]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
units: enable ProtectHostname=yes 11682/head
authorTopi Miettinen <toiwoton@gmail.com>
Mon, 18 Feb 2019 22:30:12 +0000 (00:30 +0200)
committerTopi Miettinen <toiwoton@gmail.com>
Wed, 20 Feb 2019 08:50:44 +0000 (10:50 +0200)
16 files changed:
units/systemd-coredump@.service.in
units/systemd-hostnamed.service.in
units/systemd-importd.service.in
units/systemd-journal-gatewayd.service.in
units/systemd-journal-remote.service.in
units/systemd-journal-upload.service.in
units/systemd-journald.service.in
units/systemd-localed.service.in
units/systemd-logind.service.in
units/systemd-machined.service.in
units/systemd-networkd.service.in
units/systemd-portabled.service.in
units/systemd-resolved.service.in
units/systemd-timedated.service.in
units/systemd-timesyncd.service.in
units/systemd-udevd.service.in

index ffcb5f36ca6c551ab74c7c7a79161d8dc97fafa4..f6166fa11ce839e3bec8ff7fa61579182acfd67b 100644 (file)
@@ -29,6 +29,7 @@ PrivateNetwork=yes
 PrivateTmp=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 ProtectSystem=strict
index 9c925e80d9fe57bb1acb0bc3c0d2d4a4e0e6ab33..62e9b28f5b702d00d7c2cfc74e8c8b2189042ace 100644 (file)
@@ -25,6 +25,7 @@ PrivateNetwork=yes
 PrivateTmp=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 ProtectSystem=strict
index 20704a82324780d9f41ad9af8b1574caf901a7a5..38b7d7e94b4745f45e94f666fa101d8e3c76b9f9 100644 (file)
@@ -20,6 +20,7 @@ KillMode=mixed
 CapabilityBoundingSet=CAP_CHOWN CAP_FOWNER CAP_FSETID CAP_MKNOD CAP_SETFCAP CAP_SYS_ADMIN CAP_SETPCAP CAP_DAC_OVERRIDE
 NoNewPrivileges=yes
 MemoryDenyWriteExecute=yes
+ProtectHostname=yes
 RestrictRealtime=yes
 RestrictNamespaces=net
 RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
index ebc8bf9a254368b981d7e43391e0c7223657ed2d..0f16ae4ccba1927cb85cb95b0acf7595d5b82d0c 100644 (file)
@@ -22,6 +22,7 @@ PrivateDevices=yes
 PrivateNetwork=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
index 29a99aaec1ae0281d6a0dc4499db93528c26fa25..71727295c3d576bfd6043c97129de3aeacf04dd9 100644 (file)
@@ -23,6 +23,7 @@ PrivateNetwork=yes
 PrivateTmp=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 ProtectSystem=strict
index 92cd4e52592bf1ff4b87fa11b86ba7577fc963e7..10e4d657d3ac319f4c9c0b716f5bfce403dd4281 100644 (file)
@@ -22,6 +22,7 @@ NoNewPrivileges=yes
 PrivateDevices=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
index 4684f095c0778f4d21d376bab2c6c1e36dba9bab..1807d73c68586297776b2053816670ce56f79e45 100644 (file)
@@ -23,6 +23,7 @@ IPAddressDeny=any
 LockPersonality=yes
 MemoryDenyWriteExecute=yes
 NoNewPrivileges=yes
+ProtectHostname=yes
 Restart=always
 RestartSec=0
 RestrictAddressFamilies=AF_UNIX AF_NETLINK
index 01e0703d0e207c7da718feb6dd26f2d21becca24..a64e7e79a8fbbebcca7a7ff5f22c19bcd575af5d 100644 (file)
@@ -25,6 +25,7 @@ PrivateNetwork=yes
 PrivateTmp=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 ProtectSystem=strict
index 38a7f269aca173af5f5c66ceaaaea009a2b2d766..fb6fda49077742d746fb106c194bc88da884a59c 100644 (file)
@@ -28,6 +28,7 @@ IPAddressDeny=any
 LockPersonality=yes
 MemoryDenyWriteExecute=yes
 NoNewPrivileges=yes
+ProtectHostname=yes
 Restart=always
 RestartSec=0
 RestrictAddressFamilies=AF_UNIX AF_NETLINK
index 9f1476814df60d96d47f48b1144b75a38f7b201b..d6deefea083a508ac458623a5443e00fefa4356d 100644 (file)
@@ -23,6 +23,7 @@ IPAddressDeny=any
 LockPersonality=yes
 MemoryDenyWriteExecute=yes
 NoNewPrivileges=yes
+ProtectHostname=yes
 RestrictAddressFamilies=AF_UNIX AF_NETLINK AF_INET AF_INET6
 RestrictRealtime=yes
 SystemCallArchitectures=native
index 472ef045de9e5cce5f421ef27a2ff4643a0be22b..5da0e1e3307e720e6558d22b6b95fe322a702cce 100644 (file)
@@ -27,6 +27,7 @@ MemoryDenyWriteExecute=yes
 NoNewPrivileges=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectSystem=strict
 Restart=on-failure
index a44cdb30a42f673b7327d2d82fd19f47d16ef049..a8eab94d02e524738f58210bf200afee034e6033 100644 (file)
@@ -18,6 +18,7 @@ BusName=org.freedesktop.portable1
 WatchdogSec=3min
 CapabilityBoundingSet=CAP_KILL CAP_SYS_PTRACE CAP_SYS_ADMIN CAP_SETGID CAP_SYS_CHROOT CAP_DAC_READ_SEARCH CAP_DAC_OVERRIDE CAP_CHOWN CAP_FOWNER CAP_FSETID CAP_MKNOD
 MemoryDenyWriteExecute=yes
+ProtectHostname=yes
 RestrictRealtime=yes
 RestrictAddressFamilies=AF_UNIX AF_NETLINK AF_INET AF_INET6
 SystemCallFilter=@system-service @mount
index 3144b70063ee3acc4bd4a1fb704e7824143b1d23..eac3f31012ca8f59b1dfc41f26aaf0bd495f4fb4 100644 (file)
@@ -30,6 +30,7 @@ PrivateDevices=yes
 PrivateTmp=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 ProtectSystem=strict
index 6d5302419579bf5c4e52adf2ffb4c1f2be3898fe..46ee8c894df6ae65251155b47977beab38008454 100644 (file)
@@ -23,6 +23,7 @@ NoNewPrivileges=yes
 PrivateTmp=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 ProtectSystem=strict
index 03ade45d0868e57e74614320b3e1e34df13adf23..5313a90c30b62390b04f4a5c6bdf5eb53ffbe571 100644 (file)
@@ -29,6 +29,7 @@ PrivateDevices=yes
 PrivateTmp=yes
 ProtectControlGroups=yes
 ProtectHome=yes
+ProtectHostname=yes
 ProtectKernelModules=yes
 ProtectKernelTunables=yes
 ProtectSystem=strict
index 6a3814e5d92607a397b88bb55015a6be47bc75ff..fb98ca4d43a2094484e2adafb7cca638fa85ec7c 100644 (file)
@@ -26,6 +26,7 @@ KillMode=mixed
 WatchdogSec=3min
 TasksMax=infinity
 PrivateMounts=yes
+ProtectHostname=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictAddressFamilies=AF_UNIX AF_NETLINK AF_INET AF_INET6