diff --git a/nsd.changes b/nsd.changes index 75ca63c..adc90a5 100644 --- a/nsd.changes +++ b/nsd.changes @@ -1,3 +1,22 @@ +------------------------------------------------------------------- +Wed Oct 13 12:45:45 UTC 2021 - Michael Ströder + +- set RestrictAddressFamilies= in nsd.service + +------------------------------------------------------------------- +Tue Oct 12 20:19:52 UTC 2021 - Michael Ströder + +- reworked nsd.service: + * directly start as User=_nsd + * even more hardening + * removed commented and unused directives + +------------------------------------------------------------------- +Tue Oct 12 20:01:24 UTC 2021 - Johannes Segitz + +- Added hardening to systemd service(s) (bsc#1181400). Modified: + * nsd.service + ------------------------------------------------------------------- Tue Oct 12 18:24:24 UTC 2021 - Michael Ströder diff --git a/nsd.service b/nsd.service index 21fa34d..b5a8a50 100644 --- a/nsd.service +++ b/nsd.service @@ -5,11 +5,40 @@ After=syslog.target network.target [Service] Type=simple PIDFile=/run/nsd/nsd.pid -#EnvironmentFile=-/etc/sysconfig/nsd -#ExecStart=/usr/sbin/nsd -D -c /etc/nsd/nsd.conf $OTHER_NSD_OPTS ExecStart=/usr/sbin/nsd -d -c /etc/nsd/nsd.conf ExecStopPost=/bin/rm -f /var/lib/nsd/xfrd.state +User=_nsd +Group=_nsd + +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +PrivateDevices=true +ProtectHostname=true +ProtectClock=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions + +# even more hardening options +CapabilityBoundingSet=CAP_NET_BIND_SERVICE +AmbientCapabilities=CAP_NET_BIND_SERVICE +RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX AF_NETLINK +PrivateTmp=yes +NoNewPrivileges=yes +MountFlags=private +LockPersonality=yes +KeyringMode=private +RestrictNamespaces=yes +RestrictSUIDSGID=yes +DevicePolicy=closed +MemoryDenyWriteExecute=yes +SystemCallArchitectures=native +SystemCallFilter=~ @clock @cpu-emulation @debug @keyring @module @mount @raw-io @reboot @swap @obsolete @chown @privileged @resources @pkey @setuid [Install] WantedBy=multi-user.target -