nixos/ndppd: enable systemd sandboxing
This commit is contained in:
parent
8305186bb4
commit
d9319e8e87
|
@ -161,7 +161,25 @@ in {
|
||||||
documentation = [ "man:ndppd(1)" "man:ndppd.conf(5)" ];
|
documentation = [ "man:ndppd(1)" "man:ndppd.conf(5)" ];
|
||||||
after = [ "network-pre.target" ];
|
after = [ "network-pre.target" ];
|
||||||
wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
serviceConfig.ExecStart = "${pkgs.ndppd}/bin/ndppd -c ${ndppdConf}";
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.ndppd}/bin/ndppd -c ${ndppdConf}";
|
||||||
|
|
||||||
|
# Sandboxing
|
||||||
|
CapabilityBoundingSet = "CAP_NET_RAW CAP_NET_ADMIN";
|
||||||
|
ProtectSystem = "strict";
|
||||||
|
ProtectHome = true;
|
||||||
|
PrivateTmp = true;
|
||||||
|
PrivateDevices = true;
|
||||||
|
ProtectKernelTunables = true;
|
||||||
|
ProtectKernelModules = true;
|
||||||
|
ProtectControlGroups = true;
|
||||||
|
RestrictAddressFamilies = "AF_INET6 AF_PACKET AF_NETLINK";
|
||||||
|
RestrictNamespaces = true;
|
||||||
|
LockPersonality = true;
|
||||||
|
MemoryDenyWriteExecute = true;
|
||||||
|
RestrictRealtime = true;
|
||||||
|
RestrictSUIDSGID = true;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue