Accepting request 918939 from home:jsegitz:branches:systemdhardening:network:fcoe
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort OBS-URL: https://build.opensuse.org/request/show/918939 OBS-URL: https://build.opensuse.org/package/show/network:fcoe/fcoe-utils?expand=0&rev=50
This commit is contained in:
committed by
Git OBS Bridge
parent
75792026aa
commit
fbbc35f4c4
@@ -1,3 +1,9 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 14 08:23:41 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||
|
||||
- Added hardening to systemd service(s) (bsc#1181400). Added patch(es):
|
||||
* harden_fcoe.service.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Mar 25 17:09:14 UTC 2021 - Lee Duncan <lduncan@suse.com>
|
||||
|
||||
|
@@ -37,6 +37,7 @@ Summary: FCoE userspace management tools
|
||||
License: GPL-2.0-only
|
||||
Group: System/Daemons
|
||||
Source: %{name}-%{version}.tar.xz
|
||||
Patch0: harden_fcoe.service.patch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
%{?systemd_requires}
|
||||
|
||||
@@ -47,6 +48,7 @@ connections.
|
||||
|
||||
%prep
|
||||
%setup -q
|
||||
%patch0 -p1
|
||||
|
||||
%build
|
||||
autoreconf -vi
|
||||
|
21
harden_fcoe.service.patch
Normal file
21
harden_fcoe.service.patch
Normal file
@@ -0,0 +1,21 @@
|
||||
Index: fcoe-utils-1.0.34/etc/systemd/fcoe.service
|
||||
===================================================================
|
||||
--- fcoe-utils-1.0.34.orig/etc/systemd/fcoe.service
|
||||
+++ fcoe-utils-1.0.34/etc/systemd/fcoe.service
|
||||
@@ -3,6 +3,16 @@ Description=Open-FCoE initiator daemon
|
||||
After=syslog.target network.target
|
||||
|
||||
[Service]
|
||||
+# added automatically, for details please see
|
||||
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
+ProtectSystem=full
|
||||
+ProtectHome=true
|
||||
+ProtectHostname=true
|
||||
+ProtectClock=true
|
||||
+ProtectKernelLogs=true
|
||||
+ProtectControlGroups=true
|
||||
+RestrictRealtime=true
|
||||
+# end of automatic additions
|
||||
Type=simple
|
||||
EnvironmentFile=/etc/fcoe/config
|
||||
ExecStartPre=/sbin/modprobe -qa $SUPPORTED_DRIVERS
|
Reference in New Issue
Block a user