mirror of
https://github.com/Kicksecure/security-misc.git
synced 2024-10-01 08:25:45 -04:00
comment out proc-hidepid.service hardening for now
since broken in Qubes Debian AppVMs https://forums.whonix.org/t/kernel-hardening/7296/104
This commit is contained in:
parent
0bffc7a930
commit
24cc8e380d
@ -10,21 +10,22 @@ After=local-fs.target
|
||||
[Service]
|
||||
Type=oneshot
|
||||
ExecStart=/bin/mount -o remount,nosuid,nodev,noexec,hidepid=2 /proc
|
||||
ProtectSystem=strict
|
||||
ProtectHome=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectControlGroups=true
|
||||
PrivateTmp=true
|
||||
PrivateMounts=true
|
||||
PrivateDevices=true
|
||||
PrivateNetwork=true
|
||||
MemoryDenyWriteExecute=true
|
||||
NoNewPrivileges=true
|
||||
RestrictRealtime=true
|
||||
SystemCallArchitectures=native
|
||||
RestrictNamespaces=true
|
||||
SystemCallFilter=mount munmap access read open close stat fstat lstat mmap mprotect brk rt_sigaction rt_sigprocmask execve readlink getrlimit getuid getgid geteuid getegid statfs prctl arch_prctl set_tid_address newfstatat set_robust_list openat mkdir
|
||||
|
||||
#ProtectSystem=strict
|
||||
#ProtectHome=true
|
||||
#ProtectKernelTunables=true
|
||||
#ProtectKernelModules=true
|
||||
#ProtectControlGroups=true
|
||||
#PrivateTmp=true
|
||||
#PrivateMounts=true
|
||||
#PrivateDevices=true
|
||||
#PrivateNetwork=true
|
||||
#MemoryDenyWriteExecute=true
|
||||
#NoNewPrivileges=true
|
||||
#RestrictRealtime=true
|
||||
#SystemCallArchitectures=native
|
||||
#RestrictNamespaces=true
|
||||
#SystemCallFilter=mount munmap access read open close stat fstat lstat mmap mprotect brk rt_sigaction rt_sigprocmask execve readlink getrlimit getuid getgid geteuid getegid statfs prctl arch_prctl set_tid_address newfstatat set_robust_list openat mkdir
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
|
Loading…
Reference in New Issue
Block a user