From 0d61c779c83aaa958f124640b47fae2979ba1874d0b8e28e7bca5097b3e9f25f Mon Sep 17 00:00:00 2001 From: Dominique Leuenberger Date: Sat, 15 Jan 2022 18:59:43 +0000 Subject: [PATCH] https://bugzilla.opensuse.org/show_bug.cgi?id=1194722 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dhcp?expand=0&rev=129 --- dhcp.changes | 9 --------- dhcpd.service | 12 ------------ dhcpd6.service | 12 ------------ dhcrelay.service | 12 ------------ dhcrelay6.service | 12 ------------ 5 files changed, 57 deletions(-) diff --git a/dhcp.changes b/dhcp.changes index 78a29be..2c294bb 100644 --- a/dhcp.changes +++ b/dhcp.changes @@ -6,15 +6,6 @@ Tue Oct 26 11:58:59 UTC 2021 - Reinhard Max removal once we don't have to support SLE-12 anymore. - bsc#1192020: Drop the obsolete dependency on "group(nogroup)". -------------------------------------------------------------------- -Mon Sep 13 13:50:50 UTC 2021 - Johannes Segitz - -- Added hardening to systemd service(s) (bsc#1181400). Modified: - * dhcpd.service - * dhcpd6.service - * dhcrelay.service - * dhcrelay6.service - ------------------------------------------------------------------- Thu Aug 5 11:33:54 UTC 2021 - Reinhard Max diff --git a/dhcpd.service b/dhcpd.service index 40d7365..51d2524 100644 --- a/dhcpd.service +++ b/dhcpd.service @@ -4,18 +4,6 @@ Before=multi-user.target After=remote-fs.target network.target nss-lookup.target time-sync.target slapd.service sssd.service ndsd.service [Service] -# added automatically, for details please see -# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort -ProtectSystem=full -ProtectHome=true -PrivateDevices=true -ProtectClock=true -ProtectKernelTunables=true -ProtectKernelModules=true -ProtectKernelLogs=true -ProtectControlGroups=true -RestrictRealtime=true -# end of automatic additions Type=forking Restart=on-abort ExecStart=@LIBEXECDIR@/dhcp/dhcpd -4 start diff --git a/dhcpd6.service b/dhcpd6.service index af974cd..0b62b29 100644 --- a/dhcpd6.service +++ b/dhcpd6.service @@ -4,18 +4,6 @@ Before=multi-user.target After=remote-fs.target network.target nss-lookup.target time-sync.target slapd.service sssd.service ndsd.service [Service] -# added automatically, for details please see -# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort -ProtectSystem=full -ProtectHome=true -PrivateDevices=true -ProtectClock=true -ProtectKernelTunables=true -ProtectKernelModules=true -ProtectKernelLogs=true -ProtectControlGroups=true -RestrictRealtime=true -# end of automatic additions Type=forking Restart=on-abort ExecStart=@LIBEXECDIR@/dhcp/dhcpd -6 start diff --git a/dhcrelay.service b/dhcrelay.service index ba77767..10fc178 100644 --- a/dhcrelay.service +++ b/dhcrelay.service @@ -4,18 +4,6 @@ Before=multi-user.target After=remote-fs.target network.target nss-lookup.target time-sync.target ldap.service ndsd.service [Service] -# added automatically, for details please see -# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort -ProtectSystem=full -ProtectHome=true -PrivateDevices=true -ProtectClock=true -ProtectKernelTunables=true -ProtectKernelModules=true -ProtectKernelLogs=true -ProtectControlGroups=true -RestrictRealtime=true -# end of automatic additions Type=forking Restart=on-abort ExecStart=@LIBEXECDIR@/dhcp/dhcrelay -4 start diff --git a/dhcrelay6.service b/dhcrelay6.service index f3f5dba..751a21d 100644 --- a/dhcrelay6.service +++ b/dhcrelay6.service @@ -4,18 +4,6 @@ Before=multi-user.target After=remote-fs.target network.target nss-lookup.target time-sync.target ldap.service ndsd.service [Service] -# added automatically, for details please see -# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort -ProtectSystem=full -ProtectHome=true -PrivateDevices=true -ProtectClock=true -ProtectKernelTunables=true -ProtectKernelModules=true -ProtectKernelLogs=true -ProtectControlGroups=true -RestrictRealtime=true -# end of automatic additions Type=forking Restart=on-abort ExecStart=@LIBEXECDIR@/dhcp/dhcrelay -6 start