Introduce systemd.exec restrictions for better security
This commit is contained in:
etc/systemd/system
dovecot.service.d
mariadb.service.d
nginx.service.d
php7.3-fpm@.servicephp7.3-fpm@default.servicepostfix.service.d
postfix@.service.d
vsftpd.service.d
@@ -12,6 +12,20 @@ ExecStart=/usr/sbin/php-fpm7.3 --nodaemonize --fpm-config /etc/php/7.3/fpm/php-f
|
||||
ExecReload=/bin/kill -USR2 $MAINPID
|
||||
LimitNOFILE=100000
|
||||
TimeoutStartSec=300
|
||||
ProtectSystem=strict
|
||||
PrivateTmp=true
|
||||
# sendmail requires it... enable once chrooted
|
||||
#NoNewPrivileges=true
|
||||
PrivateDevices=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectControlGroups=true
|
||||
LockPersonality=true
|
||||
SystemCallArchitectures=native
|
||||
BindPaths=/var/log/
|
||||
BindPaths=/var/run/php/
|
||||
BindPaths=/run/php/
|
||||
InaccessiblePaths=/root/
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
|
Reference in New Issue
Block a user