Accepting request 933461 from home:jsegitz:branches:systemdhardening:Base:System
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort OBS-URL: https://build.opensuse.org/request/show/933461 OBS-URL: https://build.opensuse.org/package/show/Base:System/syslogd?expand=0&rev=151
This commit is contained in:
parent
12e2de0c92
commit
5c7a2ac7f8
13
klog.service
13
klog.service
@ -25,6 +25,19 @@ RefuseManualStart=true
|
||||
ConditionPathIsDirectory=/var/log
|
||||
|
||||
[Service]
|
||||
# added automatically, for details please see
|
||||
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
ProtectSystem=full
|
||||
ProtectHome=true
|
||||
PrivateDevices=true
|
||||
ProtectHostname=true
|
||||
ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectControlGroups=true
|
||||
RestrictRealtime=true
|
||||
# end of automatic additions
|
||||
Type=oneshot
|
||||
StandardError=tty
|
||||
StandardOutput=tty
|
||||
|
@ -26,6 +26,19 @@ After=syslogd.service
|
||||
RefuseManualStart=true
|
||||
|
||||
[Service]
|
||||
# added automatically, for details please see
|
||||
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
ProtectSystem=full
|
||||
ProtectHome=true
|
||||
PrivateDevices=true
|
||||
ProtectHostname=true
|
||||
ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectControlGroups=true
|
||||
RestrictRealtime=true
|
||||
# end of automatic additions
|
||||
Type=simple
|
||||
StandardOutput=syslog
|
||||
StandardError=syslog
|
||||
|
@ -1,3 +1,11 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Nov 24 10:22:12 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||
|
||||
- Added hardening to systemd service(s) (bsc#1181400). Modified:
|
||||
* klog.service
|
||||
* klogd.service
|
||||
* syslogd.service
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 24 17:03:30 UTC 2020 - Ludwig Nussel <lnussel@suse.de>
|
||||
|
||||
|
@ -24,6 +24,19 @@ Requires=klogd.service
|
||||
Before=klogd.service
|
||||
|
||||
[Service]
|
||||
# added automatically, for details please see
|
||||
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
ProtectSystem=full
|
||||
ProtectHome=true
|
||||
PrivateDevices=true
|
||||
ProtectHostname=true
|
||||
ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectControlGroups=true
|
||||
RestrictRealtime=true
|
||||
# end of automatic additions
|
||||
Type=notify
|
||||
Sockets=syslog.socket
|
||||
StandardOutput=null
|
||||
|
Loading…
x
Reference in New Issue
Block a user