aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorkaniini <nenolod@gmail.com>2018-10-25 00:15:29 +0000
committerkaniini <nenolod@gmail.com>2018-10-25 00:15:29 +0000
commit8cc08b94ec7ea5fc1073e52bcc04dbb6f4641665 (patch)
treee47e333682574480d399f3f1cb3ddf833819ac46
parent945ce9910dc7b29147ec49af0bdb82202008c7c4 (diff)
parent043cb7138e3e970d0e50f3f5a9be5efb385bbc92 (diff)
downloadpleroma-8cc08b94ec7ea5fc1073e52bcc04dbb6f4641665.tar.gz
Merge branch 'security/add-security-directives-to-systemd-example' into 'develop'
Add some security directives to the systemd example file See merge request pleroma/pleroma!386
-rw-r--r--installation/pleroma.service10
1 files changed, 10 insertions, 0 deletions
diff --git a/installation/pleroma.service b/installation/pleroma.service
index fd4180985..84747d952 100644
--- a/installation/pleroma.service
+++ b/installation/pleroma.service
@@ -11,5 +11,15 @@ ExecReload=/bin/kill $MAINPID
KillMode=process
Restart=on-failure
+; Some security directives.
+; Use private /tmp and /var/tmp folders inside a new file system namespace, which are discarded after the process stops.
+PrivateTmp=true
+; Mount /usr, /boot, and /etc as read-only for processes invoked by this service.
+ProtectSystem=full
+; Sets up a new /dev mount for the process and only adds API pseudo devices like /dev/null, /dev/zero or /dev/random but not physical devices. Disabled by default because it may not work on devices like the Raspberry Pi.
+PrivateDevices=false
+; Ensures that the service process and all its children can never gain new privileges through execve().
+NoNewPrivileges=true
+
[Install]
WantedBy=multi-user.target