f7494d7335
* Run as sssd user * Set capabilities * Fix rundir, pid file wasn't created * Rename patches Signed-off-by: Samuel Cabrero <scabrero@suse.de>
37 lines
1.0 KiB
Diff
37 lines
1.0 KiB
Diff
From 7889dbb390091f0be5fea8f915fab68020556de7 Mon Sep 17 00:00:00 2001
|
|
From: Samuel Cabrero <scabrero@suse.de>
|
|
Date: Wed, 16 Oct 2024 14:03:06 +0200
|
|
Subject: [PATCH 2/4] Harden sssd-ifp.service
|
|
|
|
---
|
|
src/sysv/systemd/sssd-ifp.service.in | 13 +++++++++++++
|
|
1 file changed, 13 insertions(+)
|
|
|
|
diff --git a/src/sysv/systemd/sssd-ifp.service.in b/src/sysv/systemd/sssd-ifp.service.in
|
|
index 1ab163392..c8d6dc9ae 100644
|
|
--- a/src/sysv/systemd/sssd-ifp.service.in
|
|
+++ b/src/sysv/systemd/sssd-ifp.service.in
|
|
@@ -5,6 +5,19 @@ After=sssd.service
|
|
BindsTo=sssd.service
|
|
|
|
[Service]
|
|
+# added automatically, for details please see
|
|
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
|
+ProtectSystem=full
|
|
+ProtectHome=true
|
|
+PrivateDevices=true
|
|
+ProtectHostname=true
|
|
+ProtectClock=true
|
|
+ProtectKernelTunables=true
|
|
+ProtectKernelModules=true
|
|
+ProtectKernelLogs=true
|
|
+ProtectControlGroups=true
|
|
+RestrictRealtime=true
|
|
+# end of automatic additions
|
|
Environment=DEBUG_LOGGER=--logger=files
|
|
EnvironmentFile=-@environment_file@
|
|
Type=dbus
|
|
--
|
|
2.46.1
|
|
|