From ec93100bb372bf4c1c6e39f7391c8b19b65ac268cc411d3f4928790261776be1 Mon Sep 17 00:00:00 2001 From: Lars Vogdt Date: Thu, 31 Mar 2022 21:50:06 +0000 Subject: [PATCH] Accepting request 925133 from home:jsegitz:branches:systemdhardening:network:utilities Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort OBS-URL: https://build.opensuse.org/request/show/925133 OBS-URL: https://build.opensuse.org/package/show/network:utilities/openslp?expand=0&rev=74 --- openslp.changes | 6 ++++++ slpd.service | 13 +++++++++++++ 2 files changed, 19 insertions(+) diff --git a/openslp.changes b/openslp.changes index 238ea7e..3694af5 100644 --- a/openslp.changes +++ b/openslp.changes @@ -1,3 +1,9 @@ +------------------------------------------------------------------- +Wed Oct 13 11:13:47 UTC 2021 - Johannes Segitz + +- Added hardening to systemd service(s) (bsc#1181400). Modified: + * slpd.service + ------------------------------------------------------------------- Tue Mar 24 17:07:52 CET 2020 - mls@suse.de diff --git a/slpd.service b/slpd.service index 85800a8..40114ed 100644 --- a/slpd.service +++ b/slpd.service @@ -3,6 +3,19 @@ Description=OpenSLP daemon for the Service Location Protocol After=network.target nss-lookup.target [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +PrivateDevices=true +ProtectHostname=true +ProtectClock=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions Type=notify ExecStart=/usr/sbin/slpd -d ExecReload=/bin/kill -HUP $MAINPID