mirror of
https://gitlab.com/mobian1/eg25-manager.git
synced 2025-08-30 15:52:11 +02:00
d/service: Use systemd to sandbox eg25-manager
With eg25-manager directly interfacing with the untrusted modem and potentially (MR !15) including libcurl for HTTP, sandboxing the daemon significantly reduces the any post-exploit attack surface.
This commit is contained in:
17
debian/eg25-manager.service
vendored
17
debian/eg25-manager.service
vendored
@@ -6,6 +6,23 @@ Before=ModemManager.service
|
|||||||
Type=simple
|
Type=simple
|
||||||
ExecStart=/usr/bin/eg25manager
|
ExecStart=/usr/bin/eg25manager
|
||||||
Restart=on-failure
|
Restart=on-failure
|
||||||
|
ProtectControlGroups=true
|
||||||
|
ProtectHome=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectSystem=strict
|
||||||
|
RestrictSUIDSGID=true
|
||||||
|
PrivateTmp=true
|
||||||
|
ProtectedKernelModules=true
|
||||||
|
MemoryDenyWriteExecute=true
|
||||||
|
PrivateMounts=true
|
||||||
|
NoNewPrivileges=true
|
||||||
|
CapabilityBoundingSet=
|
||||||
|
ProtectProc=true
|
||||||
|
ProtectDevices=true
|
||||||
|
DeviceAllow=/dev/ttyS2
|
||||||
|
LockPersonality=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelLog=true
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
|
Reference in New Issue
Block a user