diff options
author | Guilhem Moulin <guilhem@fripost.org> | 2018-12-09 18:15:10 +0100 |
---|---|---|
committer | Guilhem Moulin <guilhem@fripost.org> | 2018-12-09 20:25:40 +0100 |
commit | 2147ff3bd9091b88960e2243b2d7d76d03cadc89 (patch) | |
tree | fa970590ab58a1d42913deccbca3adef05eaae83 /roles/common/files/etc/systemd/system/bacula-fd.service | |
parent | 2845af5f76ad3be9c0a1f69ab478ff5a08346a4c (diff) |
systemd.service: Tighten hardening options.
Diffstat (limited to 'roles/common/files/etc/systemd/system/bacula-fd.service')
-rw-r--r-- | roles/common/files/etc/systemd/system/bacula-fd.service | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/roles/common/files/etc/systemd/system/bacula-fd.service b/roles/common/files/etc/systemd/system/bacula-fd.service index 192ea1b..792d964 100644 --- a/roles/common/files/etc/systemd/system/bacula-fd.service +++ b/roles/common/files/etc/systemd/system/bacula-fd.service @@ -1,20 +1,25 @@ [Unit] Description=Bacula File Daemon service After=network.target [Service] Type=simple StandardOutput=syslog ExecStart=/usr/sbin/bacula-fd -f -c /etc/bacula/bacula-fd.conf # Hardening NoNewPrivileges=yes PrivateDevices=yes ProtectHome=read-only ProtectSystem=strict PrivateTmp=yes ReadWriteDirectories=-/var/lib ReadWriteDirectories=-/var/run/bacula +PrivateDevices=yes +ProtectControlGroups=yes +ProtectKernelModules=yes +ProtectKernelTunables=yes +RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 [Install] WantedBy=multi-user.target |