wireguard-setup/packer/rootfs/etc/systemd/system/udptunnel.service

51 lines
1.1 KiB
SYSTEMD
Raw Permalink Normal View History

[Unit]
Description=udptunnel service
Requires=udptunnel.socket
ConditionPathExists=!/etc/udptunnel/udptunnel_not_to_be_run
[Service]
Type=notify
2021-03-28 17:02:47 +02:00
Restart=always
ExecStart=/usr/local/bin/udptunnel --server --verbose 127.0.0.1:51820
StandardOutput=journal
StandardError=journal
2021-11-21 15:44:36 +01:00
UMask=0077
DynamicUser=yes
ProtectSystem=strict
ProtectHome=yes
2021-11-21 15:44:36 +01:00
PrivateTmp=yes
PrivateDevices=yes
PrivateUsers=yes
ProtectHostname=yes
ProtectClock=yes
ProtectKernelTunables=yes
ProtectKernelModules=yes
2021-11-21 15:44:36 +01:00
ProtectKernelLogs=yes
ProtectControlGroups=yes
2021-11-21 15:44:36 +01:00
ProtectProc=invisible
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
RestrictNamespaces=yes
2021-11-21 15:44:36 +01:00
RestrictRealtime=yes
RestrictSUIDSGID=yes
LockPersonality=yes
MemoryDenyWriteExecute=yes
2021-11-21 15:44:36 +01:00
SystemCallFilter=~@clock
SystemCallFilter=~@cpu-emulation
SystemCallFilter=~@debug
SystemCallFilter=~@module
SystemCallFilter=~@mount
SystemCallFilter=~@obsolete
SystemCallFilter=~@privileged
SystemCallFilter=~@raw-io
SystemCallFilter=~@reboot
SystemCallFilter=~@resources
SystemCallFilter=~@swap
SystemCallArchitectures=native
2021-11-21 15:44:36 +01:00
CapabilityBoundingSet=
DevicePolicy=closed
ProcSubset=pid
NoNewPrivileges=yes
[Install]
WantedBy=multi-user.target