SHA256
1
0
forked from pool/iodine

Accepting request 922368 from network:utilities

OBS-URL: https://build.opensuse.org/request/show/922368
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/iodine?expand=0&rev=10
This commit is contained in:
Dominique Leuenberger 2021-10-04 16:39:07 +00:00 committed by Git OBS Bridge
commit cb8350f00c
3 changed files with 33 additions and 0 deletions

View File

@ -1,3 +1,10 @@
-------------------------------------------------------------------
Wed Sep 22 14:45:53 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service(s) (bsc#1181400). Modified:
* iodine.service
* iodined.service
------------------------------------------------------------------- -------------------------------------------------------------------
Sun Jun 13 13:35:10 UTC 2021 - Callum Farmer <gmbr3@opensuse.org> Sun Jun 13 13:35:10 UTC 2021 - Callum Farmer <gmbr3@opensuse.org>

View File

@ -8,6 +8,19 @@ Description=iodine lets you tunnel IPv4 data through a DNS server
After=network.target syslog.target After=network.target syslog.target
[Service] [Service]
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
Type=simple Type=simple
EnvironmentFile=-/etc/sysconfig/iodine EnvironmentFile=-/etc/sysconfig/iodine
Environment=TERM=linux Environment=TERM=linux

View File

@ -8,6 +8,19 @@ Description=iodined lets you tunnel IPv4 data through a DNS server
After=network.target syslog.target After=network.target syslog.target
[Service] [Service]
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
Type=simple Type=simple
EnvironmentFile=-/etc/sysconfig/iodined EnvironmentFile=-/etc/sysconfig/iodined
Environment=TERM=linux Environment=TERM=linux