common/dbus: temporarily undo hardening, system broke :(
This commit is contained in:
@@ -9,62 +9,62 @@
|
||||
};
|
||||
|
||||
systemd.services.dbus-broker.serviceConfig = {
|
||||
LockPersonality = "yes";
|
||||
MemoryDenyWriteExecute = "yes";
|
||||
NoNewPrivileges = "yes";
|
||||
PrivateDevices = "yes";
|
||||
ProtectClock = "yes";
|
||||
ProtectControlGroups = "yes";
|
||||
ProtectHome = "yes";
|
||||
ProtectHostname = "yes";
|
||||
ProtectKernelLogs = "yes";
|
||||
ProtectKernelModules = "yes";
|
||||
ProtectKernelTunables = "yes";
|
||||
RestrictNamespaces = "yes";
|
||||
RestrictRealtime = "yes";
|
||||
RestrictSUIDSGID = "yes";
|
||||
SystemCallArchitectures = "native";
|
||||
UMask = "077";
|
||||
RestrictAddressFamilies = [
|
||||
"AF_UNIX"
|
||||
"AF_NETLINK"
|
||||
];
|
||||
SystemCallFilter = [
|
||||
"@system-service"
|
||||
"~@mount"
|
||||
"~@resources"
|
||||
];
|
||||
AmbientCapabilities = "CAP_AUDIT_WRITE";
|
||||
CapabilityBoundingSet = "CAP_AUDIT_WRITE";
|
||||
# LockPersonality = "yes";
|
||||
# MemoryDenyWriteExecute = "yes";
|
||||
# NoNewPrivileges = "yes";
|
||||
# PrivateDevices = "yes";
|
||||
# ProtectClock = "yes";
|
||||
# ProtectControlGroups = "yes";
|
||||
# ProtectHome = "yes";
|
||||
# ProtectHostname = "yes";
|
||||
# ProtectKernelLogs = "yes";
|
||||
# ProtectKernelModules = "yes";
|
||||
# ProtectKernelTunables = "yes";
|
||||
# RestrictNamespaces = "yes";
|
||||
# RestrictRealtime = "yes";
|
||||
# RestrictSUIDSGID = "yes";
|
||||
# SystemCallArchitectures = "native";
|
||||
# UMask = "077";
|
||||
# RestrictAddressFamilies = [
|
||||
# "AF_UNIX"
|
||||
# "AF_NETLINK"
|
||||
# ];
|
||||
# SystemCallFilter = [
|
||||
# "@system-service"
|
||||
# "~@mount"
|
||||
# "~@resources"
|
||||
# ];
|
||||
# AmbientCapabilities = "CAP_AUDIT_WRITE";
|
||||
# CapabilityBoundingSet = "CAP_AUDIT_WRITE";
|
||||
};
|
||||
|
||||
systemd.user.services.dbus-broker.serviceConfig = {
|
||||
LockPersonality = "yes";
|
||||
MemoryDenyWriteExecute = "yes";
|
||||
NoNewPrivileges = "yes";
|
||||
PrivateDevices = "yes";
|
||||
ProtectClock = "yes";
|
||||
ProtectControlGroups = "yes";
|
||||
ProtectHome = "yes";
|
||||
ProtectHostname = "yes";
|
||||
ProtectKernelLogs = "yes";
|
||||
ProtectKernelModules = "yes";
|
||||
ProtectKernelTunables = "yes";
|
||||
RestrictNamespaces = "yes";
|
||||
RestrictRealtime = "yes";
|
||||
RestrictSUIDSGID = "yes";
|
||||
SystemCallArchitectures = "native";
|
||||
UMask = "077";
|
||||
RestrictAddressFamilies = [
|
||||
"AF_UNIX"
|
||||
"AF_NETLINK"
|
||||
];
|
||||
SystemCallFilter = [
|
||||
"@system-service"
|
||||
"~@resources"
|
||||
"~@privileged"
|
||||
];
|
||||
AmbientCapabilities = "";
|
||||
CapabilityBoundingSet = "";
|
||||
# LockPersonality = "yes";
|
||||
# MemoryDenyWriteExecute = "yes";
|
||||
# NoNewPrivileges = "yes";
|
||||
# PrivateDevices = "yes";
|
||||
# ProtectClock = "yes";
|
||||
# ProtectControlGroups = "yes";
|
||||
# ProtectHome = "yes";
|
||||
# ProtectHostname = "yes";
|
||||
# ProtectKernelLogs = "yes";
|
||||
# ProtectKernelModules = "yes";
|
||||
# ProtectKernelTunables = "yes";
|
||||
# RestrictNamespaces = "yes";
|
||||
# RestrictRealtime = "yes";
|
||||
# RestrictSUIDSGID = "yes";
|
||||
# SystemCallArchitectures = "native";
|
||||
# UMask = "077";
|
||||
# RestrictAddressFamilies = [
|
||||
# "AF_UNIX"
|
||||
# "AF_NETLINK"
|
||||
# ];
|
||||
# SystemCallFilter = [
|
||||
# "@system-service"
|
||||
# "~@resources"
|
||||
# "~@privileged"
|
||||
# ];
|
||||
# AmbientCapabilities = "";
|
||||
# CapabilityBoundingSet = "";
|
||||
};
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user