Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

systemd: tight sandboxing #103

Merged
merged 1 commit into from
Mar 18, 2024
Merged

systemd: tight sandboxing #103

merged 1 commit into from
Mar 18, 2024

Commits on Mar 18, 2024

  1. systemd: tight sandboxing

    wireproxy needs very little permissions, we can restrict it to basically
    nothing. DynamicUser means the system will generate a UID on demand
    for service, also CAP_NET_BIND_SERVICE can be used to allow this user
    to bind to a port < 1024 if desired. Also LoadCredential lets us read
    a file with tight permissions i.e. root:root 0400 and pass it to only
    wireproxy in an ephemeral and constrained manner.
    
    Signed-off-by: J. Dekker <[email protected]>
    jdek committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    47b8778 View commit details
    Browse the repository at this point in the history