forked from pool/hostapd
Accepting request 925359 from home:jsegitz:branches:systemdhardening:Base:System
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort OBS-URL: https://build.opensuse.org/request/show/925359 OBS-URL: https://build.opensuse.org/package/show/Base:System/hostapd?expand=0&rev=64
This commit is contained in:
parent
e8127d5c20
commit
299b5fcac4
@ -1,3 +1,9 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Oct 15 07:29:27 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||
|
||||
- Added hardening to systemd service(s) (bsc#1181400). Modified:
|
||||
* hostapd.service
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jul 14 08:41:42 UTC 2021 - Michael Ströder <michael@stroeder.com>
|
||||
|
||||
|
@ -3,6 +3,17 @@ Description=Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticato
|
||||
After=network.target
|
||||
|
||||
[Service]
|
||||
# added automatically, for details please see
|
||||
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
ProtectSystem=full
|
||||
ProtectHome=true
|
||||
ProtectHostname=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectControlGroups=true
|
||||
RestrictRealtime=true
|
||||
# end of automatic additions
|
||||
ExecStart=/usr/sbin/hostapd /etc/hostapd.conf
|
||||
ExecReload=/bin/kill -HUP $MAINPID
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user