forked from pool/argus
Accepting request 912408 from security
OBS-URL: https://build.opensuse.org/request/show/912408 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/argus?expand=0&rev=29
This commit is contained in:
commit
718bf9bdd6
@ -1,3 +1,11 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Aug 10 11:50:18 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||||
|
|
||||||
|
- Added hardening to systemd service(s). Added patch(es):
|
||||||
|
* harden_argus.service.patch
|
||||||
|
Modified:
|
||||||
|
* argus.service
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Thu Jun 3 16:02:21 UTC 2021 - Ferdinand Thiessen <rpm@fthiessen.de>
|
Thu Jun 3 16:02:21 UTC 2021 - Ferdinand Thiessen <rpm@fthiessen.de>
|
||||||
|
|
||||||
|
@ -3,6 +3,19 @@ Description=Argus generates network transaction audit records
|
|||||||
After=syslog.target network.target
|
After=syslog.target network.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
PrivateDevices=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
PIDFile=/var/run/argus.pid
|
PIDFile=/var/run/argus.pid
|
||||||
ExecStart=/usr/sbin/argus -d
|
ExecStart=/usr/sbin/argus -d
|
||||||
|
|
||||||
|
@ -28,6 +28,7 @@ Source3: README.SUSE
|
|||||||
Source4: argus_linux.8.gz
|
Source4: argus_linux.8.gz
|
||||||
Source5: argus.service
|
Source5: argus.service
|
||||||
Patch1: %{name}-3.0.6.1-libpcap.patch
|
Patch1: %{name}-3.0.6.1-libpcap.patch
|
||||||
|
Patch2: harden_argus.service.patch
|
||||||
BuildRequires: bison
|
BuildRequires: bison
|
||||||
BuildRequires: flex
|
BuildRequires: flex
|
||||||
BuildRequires: libnsl-devel
|
BuildRequires: libnsl-devel
|
||||||
@ -56,6 +57,7 @@ Daemon for Argus network monitoring tool.
|
|||||||
%patch1 -p1
|
%patch1 -p1
|
||||||
cp %{SOURCE3} .
|
cp %{SOURCE3} .
|
||||||
cp %{SOURCE4} man/man8/
|
cp %{SOURCE4} man/man8/
|
||||||
|
%patch2 -p1
|
||||||
|
|
||||||
%build
|
%build
|
||||||
#autoreconf -fiv
|
#autoreconf -fiv
|
||||||
|
24
harden_argus.service.patch
Normal file
24
harden_argus.service.patch
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
Index: argus-3.0.8.3/support/Startup/argus.service
|
||||||
|
===================================================================
|
||||||
|
--- argus-3.0.8.3.orig/support/Startup/argus.service
|
||||||
|
+++ argus-3.0.8.3/support/Startup/argus.service
|
||||||
|
@@ -12,6 +12,19 @@ After=network.target
|
||||||
|
# This was tested on Fedora 16
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
+# added automatically, for details please see
|
||||||
|
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
+ProtectSystem=full
|
||||||
|
+ProtectHome=true
|
||||||
|
+PrivateDevices=true
|
||||||
|
+ProtectHostname=true
|
||||||
|
+ProtectClock=true
|
||||||
|
+ProtectKernelTunables=true
|
||||||
|
+ProtectKernelModules=true
|
||||||
|
+ProtectKernelLogs=true
|
||||||
|
+ProtectControlGroups=true
|
||||||
|
+RestrictRealtime=true
|
||||||
|
+# end of automatic additions
|
||||||
|
ExecStartPre=/sbin/ifconfig em2 up
|
||||||
|
ExecStart=/usr/local/sbin/argus
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user