diff options
author | Lennart Poettering <lennart@poettering.net> | 2018-11-12 17:19:48 +0100 |
---|---|---|
committer | Lennart Poettering <lennart@poettering.net> | 2018-11-12 19:02:55 +0100 |
commit | 3ca9940cb95cb263c6bfe5cfee72df232fe46a94 (patch) | |
tree | 1aea17c3bc6b6f4f3abd129e973196d540b98d04 /units/systemd-journal-remote.service.in | |
parent | update TODO (diff) | |
download | systemd-3ca9940cb95cb263c6bfe5cfee72df232fe46a94.tar.xz systemd-3ca9940cb95cb263c6bfe5cfee72df232fe46a94.zip |
units: set NoNewPrivileges= for all long-running services
Previously, setting this option by default was problematic due to
SELinux (as this would also prohibit the transition from PID1's label to
the service's label). However, this restriction has since been lifted,
hence let's start making use of this universally in our services.
On SELinux system this change should be synchronized with a policy
update that ensures that NNP-ful transitions from init_t to service
labels is permitted.
An while we are at it: sort the settings in the unit files this touches.
This might increase the size of the change in this case, but hopefully
should result in stabler patches later on.
Fixes: #1219
Diffstat (limited to 'units/systemd-journal-remote.service.in')
-rw-r--r-- | units/systemd-journal-remote.service.in | 23 |
1 files changed, 12 insertions, 11 deletions
diff --git a/units/systemd-journal-remote.service.in b/units/systemd-journal-remote.service.in index fa8682cd28..29a99aaec1 100644 --- a/units/systemd-journal-remote.service.in +++ b/units/systemd-journal-remote.service.in @@ -14,23 +14,24 @@ Requires=systemd-journal-remote.socket [Service] ExecStart=@rootlibexecdir@/systemd-journal-remote --listen-https=-3 --output=/var/log/journal/remote/ -User=systemd-journal-remote -WatchdogSec=3min -PrivateTmp=yes +LockPersonality=yes +LogsDirectory=journal/remote +MemoryDenyWriteExecute=yes +NoNewPrivileges=yes PrivateDevices=yes PrivateNetwork=yes -ProtectSystem=strict -ProtectHome=yes +PrivateTmp=yes ProtectControlGroups=yes -ProtectKernelTunables=yes +ProtectHome=yes ProtectKernelModules=yes -MemoryDenyWriteExecute=yes -RestrictRealtime=yes -RestrictNamespaces=yes +ProtectKernelTunables=yes +ProtectSystem=strict RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 +RestrictNamespaces=yes +RestrictRealtime=yes SystemCallArchitectures=native -LockPersonality=yes -LogsDirectory=journal/remote +User=systemd-journal-remote +WatchdogSec=3min # If there are many split up journal files we need a lot of fds to access them # all in parallel. |