26 lines
868 B
Plaintext
26 lines
868 B
Plaintext
|
[Service]
|
||
|
CapabilityBoundingSet=CAP_NET_BIND_SERVICE CAP_SETGID CAP_SETUID CAP_SYS_CHROOT CAP_SYS_RESOURCE CAP_NET_RAW CAP_DAC_OVERRIDE
|
||
|
MemoryDenyWriteExecute=true
|
||
|
#NoNewPrivileges=true
|
||
|
PrivateDevices=true
|
||
|
PrivateTmp=true
|
||
|
ProtectHome=true
|
||
|
ProtectClock=true
|
||
|
ProtectControlGroups=true
|
||
|
ProtectKernelLogs=true
|
||
|
ProtectKernelModules=true
|
||
|
# This breaks using socket options like 'so-rcvbuf'.
|
||
|
ProtectKernelTunables=true
|
||
|
ProtectProc=invisible
|
||
|
# ProtectSystem with strict does not work - need further testing.
|
||
|
ProtectSystem=full
|
||
|
#RuntimeDirectory=unbound
|
||
|
#ConfigurationDirectory=unbound
|
||
|
#StateDirectory=unbound
|
||
|
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
|
||
|
RestrictRealtime=true
|
||
|
SystemCallArchitectures=native
|
||
|
SystemCallFilter=~@clock @cpu-emulation @debug @keyring @module mount @obsolete @resources
|
||
|
RestrictNamespaces=yes
|
||
|
LockPersonality=yes
|
||
|
RestrictSUIDSGID=yes
|