Your message dated Mon, 14 Nov 2016 21:18:56 +0000 with message-id <[email protected]> and subject line Bug#816456: fixed in openntpd 1:6.0p1-2 has caused the Debian Bug report #816456, regarding openntpd: Please use systemd sandboxing to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 816456: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816456 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: openntpd Version: 1:5.7p4-2 Severity: wishlist Dear Maintainer, It is possible to use systemd.exec(5) features to confine OpenNTPd. This is helpful in reducing the potential damage caused by a compromise of the daemon, beyond the privilege-dropping that OpenNTPd already performs. Please consider shipping with the openntpd package a systemd unitfile which employs those security features. In particular, it is possible to start the service with reduced capabilities and in a more contrieved namespace: > [Service] > # The service gets its own instance of {/var,}/tmp > PrivateTmp=true > > # Only exposes API pseudo-devices (/dev/null, zero, random, ...) > PrivateDevices=true > > # Makes /usr, /boot and /etc read-only > ProtectSystem=full > > # Prevents access to /home, /root and /run/user > ProtectHome=true > > CapabilityBoundingSet=CAP_SYS_TIME CAP_NET_BIND_SERVICE CAP_SYSLOG > CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_SYS_CHROOT > NoNewPrivileges=true It might be possible to avoid giving the daemon CAP_SYS_CHROOT by starting through systemd-nspawn(1), but I didn't investigate yet. This would prevent someone gaining root in the chroot from escaping. Best regards, nicoo -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (900, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.3.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openntpd depends on: ii adduser 3.113+nmu3 ii init-system-helpers 1.28 ii libc6 2.21-9 ii netbase 5.3 openntpd recommends no packages. openntpd suggests no packages. -- no debconf information
--- End Message ---
--- Begin Message ---Source: openntpd Source-Version: 1:6.0p1-2 We believe that the bug you reported is fixed in the latest version of openntpd, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ulises Vitulli <[email protected]> (supplier of updated openntpd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 11 Nov 2016 18:47:56 -0300 Source: openntpd Binary: openntpd Architecture: source amd64 Version: 1:6.0p1-2 Distribution: unstable Urgency: medium Maintainer: Ulises Vitulli <[email protected]> Changed-By: Ulises Vitulli <[email protected]> Description: openntpd - OpenBSD NTP daemon Closes: 736515 791534 791571 816456 825194 844069 Changes: openntpd (1:6.0p1-2) unstable; urgency=medium . * Properly apply patch for compiling at kFreeBSD-*. * Implement some systemd sandboxing and hardening features (Closes: #816456) Thanks NicolasBraud-Santoni. * Reload openntpd once network changes are triggered even on standalone (Closes: #736515). * Debianize manpages, thanks AntoineBeaupré (Closes: #791571, #825194). * Explicity notice constraint certificate verification turned off, due to missing libtls provided by libreSSL (not yet adopted at Debian) (Closes: #791534, #844069). Checksums-Sha1: 654c38dd7d4424da8f91cc094dfc8d0bccbe3146 1945 openntpd_6.0p1-2.dsc 02d3b359fe3659c50345fb0b199649785a026067 14264 openntpd_6.0p1-2.debian.tar.xz aa30864adfa3efbdfce5ae1b6ee8cb968bbbbcd8 5082 openntpd_6.0p1-2_20161114T210947z-00d7f3d9.buildinfo 1b6b696b24b01f553a01a2212fd421c5d76c1318 62604 openntpd_6.0p1-2_amd64.deb Checksums-Sha256: 924d6478511f9ef0d94a9e649b0510ee12f750f83cc73bd737b990691089c0ea 1945 openntpd_6.0p1-2.dsc e4c686da80f34e66079b712e497cd7cb90265ecfd964ae844371ff8b3a083504 14264 openntpd_6.0p1-2.debian.tar.xz a892350ddee861a34e355107bfe8955ec385789daed28890e376bcf5ae7d281a 5082 openntpd_6.0p1-2_20161114T210947z-00d7f3d9.buildinfo 4a3957e5350f3977e90d3b08fc996e963005e8747379bbba0cf806a56a3e0494 62604 openntpd_6.0p1-2_amd64.deb Files: 59b09a3665c0d81fe150f3920f183460 1945 net optional openntpd_6.0p1-2.dsc f13108f0e7d3b56d2dd44a337ff1945a 14264 net optional openntpd_6.0p1-2.debian.tar.xz 00d7f3d987494910da7b9bb243046cd1 5082 net optional openntpd_6.0p1-2_20161114T210947z-00d7f3d9.buildinfo 5806abc3cdc6da7ac4cbe1519b01c8e6 62604 net optional openntpd_6.0p1-2_amd64.deb -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpse4i5WDBGoRxUA+CwD7bOvi0AIFAlgqKE4ACgkQCwD7bOvi 0AJ0Qw//WRBfTXf0m0UteKb12x9S8oYDfjTmSuYITfrfZqkRG6xspmnYCdJJ1aJ/ xCZFzey8wqtw2U7i4CV5wFXyS/KiQ8+4hrwhmovJ2Pgb3BETwCbRy31mfMG+F7Ev x/t7dB75ylhigUXjn9VsQqIIl0i1jwepZfHvVYlQUVxexO3+Ewpin88/kZcvlf0G asLH4bZxqhZ3BFGXED6Q19vnifGC/Wwbkm1N90pd00UXt6zLI2C3J+q45PUVwfNV /N3+PNJbwPTjikA4RE0iNso7VDJLFzCmpWDtsAG/iJOmNvoRSqfhXz17IJziozkd lDKopmebg8HDG6/QECU5vP0Bcqe90bvJhNCfbyjkA9coRyxB+CUWRT1k+IOuHrt/ 8D1LNof0gcXB3TPAyA0Id/cOwhmEu7Wqoo2taz6NITSObDCyswxDAC0TQBsBRCbZ P888cKOQIk7KMjr9nPd89k7ixF5yIvsZkUFS5JsWaQVMoQ/I4L9wV/U7F4cUW6aE obzSz353JkqJqnT9/xQDpzT1YvQCMyXpmOppWzOL3R5SRcpSfRa1MT0oyjXL1jZY jdv3LcewCIIz7g3QMfOASEQreqxqiLa1vFSXfnDMVxhoNLsO+acO2OuxGUVvTwum zsaisxXqZVBgvG5i21sviiqxepIG+qBB3yXKzVM3hFct/KjSMjw= =DqP4 -----END PGP SIGNATURE-----
--- End Message ---

