diff --git a/nsd.changes b/nsd.changes index e61b359..47d7c45 100644 --- a/nsd.changes +++ b/nsd.changes @@ -1,3 +1,11 @@ +------------------------------------------------------------------- +Tue Oct 12 20:19:52 UTC 2021 - Michael Ströder + +- reworked nsd.service: + * directly start as User=_nsd + * even more hardening + * removed commented and unused directives + ------------------------------------------------------------------- Tue Oct 12 20:01:24 UTC 2021 - Johannes Segitz diff --git a/nsd.service b/nsd.service index 487aeba..9c92048 100644 --- a/nsd.service +++ b/nsd.service @@ -3,6 +3,13 @@ Description=NSD DNS Server After=syslog.target network.target [Service] +Type=simple +PIDFile=/run/nsd/nsd.pid +ExecStart=/usr/sbin/nsd -d -c /etc/nsd/nsd.conf +ExecStopPost=/bin/rm -f /var/lib/nsd/xfrd.state +User=_nsd +Group=_nsd + # added automatically, for details please see # https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort ProtectSystem=full @@ -15,14 +22,23 @@ ProtectKernelModules=true ProtectKernelLogs=true ProtectControlGroups=true RestrictRealtime=true -# end of automatic additions -Type=simple -PIDFile=/run/nsd/nsd.pid -#EnvironmentFile=-/etc/sysconfig/nsd -#ExecStart=/usr/sbin/nsd -D -c /etc/nsd/nsd.conf $OTHER_NSD_OPTS -ExecStart=/usr/sbin/nsd -d -c /etc/nsd/nsd.conf -ExecStopPost=/bin/rm -f /var/lib/nsd/xfrd.state +# end of automatic additions + +# even more hardening options +CapabilityBoundingSet=CAP_NET_BIND_SERVICE +AmbientCapabilities=CAP_NET_BIND_SERVICE +#RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX +PrivateTmp=yes +NoNewPrivileges=yes +MountFlags=private +LockPersonality=yes +KeyringMode=private +RestrictNamespaces=yes +RestrictSUIDSGID=yes +DevicePolicy=closed +MemoryDenyWriteExecute=yes +SystemCallArchitectures=native +SystemCallFilter=~ @clock @cpu-emulation @debug @keyring @module @mount @raw-io @reboot @swap @obsolete @chown @privileged @resources @pkey @setuid [Install] WantedBy=multi-user.target -