|
|
36e8a3 |
From e143339ac712f745727951973417ce93b5d06d78 Mon Sep 17 00:00:00 2001
|
|
|
36e8a3 |
From: Michal Sekletar <msekleta@redhat.com>
|
|
|
36e8a3 |
Date: Fri, 12 Oct 2018 14:50:09 +0000
|
|
|
36e8a3 |
Subject: [PATCH] units: don't enable per-service IP firewall by default
|
|
|
36e8a3 |
|
|
|
36e8a3 |
Resolves: #1630219
|
|
|
36e8a3 |
---
|
|
|
36e8a3 |
units/systemd-coredump@.service.in | 1 -
|
|
|
36e8a3 |
units/systemd-hostnamed.service.in | 1 -
|
|
|
36e8a3 |
units/systemd-journald.service.in | 1 -
|
|
|
36e8a3 |
units/systemd-localed.service.in | 1 -
|
|
|
36e8a3 |
units/systemd-logind.service.in | 1 -
|
|
|
36e8a3 |
units/systemd-machined.service.in | 1 -
|
|
|
36e8a3 |
units/systemd-portabled.service.in | 1 -
|
|
|
36e8a3 |
units/systemd-timedated.service.in | 1 -
|
|
|
36e8a3 |
units/systemd-udevd.service.in | 1 -
|
|
|
36e8a3 |
9 files changed, 9 deletions(-)
|
|
|
36e8a3 |
|
|
|
36e8a3 |
diff --git a/units/systemd-coredump@.service.in b/units/systemd-coredump@.service.in
|
|
|
4bff0a |
index 215696ecd1..68a68a5055 100644
|
|
|
36e8a3 |
--- a/units/systemd-coredump@.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-coredump@.service.in
|
|
|
36e8a3 |
@@ -37,5 +37,4 @@ SystemCallFilter=@system-service
|
|
|
36e8a3 |
SystemCallErrorNumber=EPERM
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|
|
|
36e8a3 |
StateDirectory=systemd/coredump
|
|
|
36e8a3 |
diff --git a/units/systemd-hostnamed.service.in b/units/systemd-hostnamed.service.in
|
|
|
4bff0a |
index da74b4fe8b..4e5470dd29 100644
|
|
|
36e8a3 |
--- a/units/systemd-hostnamed.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-hostnamed.service.in
|
|
|
36e8a3 |
@@ -33,5 +33,4 @@ SystemCallFilter=@system-service sethostname
|
|
|
36e8a3 |
SystemCallErrorNumber=EPERM
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|
|
|
36e8a3 |
ReadWritePaths=/etc
|
|
|
36e8a3 |
diff --git a/units/systemd-journald.service.in b/units/systemd-journald.service.in
|
|
|
4bff0a |
index 8f5021d0de..2d5fd0120d 100644
|
|
|
36e8a3 |
--- a/units/systemd-journald.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-journald.service.in
|
|
|
36e8a3 |
@@ -33,7 +33,6 @@ SystemCallFilter=@system-service
|
|
|
36e8a3 |
SystemCallErrorNumber=EPERM
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|
|
|
36e8a3 |
|
|
|
36e8a3 |
# Increase the default a bit in order to allow many simultaneous
|
|
|
36e8a3 |
# services being run since we keep one fd open per service. Also, when
|
|
|
36e8a3 |
diff --git a/units/systemd-localed.service.in b/units/systemd-localed.service.in
|
|
|
4bff0a |
index a24e61a0cd..ce043db154 100644
|
|
|
36e8a3 |
--- a/units/systemd-localed.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-localed.service.in
|
|
|
36e8a3 |
@@ -33,5 +33,4 @@ SystemCallFilter=@system-service
|
|
|
36e8a3 |
SystemCallErrorNumber=EPERM
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|
|
|
36e8a3 |
ReadWritePaths=/etc
|
|
|
36e8a3 |
diff --git a/units/systemd-logind.service.in b/units/systemd-logind.service.in
|
|
|
4bff0a |
index 5e090bcf23..6953fac55b 100644
|
|
|
36e8a3 |
--- a/units/systemd-logind.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-logind.service.in
|
|
|
36e8a3 |
@@ -34,7 +34,6 @@ SystemCallFilter=@system-service
|
|
|
36e8a3 |
SystemCallErrorNumber=EPERM
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|
|
|
36e8a3 |
FileDescriptorStoreMax=512
|
|
|
36e8a3 |
|
|
|
36e8a3 |
# Increase the default a bit in order to allow many simultaneous
|
|
|
36e8a3 |
diff --git a/units/systemd-machined.service.in b/units/systemd-machined.service.in
|
|
|
4bff0a |
index 1200a90a61..dec2c4b0dc 100644
|
|
|
36e8a3 |
--- a/units/systemd-machined.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-machined.service.in
|
|
|
36e8a3 |
@@ -27,7 +27,6 @@ SystemCallFilter=@system-service @mount
|
|
|
36e8a3 |
SystemCallErrorNumber=EPERM
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|
|
|
36e8a3 |
|
|
|
36e8a3 |
# Note that machined cannot be placed in a mount namespace, since it
|
|
|
36e8a3 |
# needs access to the host's mount namespace in order to implement the
|
|
|
36e8a3 |
diff --git a/units/systemd-portabled.service.in b/units/systemd-portabled.service.in
|
|
|
4bff0a |
index a868f61dba..64f14071e8 100644
|
|
|
36e8a3 |
--- a/units/systemd-portabled.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-portabled.service.in
|
|
|
36e8a3 |
@@ -23,4 +23,3 @@ RestrictAddressFamilies=AF_UNIX AF_NETLINK AF_INET AF_INET6
|
|
|
36e8a3 |
SystemCallFilter=~@clock @cpu-emulation @debug @keyring @module @obsolete @raw-io @reboot @swap
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|
|
|
36e8a3 |
diff --git a/units/systemd-timedated.service.in b/units/systemd-timedated.service.in
|
|
|
4bff0a |
index 906bb4326c..662b39557a 100644
|
|
|
36e8a3 |
--- a/units/systemd-timedated.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-timedated.service.in
|
|
|
36e8a3 |
@@ -31,5 +31,4 @@ SystemCallFilter=@system-service @clock
|
|
|
36e8a3 |
SystemCallErrorNumber=EPERM
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|
|
|
36e8a3 |
ReadWritePaths=/etc
|
|
|
36e8a3 |
diff --git a/units/systemd-udevd.service.in b/units/systemd-udevd.service.in
|
|
|
4bff0a |
index 6a3814e5d9..fd9ead3bb8 100644
|
|
|
36e8a3 |
--- a/units/systemd-udevd.service.in
|
|
|
36e8a3 |
+++ b/units/systemd-udevd.service.in
|
|
|
36e8a3 |
@@ -33,4 +33,3 @@ SystemCallFilter=@system-service @module @raw-io
|
|
|
36e8a3 |
SystemCallErrorNumber=EPERM
|
|
|
36e8a3 |
SystemCallArchitectures=native
|
|
|
36e8a3 |
LockPersonality=yes
|
|
|
36e8a3 |
-IPAddressDeny=any
|