diff --git a/apparmor-usr.sbin.hostapd b/apparmor-usr.sbin.hostapd index 8cdb9b1..a21505a 100644 --- a/apparmor-usr.sbin.hostapd +++ b/apparmor-usr.sbin.hostapd @@ -17,7 +17,7 @@ profile hostapd /usr/sbin/hostapd { # grant read access to config files /etc/hostapd.* r, - + /etc/ssl/openssl.cnf r, /etc/libnl/classid r, @{PROC}/sys/net/ipv*/conf/*/arp_accept w, diff --git a/hostapd.changes b/hostapd.changes index 67ec96f..732769a 100644 --- a/hostapd.changes +++ b/hostapd.changes @@ -1,3 +1,15 @@ +------------------------------------------------------------------- +Fri Nov 26 20:52:19 UTC 2021 - Clemens Famulla-Conrad + +- Fix AppArmor profile -- allow access to /etc/ssl/openssl.cnf + (bsc#1192959) + +------------------------------------------------------------------- +Fri Oct 15 07:29:27 UTC 2021 - Johannes Segitz + +- Added hardening to systemd service(s) (bsc#1181400). Modified: + * hostapd.service + ------------------------------------------------------------------- Wed Jul 14 08:41:42 UTC 2021 - Michael Ströder diff --git a/hostapd.service b/hostapd.service index 02a394e..e3047cb 100644 --- a/hostapd.service +++ b/hostapd.service @@ -3,6 +3,17 @@ Description=Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticato After=network.target [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +ProtectHostname=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions ExecStart=/usr/sbin/hostapd /etc/hostapd.conf ExecReload=/bin/kill -HUP $MAINPID