diff --git a/iodine.changes b/iodine.changes index f2e8b97..de77d68 100644 --- a/iodine.changes +++ b/iodine.changes @@ -1,3 +1,10 @@ +------------------------------------------------------------------- +Wed Sep 22 14:45:53 UTC 2021 - Johannes Segitz + +- Added hardening to systemd service(s) (bsc#1181400). Modified: + * iodine.service + * iodined.service + ------------------------------------------------------------------- Sun Jun 13 13:35:10 UTC 2021 - Callum Farmer diff --git a/iodine.service b/iodine.service index 3506867..ec03160 100644 --- a/iodine.service +++ b/iodine.service @@ -8,6 +8,19 @@ Description=iodine lets you tunnel IPv4 data through a DNS server After=network.target syslog.target [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +PrivateDevices=true +ProtectHostname=true +ProtectClock=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions Type=simple EnvironmentFile=-/etc/sysconfig/iodine Environment=TERM=linux diff --git a/iodined.service b/iodined.service index c46827a..fbc5da8 100644 --- a/iodined.service +++ b/iodined.service @@ -8,6 +8,19 @@ Description=iodined lets you tunnel IPv4 data through a DNS server After=network.target syslog.target [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +PrivateDevices=true +ProtectHostname=true +ProtectClock=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions Type=simple EnvironmentFile=-/etc/sysconfig/iodined Environment=TERM=linux