all say the
I use a vserver at Hetzner and i'm currently not sure what they are doing over there. |
same issue with official CentOS/RHEL images in Azure, which are using
therefore condition: https://github.com/dev-sec/ansible-os-hardening/blob/fe7e37e6e9bc0fd3b774979f3f3debe8ca387c1e/tasks/modprobe.yml#L15 is not triggered, because |
we could check, that the corresponding fstab entry for The other solution could be to remove the Can one of you verify, that the systems still boot, when the fstab entry is commented? |
For Azure Cloud compatibility with this hardening framework, you need to whitelist following:
therefore set |
I prepared a PR to check for this condition. As for |
great job with the PR. Regarding |
PR is merged now, so this should be fixed. |
`ssh_allow_tcp_forwarding`: use quotes for values
`ssh_allow_tcp_forwarding`: use quotes for values
On my Debian 10 Server the EFI detection the task file
modprobe.yml
doesn't work:The task checks for
/sys/firmware/efi
, but the content of that folder is:so this role doesn't detect that EFI is used and remove
vfat
and this results in the server not booting anymore.The text was updated successfully, but these errors were encountered: