forked from pool/iodine
Accepting request 922368 from network:utilities
OBS-URL: https://build.opensuse.org/request/show/922368 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/iodine?expand=0&rev=10
This commit is contained in:
commit
cb8350f00c
@ -1,3 +1,10 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Sep 22 14:45:53 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||||
|
|
||||||
|
- Added hardening to systemd service(s) (bsc#1181400). Modified:
|
||||||
|
* iodine.service
|
||||||
|
* iodined.service
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sun Jun 13 13:35:10 UTC 2021 - Callum Farmer <gmbr3@opensuse.org>
|
Sun Jun 13 13:35:10 UTC 2021 - Callum Farmer <gmbr3@opensuse.org>
|
||||||
|
|
||||||
|
@ -8,6 +8,19 @@ Description=iodine lets you tunnel IPv4 data through a DNS server
|
|||||||
After=network.target syslog.target
|
After=network.target syslog.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
PrivateDevices=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
Type=simple
|
Type=simple
|
||||||
EnvironmentFile=-/etc/sysconfig/iodine
|
EnvironmentFile=-/etc/sysconfig/iodine
|
||||||
Environment=TERM=linux
|
Environment=TERM=linux
|
||||||
|
@ -8,6 +8,19 @@ Description=iodined lets you tunnel IPv4 data through a DNS server
|
|||||||
After=network.target syslog.target
|
After=network.target syslog.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
PrivateDevices=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
Type=simple
|
Type=simple
|
||||||
EnvironmentFile=-/etc/sysconfig/iodined
|
EnvironmentFile=-/etc/sysconfig/iodined
|
||||||
Environment=TERM=linux
|
Environment=TERM=linux
|
||||||
|
Loading…
Reference in New Issue
Block a user