diff options
author | Guilhem Moulin <guilhem@fripost.org> | 2018-12-09 18:15:10 +0100 |
---|---|---|
committer | Guilhem Moulin <guilhem@fripost.org> | 2018-12-09 20:25:40 +0100 |
commit | 2147ff3bd9091b88960e2243b2d7d76d03cadc89 (patch) | |
tree | fa970590ab58a1d42913deccbca3adef05eaae83 /roles/common/files/etc/systemd | |
parent | 2845af5f76ad3be9c0a1f69ab478ff5a08346a4c (diff) |
systemd.service: Tighten hardening options.
Diffstat (limited to 'roles/common/files/etc/systemd')
-rw-r--r-- | roles/common/files/etc/systemd/system/bacula-fd.service | 5 | ||||
-rw-r--r-- | roles/common/files/etc/systemd/system/stunnel4@.service | 5 |
2 files changed, 10 insertions, 0 deletions
diff --git a/roles/common/files/etc/systemd/system/bacula-fd.service b/roles/common/files/etc/systemd/system/bacula-fd.service index 192ea1b..792d964 100644 --- a/roles/common/files/etc/systemd/system/bacula-fd.service +++ b/roles/common/files/etc/systemd/system/bacula-fd.service @@ -15,6 +15,11 @@ ProtectSystem=strict PrivateTmp=yes ReadWriteDirectories=-/var/lib ReadWriteDirectories=-/var/run/bacula +PrivateDevices=yes +ProtectControlGroups=yes +ProtectKernelModules=yes +ProtectKernelTunables=yes +RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 [Install] WantedBy=multi-user.target diff --git a/roles/common/files/etc/systemd/system/stunnel4@.service b/roles/common/files/etc/systemd/system/stunnel4@.service index d634e50..1a30599 100644 --- a/roles/common/files/etc/systemd/system/stunnel4@.service +++ b/roles/common/files/etc/systemd/system/stunnel4@.service @@ -17,6 +17,11 @@ NoNewPrivileges=yes PrivateDevices=yes ProtectHome=yes ProtectSystem=strict +PrivateDevices=yes +ProtectControlGroups=yes +ProtectKernelModules=yes +ProtectKernelTunables=yes +RestrictAddressFamilies=AF_INET AF_INET6 [Install] WantedBy=multi-user.target |