Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package nsd for openSUSE:Factory checked in 
at 2021-10-13 18:06:13
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/nsd (Old)
 and      /work/SRC/openSUSE:Factory/.nsd.new.2443 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "nsd"

Wed Oct 13 18:06:13 2021 rev:24 rq:925093 version:4.3.8

Changes:
--------
--- /work/SRC/openSUSE:Factory/nsd/nsd.changes  2021-10-12 21:51:33.944061752 
+0200
+++ /work/SRC/openSUSE:Factory/.nsd.new.2443/nsd.changes        2021-10-13 
18:10:06.207652379 +0200
@@ -1,0 +2,19 @@
+Wed Oct 13 12:45:45 UTC 2021 - Michael Str??der <mich...@stroeder.com>
+
+- set RestrictAddressFamilies= in nsd.service
+
+-------------------------------------------------------------------
+Tue Oct 12 20:19:52 UTC 2021 - Michael Str??der <mich...@stroeder.com>
+
+- reworked nsd.service:
+  * directly start as User=_nsd
+  * even more hardening
+  * removed commented and unused directives
+
+-------------------------------------------------------------------
+Tue Oct 12 20:01:24 UTC 2021 - Johannes Segitz <jseg...@suse.com>
+
+- Added hardening to systemd service(s) (bsc#1181400). Modified:
+  * nsd.service
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------


++++++ nsd.service ++++++
--- /var/tmp/diff_new_pack.LJLE6D/_old  2021-10-13 18:10:06.907653477 +0200
+++ /var/tmp/diff_new_pack.LJLE6D/_new  2021-10-13 18:10:06.907653477 +0200
@@ -5,11 +5,40 @@
 [Service]
 Type=simple
 PIDFile=/run/nsd/nsd.pid
-#EnvironmentFile=-/etc/sysconfig/nsd
-#ExecStart=/usr/sbin/nsd -D -c /etc/nsd/nsd.conf $OTHER_NSD_OPTS
 ExecStart=/usr/sbin/nsd -d -c /etc/nsd/nsd.conf
 ExecStopPost=/bin/rm -f /var/lib/nsd/xfrd.state
+User=_nsd
+Group=_nsd
+
+# added automatically, for details please see
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
+ProtectSystem=full
+ProtectHome=true
+PrivateDevices=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelTunables=true
+ProtectKernelModules=true
+ProtectKernelLogs=true
+ProtectControlGroups=true
+RestrictRealtime=true
+# end of automatic additions
+
+# even more hardening options
+CapabilityBoundingSet=CAP_NET_BIND_SERVICE
+AmbientCapabilities=CAP_NET_BIND_SERVICE
+RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX AF_NETLINK
+PrivateTmp=yes
+NoNewPrivileges=yes
+MountFlags=private
+LockPersonality=yes
+KeyringMode=private
+RestrictNamespaces=yes
+RestrictSUIDSGID=yes
+DevicePolicy=closed
+MemoryDenyWriteExecute=yes
+SystemCallArchitectures=native
+SystemCallFilter=~ @clock @cpu-emulation @debug @keyring @module @mount 
@raw-io @reboot @swap @obsolete @chown @privileged @resources @pkey @setuid
 
 [Install]
 WantedBy=multi-user.target
-

Reply via email to