From 8d22340d517eb1556ef072c4b2aa0e84d9309dd9b2495c318b9b731db08a0fb4 Mon Sep 17 00:00:00 2001 From: Martin Pluskal Date: Wed, 15 Sep 2021 11:53:18 +0000 Subject: [PATCH] Accepting request 918930 from home:jsegitz:branches:systemdhardening:devel:tools:building Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort OBS-URL: https://build.opensuse.org/request/show/918930 OBS-URL: https://build.opensuse.org/package/show/devel:tools:building/distcc?expand=0&rev=31 --- distcc.changes | 6 ++++++ distccd.service | 13 +++++++++++++ 2 files changed, 19 insertions(+) diff --git a/distcc.changes b/distcc.changes index ad51cf3..3e81f79 100644 --- a/distcc.changes +++ b/distcc.changes @@ -1,3 +1,9 @@ +------------------------------------------------------------------- +Mon Sep 13 14:35:20 UTC 2021 - Johannes Segitz + +- Added hardening to systemd service(s) (bsc#1181400). Modified: + * distccd.service + ------------------------------------------------------------------- Wed May 12 21:18:15 UTC 2021 - Dirk Müller diff --git a/distccd.service b/distccd.service index 64a3720..4a3284d 100644 --- a/distccd.service +++ b/distccd.service @@ -3,6 +3,19 @@ Description=Distccd: A Distributed Compilation Server After=network.target [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +PrivateDevices=true +ProtectHostname=true +ProtectClock=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions EnvironmentFile=-/etc/sysconfig/distccd ExecStart=/usr/bin/distccd --verbose --no-detach --daemon --port 3632 -N 15 --allow $ALLOWED_SERVERS $EXTRA_PARAMS