 b0ccd6dd16
			
		
	
	
		b0ccd6dd16
		
			
		
	
	
	
	
		
			
			This reverts commit ea6e8775bd69e4676c623a85c39f1da540d29ad1. The new format is not an improvement.
		
			
				
	
	
		
			29 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			XML
		
	
	
	
	
	
			
		
		
	
	
			29 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			XML
		
	
	
	
	
	
| <chapter xmlns="http://docbook.org/ns/docbook"
 | |
|          xmlns:xlink="http://www.w3.org/1999/xlink"
 | |
|          xmlns:xi="http://www.w3.org/2001/XInclude"
 | |
|          version="5.0"
 | |
|          xml:id="sec-hidepid">
 | |
|  <title>Hiding process information</title>
 | |
|  <para>
 | |
|   Setting
 | |
| <programlisting>
 | |
| <xref linkend="opt-security.hideProcessInformation"/> = true;
 | |
| </programlisting>
 | |
|   ensures that access to process information is restricted to the owning user.
 | |
|   This implies, among other things, that command-line arguments remain private.
 | |
|   Unless your deployment relies on unprivileged users being able to inspect the
 | |
|   process information of other users, this option should be safe to enable.
 | |
|  </para>
 | |
|  <para>
 | |
|   Members of the <literal>proc</literal> group are exempt from process
 | |
|   information hiding.
 | |
|  </para>
 | |
|  <para>
 | |
|   To allow a service <replaceable>foo</replaceable> to run without process
 | |
|   information hiding, set
 | |
| <programlisting>
 | |
| <link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.<replaceable>foo</replaceable>.serviceConfig</link>.SupplementaryGroups = [ "proc" ];
 | |
| </programlisting>
 | |
|  </para>
 | |
| </chapter>
 |