51 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Desktop File
		
	
	
	
	
	
			
		
		
	
	
			51 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Desktop File
		
	
	
	
	
	
| [Unit]
 | |
| Description=l4p - Layer 4 proxy
 | |
| 
 | |
| After=network-online.target
 | |
| Wants=network-online.target
 | |
| 
 | |
| [Install]
 | |
| WantedBy=default.target
 | |
| 
 | |
| [Service]
 | |
| Type=simple
 | |
| 
 | |
| # Allow read-only access to the config directory
 | |
| ReadOnlyPaths=/etc/l4p
 | |
| # Path to the binary
 | |
| ExecStart=/usr/local/bin/l4p
 | |
| 
 | |
| # Needs CAP_NET_BIND_SERVICE in order to bind to lower ports
 | |
| # When using ports above 1024, these should be made empty
 | |
| AmbientCapabilities=CAP_NET_BIND_SERVICE
 | |
| CapabilityBoundingSet=CAP_NET_BIND_SERVICE
 | |
| 
 | |
| # Run as a dynamic user
 | |
| DynamicUser=yes
 | |
| 
 | |
| # Security
 | |
| PrivateTmp=yes
 | |
| PrivateDevices=yes
 | |
| ProtectSystem=strict
 | |
| ProtectHome=yes
 | |
| SystemCallFilter=@basic-io @file-system @network-io @system-service
 | |
| SystemCallFilter=~@privileged
 | |
| SystemCallFilter=~@resources
 | |
| NoNewPrivileges=yes
 | |
| ProtectProc=invisible
 | |
| RemoveIPC=yes
 | |
| RestrictAddressFamilies=AF_INET AF_INET6
 | |
| RestrictNamespaces=yes
 | |
| ProtectHostname=yes
 | |
| ProtectClock=yes
 | |
| ProtectKernelModules=yes
 | |
| ProtectKernelLogs=yes
 | |
| ProtectControlGroups=yes
 | |
| LockPersonality=yes
 | |
| MemoryDenyWriteExecute=yes
 | |
| RestrictRealtime=yes
 | |
| ProcSubset=pid
 | |
| UMask=0077
 | |
| SystemCallArchitectures=native
 | |
| RestrictSUIDSGID=yes
 | |
| ProtectKernelTunables=yes |