This unit is provided by:
Options
-
[Install]
-
WantedBy=multi-user.target
-
-
[Service]
-
Environment=TERM=linux
-
EnvironmentFile=-/etc/sysconfig/iodined
-
EnvironmentFile=/etc/conf.d/iodined
-
EnvironmentFile=/etc/default/iodine
-
ExecStart=/bin/sh -c "/usr/sbin/iodined ${IODINED_PASS} ${IODINED_OPTIONS}"
-
ExecStart=/usr/bin/iodined -f -c -l $IODINE_BIND_ADDRESS -n $IODINE_EXT_IP -p $IODINE_PORT -P $IODINE_PASSWORD -u $IODINE_USER $TUN_IP $TOP_DOMAIN
-
ExecStart=/usr/sbin/iodined -f -u iodine -t /run/iodine $IODINED_ARGS -P ${IODINED_PASSWORD}
-
KillSignal=SIGHUP
-
PrivateDevices
Introduced in systemd 209=yes -
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=full -
Restart=always
-
Restart=on-failure
-
RestartSec=0
-
RestrictRealtime
Introduced in systemd 231=yes -
StandardOutput=syslog
-
Type=forking
-
Type=simple
-
-
[Unit]
-
After=local-fs.target network.target systemd-tmpfiles-setup.service
-
After=network.target
-
After=network.target syslog.target
-
Description=A daemon for tunneling traffic over DNS queries
-
Description=iodined lets you tunnel IPv4 data through a DNS server
-
Documentation=man:iodined(8)
-
Requires=network.target
-
Additionnal notes
Nothing here.