Skip to content

Use systemd to restrict pcscd rights

See article "Using systemd for more secure services in Fedora" https://lwn.net/Articles/709350/

https://lwn.net/Articles/709764/ " Hmm, yeah, I should probably blog more about all the nice sandboxing features we have now in systemd. There's quite some stuff now we should enable wherever we can. Specifically ProtectSystem=, ProtectHome=, ProtectKernelTunables=, ProtectKernelModules=, ProtectedControlGroups=, PrivateUsers=, PrivateTmp=, PrivateDevices=, PrivateNetwork=, SystemCallFilter=, RestrictAddressFamilies=, RestrictNamespaces=, MemoryDenyWriteExecute=, RestrictRealtime=.

For now, the only docs available for them are the man pages. Not all of them are available on all currently maintained Fedoras, but a good chunk is. "

Copied from https://alioth.debian.org/tracker/index.php?func=detail&aid=315592&group_id=30105&atid=410088

From Debian lintian:

X: pcscd: systemd-service-file-missing-hardening-features usr/lib/systemd/system/pcscd.service
N: 
N:   The specified systemd .service file does not appear to enable any
N:   hardening options.
N:   
N:   systemd has support for many security-oriented features such as isolating
N:   services from the network, private /tmp directories, as well as control
N:   over making directories appear read-only or even inaccessible, etc.
N:   
N:   Please consider supporting some options, collaborating upstream where
N:   necessary about any potential changes.
N: 
N:   Please refer to the systemd.service(5) manual page and
N:   http://0pointer.de/blog/projects/security.html for details.
N: 
N:   Visibility: pedantic
N:   Show-Always: no
N:   Check: systemd
N:   This tag is experimental.
Edited by Ludovic Rousseau