/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to mandos.service

  • Committer: Teddy Hogeborn
  • Date: 2016-03-04 22:07:35 UTC
  • Revision ID: teddy@recompile.se-20160304220735-4xeeqt5p4nhw5cuh
Restrict the Mandos server daemon in the systemd service file.

* mandos.service ([Service]/ProtectSystem): Set to "full".
 ([Service]/PrivateTmp, [Service]/PrivateDevices,
  [Service]/ProtectHome): Set to "yes".
 ([Service]/CapabilityBoundingSet): Set to "CAP_SETUID
                                    CAP_DAC_OVERRIDE CAP_NET_RAW".

Show diffs side-by-side

added added

removed removed

Lines of Context:
8
8
## If the server is configured to not use ZeroConf, these two lines
9
9
## become unnecessary and should be removed or commented out.
10
10
After=avahi-daemon.service
11
 
Requisite=avahi-daemon.service
 
11
RequisiteOverridable=avahi-daemon.service
12
12
 
13
13
[Service]
14
14
## If the server's D-Bus interface is disabled, the "BusName" setting
15
15
## should be removed or commented out.
16
16
BusName=se.recompile.Mandos
17
 
EnvironmentFile=/etc/default/mandos
18
 
ExecStart=/usr/sbin/mandos --foreground $DAEMON_ARGS
 
17
ExecStart=/usr/sbin/mandos --foreground
19
18
Restart=always
20
19
KillMode=mixed
21
20
## Using socket activation won't work, because systemd always does
28
27
PrivateDevices=yes
29
28
ProtectSystem=full
30
29
ProtectHome=yes
31
 
CapabilityBoundingSet=CAP_KILL CAP_SETGID CAP_SETUID CAP_DAC_OVERRIDE CAP_NET_RAW
32
 
ProtectKernelTunables=yes
33
 
ProtectControlGroups=yes
 
30
CapabilityBoundingSet=CAP_SETUID CAP_DAC_OVERRIDE CAP_NET_RAW
34
31
 
35
32
[Install]
36
33
WantedBy=multi-user.target