Overview

Request 925374 accepted

Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

Loading...


Marius Tomaschewski's avatar

JFYI, a little test with changes applied: xanthos-07:~ # grep -Ev "^#|^$" /etc/netlabel.rules cipsov4 add doi:9999 local map del default map add default address:0.0.0.0/0 protocol:unlbl map add default address:::0/0 protocol:unlbl map add default address:127.0.0.1 protocol:cipsov4,9999 xanthos-07:~ # grep -E "^Protect|^Restrict" /usr/lib/systemd/system/netlabel.service ProtectSystem=full ProtectHome=true ProtectHostname=true ProtectKernelTunables=true ProtectKernelModules=true ProtectKernelLogs=true ProtectControlGroups=true RestrictRealtime=true xanthos-07:~ # systemctl start netlabel.service xanthos-07:~ # netlabelctl cipsov4 list 9999,LOCAL xanthos-07:~ # systemctl stop netlabel.service xanthos-07:~ # netlabelctl cipsov4 list xanthos-07:~ #

Request History
Johannes Segitz's avatar

jsegitz created request

Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort


Marius Tomaschewski's avatar

mtomaschewski accepted request

OK, the service seems to be able to load + reset the netlabel rule to/in the kernel even ProtectKernelTunables is set.

openSUSE Build Service is sponsored by