You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
36 lines
1013 B
36 lines
1013 B
2 years ago
|
# tor.service -- this systemd configuration file for Tor sets up a
|
||
|
# relatively conservative, hardened Tor service. You may need to
|
||
|
# edit it if you are making changes to your Tor configuration that it
|
||
|
# does not allow. Package maintainers: this should be a starting point
|
||
|
# for your tor.service; it is not the last point.
|
||
|
|
||
|
[Unit]
|
||
|
Description=Anonymizing overlay network for TCP
|
||
|
After=syslog.target network.target nss-lookup.target
|
||
|
|
||
|
[Service]
|
||
|
Type=notify
|
||
|
NotifyAccess=all
|
||
|
ExecStartPre=/usr/bin/tor -f /etc/tor/torrc --verify-config
|
||
|
ExecStart=/usr/bin/tor -f /etc/tor/torrc
|
||
|
ExecReload=/bin/kill -HUP ${MAINPID}
|
||
|
KillSignal=SIGINT
|
||
|
TimeoutSec=60
|
||
|
Restart=on-failure
|
||
|
WatchdogSec=1m
|
||
|
LimitNOFILE=32768
|
||
|
|
||
|
# Hardening
|
||
|
PrivateTmp=yes
|
||
|
PrivateDevices=yes
|
||
|
ProtectHome=yes
|
||
|
ProtectSystem=full
|
||
|
ReadOnlyDirectories=/
|
||
|
ReadWriteDirectories=-/var/lib/tor
|
||
|
ReadWriteDirectories=-/var/log/tor
|
||
|
NoNewPrivileges=yes
|
||
|
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE CAP_DAC_READ_SEARCH
|
||
|
|
||
|
[Install]
|
||
|
WantedBy=multi-user.target
|