mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-26 11:35:35 +00:00
a9a80ab372
While not a full capability lockdown of the systemd unit, this still improves sandboxing and security of the running process a good deal. Signed-off-by: Frederik “Freso” S. Olesen <freso.dk@gmail.com>
36 lines
857 B
Desktop File
36 lines
857 B
Desktop File
[Unit]
|
|
Description=Tailscale node agent
|
|
Documentation=https://tailscale.com/kb/
|
|
Wants=network-pre.target
|
|
After=network-pre.target
|
|
|
|
[Service]
|
|
EnvironmentFile=/etc/default/tailscaled
|
|
ExecStartPre=/usr/sbin/tailscaled --cleanup
|
|
ExecStart=/usr/sbin/tailscaled --state=/var/lib/tailscale/tailscaled.state --socket=/run/tailscale/tailscaled.sock --port $PORT $FLAGS
|
|
ExecStopPost=/usr/sbin/tailscaled --cleanup
|
|
|
|
Restart=on-failure
|
|
|
|
RuntimeDirectory=tailscale
|
|
RuntimeDirectoryMode=0755
|
|
StateDirectory=tailscale
|
|
StateDirectoryMode=0750
|
|
CacheDirectory=tailscale
|
|
CacheDirectoryMode=0750
|
|
Type=notify
|
|
|
|
LockPersonality=true
|
|
MemoryDenyWriteExecute=true
|
|
PrivateTmp=true
|
|
ProtectControlGroups=true
|
|
ProtectHome=true
|
|
ProtectKernelTunables=true
|
|
ProtectSystem=strict
|
|
ReadWritePaths=/etc/
|
|
RestrictSUIDSGID=true
|
|
SystemCallArchitectures=native
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|