Add RestrictNamespaces=yes
This commit is contained in:
		
							parent
							
								
									fe29c72b12
								
							
						
					
					
						commit
						1ac3a1c1f7
					
				@ -16,14 +16,16 @@ ExecStart=__FINALPATH__/script >> /var/log/__APP__/__APP__.log 2>&1
 | 
				
			|||||||
NoNewPrivileges=yes
 | 
					NoNewPrivileges=yes
 | 
				
			||||||
PrivateTmp=yes
 | 
					PrivateTmp=yes
 | 
				
			||||||
PrivateDevices=yes
 | 
					PrivateDevices=yes
 | 
				
			||||||
 | 
					RestrictNamespaces=yes
 | 
				
			||||||
 | 
					RestrictRealtime=yes
 | 
				
			||||||
DevicePolicy=closed
 | 
					DevicePolicy=closed
 | 
				
			||||||
ProtectSystem=full
 | 
					ProtectSystem=full
 | 
				
			||||||
ProtectControlGroups=yes
 | 
					ProtectControlGroups=yes
 | 
				
			||||||
ProtectKernelModules=yes
 | 
					ProtectKernelModules=yes
 | 
				
			||||||
ProtectKernelTunables=yes
 | 
					ProtectKernelTunables=yes
 | 
				
			||||||
RestrictRealtime=yes
 | 
					 | 
				
			||||||
LockPersonality=yes
 | 
					LockPersonality=yes
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Denying access to capabilities that should not be relevant for webapps
 | 
					# Denying access to capabilities that should not be relevant for webapps
 | 
				
			||||||
# Doc: https://man7.org/linux/man-pages/man7/capabilities.7.html
 | 
					# Doc: https://man7.org/linux/man-pages/man7/capabilities.7.html
 | 
				
			||||||
CapabilityBoundingSet=~CAP_RAWIO CAP_MKNOD
 | 
					CapabilityBoundingSet=~CAP_RAWIO CAP_MKNOD
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
		Reference in New Issue
	
	Block a user