f7494d7335
* Run as sssd user * Set capabilities * Fix rundir, pid file wasn't created * Rename patches Signed-off-by: Samuel Cabrero <scabrero@suse.de>
37 lines
1.1 KiB
Diff
37 lines
1.1 KiB
Diff
From 1fea2a4039f9e838554abe17bbf1513a8f99f348 Mon Sep 17 00:00:00 2001
|
|
From: Samuel Cabrero <scabrero@suse.de>
|
|
Date: Wed, 16 Oct 2024 14:05:02 +0200
|
|
Subject: [PATCH 3/4] Harden sssd-kcm.service
|
|
|
|
---
|
|
src/sysv/systemd/sssd-kcm.service.in | 13 +++++++++++++
|
|
1 file changed, 13 insertions(+)
|
|
|
|
diff --git a/src/sysv/systemd/sssd-kcm.service.in b/src/sysv/systemd/sssd-kcm.service.in
|
|
index 0c839ec5c..b403cd709 100644
|
|
--- a/src/sysv/systemd/sssd-kcm.service.in
|
|
+++ b/src/sysv/systemd/sssd-kcm.service.in
|
|
@@ -8,6 +8,19 @@ After=sssd-kcm.socket
|
|
Also=sssd-kcm.socket
|
|
|
|
[Service]
|
|
+# added automatically, for details please see
|
|
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
|
+ProtectSystem=full
|
|
+ProtectHome=true
|
|
+PrivateDevices=true
|
|
+ProtectHostname=true
|
|
+ProtectClock=true
|
|
+ProtectKernelTunables=true
|
|
+ProtectKernelModules=true
|
|
+ProtectKernelLogs=true
|
|
+ProtectControlGroups=true
|
|
+RestrictRealtime=true
|
|
+# end of automatic additions
|
|
Environment=DEBUG_LOGGER=--logger=files
|
|
ExecStartPre=+-/bin/chown -f @SSSD_USER@:@SSSD_USER@ @sssdconfdir@
|
|
ExecStartPre=+-/bin/chown -f @SSSD_USER@:@SSSD_USER@ @sssdconfdir@/sssd.conf
|
|
--
|
|
2.46.1
|
|
|