forked from pool/fail2ban
Marcus Meissner
c92a861e40
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort OBS-URL: https://build.opensuse.org/request/show/918942 OBS-URL: https://build.opensuse.org/package/show/security/fail2ban?expand=0&rev=107
24 lines
793 B
Diff
24 lines
793 B
Diff
Index: fail2ban-0.11.2/files/fail2ban.service.in
|
|
===================================================================
|
|
--- fail2ban-0.11.2.orig/files/fail2ban.service.in
|
|
+++ fail2ban-0.11.2/files/fail2ban.service.in
|
|
@@ -5,6 +5,18 @@ After=network.target iptables.service fi
|
|
PartOf=firewalld.service ipset.service nftables.service
|
|
|
|
[Service]
|
|
+# added automatically, for details please see
|
|
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
|
+ProtectSystem=full
|
|
+ProtectHome=true
|
|
+PrivateDevices=true
|
|
+ProtectHostname=true
|
|
+ProtectClock=true
|
|
+ProtectKernelTunables=true
|
|
+ProtectKernelModules=true
|
|
+ProtectControlGroups=true
|
|
+RestrictRealtime=true
|
|
+# end of automatic additions
|
|
Type=simple
|
|
EnvironmentFile=-/etc/sysconfig/fail2ban
|
|
Environment="PYTHONNOUSERSITE=1"
|