summaryrefslogtreecommitdiff
path: root/contrib/dist/tor.service.in
blob: 8ed5ad227a5ca0b6d8c9588ae6e803e5109f9766 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
# tor.service -- this systemd configuration file for Tor sets up a
# relatively conservative, hardened Tor service.  You may need to
# edit it if you are making changes to your Tor configuration that it
# does not allow.  Package maintainers: this should be a starting point
# for your tor.service; it is not the last point.

[Unit]
Description = Anonymizing overlay network for TCP
After = syslog.target network.target nss-lookup.target

[Service] Type = notify NotifyAccess = all ExecStartPre = @BINDIR@/tor
-f @CONFDIR@/torrc --verify-config ExecStart = @BINDIR@/tor -f
@CONFDIR@/torrc ExecReload = /bin/kill -HUP ${MAINPID} KillSignal =
SIGINT TimeoutSec = 30 Restart = on-failure WatchdogSec = 1m
LimitNOFILE = 32768

# Hardening
PrivateTmp = yes
PrivateDevices = yes
ProtectHome = yes
ProtectSystem = full
ReadOnlyDirectories = /
ReadWriteDirectories = -@LOCALSTATEDIR@/lib/tor
ReadWriteDirectories = -@LOCALSTATEDIR@/log/tor
NoNewPrivileges = yes
CapabilityBoundingSet = CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE

[Install]
WantedBy = multi-user.target