Introduce systemd.exec restrictions for better security
This commit is contained in:
13
etc/systemd/system/vsftpd.service.d/custom.conf
Normal file
13
etc/systemd/system/vsftpd.service.d/custom.conf
Normal file
@ -0,0 +1,13 @@
|
||||
[Service]
|
||||
ProtectSystem=strict
|
||||
PrivateTmp=true
|
||||
NoNewPrivileges=true
|
||||
PrivateDevices=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectControlGroups=true
|
||||
LockPersonality=true
|
||||
MemoryDenyWriteExecute=true
|
||||
SystemCallArchitectures=native
|
||||
InaccessiblePaths=/var/www/
|
||||
InaccessiblePaths=/root/
|
Reference in New Issue
Block a user