mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 13:13:44 +01:00
0f628d6560
This explains that if you change your torrc to do more, you might need to change tor.service.in to allow it. See #15195.
36 lines
1.0 KiB
SYSTEMD
36 lines
1.0 KiB
SYSTEMD
# tor.service -- this systemd configuration file for Tor sets up a
|
|
# relatively conservative, hardened Tor service. You may need to
|
|
# edit it if you are making changes to your Tor configuration that it
|
|
# does not allow. Package maintainers: this should be a starting point
|
|
# for your tor.service; it is not the last point.
|
|
|
|
[Unit]
|
|
Description = Anonymizing overlay network for TCP
|
|
After = syslog.target network.target nss-lookup.target
|
|
|
|
[Service]
|
|
Type = notify
|
|
NotifyAccess = all
|
|
ExecStartPre = @BINDIR@/tor -f @CONFDIR@/torrc --verify-config
|
|
ExecStart = @BINDIR@/tor -f @CONFDIR@/torrc
|
|
ExecReload = /bin/kill -HUP ${MAINPID}
|
|
KillSignal = SIGINT
|
|
TimeoutSec = 30
|
|
Restart = on-failure
|
|
WatchdogSec = 1m
|
|
LimitNOFILE = 32768
|
|
|
|
# Hardening
|
|
PrivateTmp = yes
|
|
PrivateDevices = yes
|
|
ProtectHome = yes
|
|
ProtectSystem = full
|
|
ReadOnlyDirectories = /
|
|
ReadWriteDirectories = -@LOCALSTATEDIR@/lib/tor
|
|
ReadWriteDirectories = -@LOCALSTATEDIR@/log/tor
|
|
NoNewPrivileges = yes
|
|
CapabilityBoundingSet = CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE
|
|
|
|
[Install]
|
|
WantedBy = multi-user.target
|