2020-03-09 23:06:42 +01:00
|
|
|
[Unit]
|
|
|
|
Description=FORT RPKI validator
|
|
|
|
Documentation=man:fort(8)
|
|
|
|
Documentation=https://nicmx.github.io/FORT-validator/
|
|
|
|
|
|
|
|
[Service]
|
2021-02-11 09:37:11 +01:00
|
|
|
ExecStart=/usr/bin/fort --configuration-file /etc/fort/config.json --daemon
|
2020-03-09 23:06:42 +01:00
|
|
|
Type=simple
|
|
|
|
User=fort
|
|
|
|
AmbientCapabilities=CAP_NET_BIND_SERVICE
|
|
|
|
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
|
|
|
|
ProtectSystem=strict
|
|
|
|
ProtectHome=yes
|
|
|
|
PrivateDevices=yes
|
|
|
|
PrivateTmp=yes
|
|
|
|
ProtectKernelTunables=yes
|
|
|
|
ProtectControlGroups=yes
|
|
|
|
ProtectKernelModules=yes
|
2020-03-11 09:49:04 +01:00
|
|
|
CacheDirectory=fort
|
2020-03-09 23:06:42 +01:00
|
|
|
ReadWritePaths=/var/lib/fort/
|
|
|
|
ConfigurationDirectory=fort
|
|
|
|
ConfigurationDirectory=tals
|
|
|
|
StateDirectory=fort
|
|
|
|
NoNewPrivileges=yes
|
|
|
|
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
|
|
|
|
RestrictNamespaces=yes
|
|
|
|
RestrictRealtime=yes
|
|
|
|
LockPersonality=yes
|
|
|
|
MemoryDenyWriteExecute=yes
|
|
|
|
SystemCallArchitectures=native
|
|
|
|
SystemCallErrorNumber=EPERM
|
|
|
|
SystemCallFilter=@system-service
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|