2015-03-12 13:11:53 -04:00
|
|
|
# tor.service -- this systemd configuration file for Tor sets up a
|
|
|
|
# relatively conservative, hardened Tor service. You may need to
|
|
|
|
# edit it if you are making changes to your Tor configuration that it
|
|
|
|
# does not allow. Package maintainers: this should be a starting point
|
|
|
|
# for your tor.service; it is not the last point.
|
|
|
|
|
2014-04-21 14:47:44 +01:00
|
|
|
[Unit]
|
|
|
|
Description = Anonymizing overlay network for TCP
|
|
|
|
After = syslog.target network.target nss-lookup.target
|
|
|
|
|
2015-03-17 10:54:38 -04:00
|
|
|
[Service] Type = notify NotifyAccess = all ExecStartPre = @BINDIR@/tor
|
|
|
|
-f @CONFDIR@/torrc --verify-config ExecStart = @BINDIR@/tor -f
|
|
|
|
@CONFDIR@/torrc ExecReload = /bin/kill -HUP ${MAINPID} KillSignal =
|
|
|
|
SIGINT TimeoutSec = 30 Restart = on-failure WatchdogSec = 1m
|
2014-04-21 14:47:44 +01:00
|
|
|
LimitNOFILE = 32768
|
|
|
|
|
|
|
|
# Hardening
|
|
|
|
PrivateTmp = yes
|
2014-11-28 12:36:17 -05:00
|
|
|
PrivateDevices = yes
|
2014-11-28 12:36:56 -05:00
|
|
|
ProtectHome = yes
|
2014-11-28 12:41:23 -05:00
|
|
|
ProtectSystem = full
|
2014-08-27 03:05:12 +00:00
|
|
|
ReadOnlyDirectories = /
|
2014-11-28 12:38:40 -05:00
|
|
|
ReadWriteDirectories = -@LOCALSTATEDIR@/lib/tor
|
|
|
|
ReadWriteDirectories = -@LOCALSTATEDIR@/log/tor
|
2014-08-27 03:18:26 +00:00
|
|
|
NoNewPrivileges = yes
|
2015-01-11 11:26:08 -05:00
|
|
|
CapabilityBoundingSet = CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE
|
2014-04-21 14:47:44 +01:00
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy = multi-user.target
|