This unit is provided by:
Options
-
[Install]
-
WantedBy=multi-user.target
-
-
[Service]
-
CacheDirectory=onionprobe
-
CapabilityBoundingSet=
-
ConfigurationDirectory=onionprobe
-
DeviceAllow=/dev/null rw
-
DevicePolicy=closed
-
EnvironmentFile=/etc/default/onionprobe
-
ExecStart=/usr/bin/onionprobe -c $CONFIG $DAEMON_OPTS
-
Group=_onionprobe
-
InaccessibleDirectories=/home
-
LockPersonality
Introduced in systemd 235=yes -
LogsDirectory=onionprobe
-
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
NoNewPrivileges
Introduced in systemd 239=yes -
PrivateDevices
Introduced in systemd 209=yes -
PrivateTmp=yes
-
PrivateUsers=yes
-
ProcSubset
Introduced in systemd 247=pid -
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=true true -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectProc
Introduced in systemd 247=invisible -
ProtectSystem
Introduced in systemd 214=full -
ReadOnlyDirectories=/
-
RemoveIPC
Introduced in systemd 232=yes -
RestrictAddressFamilies=AF_INET AF_INET6
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
RestrictSUIDSGID
Introduced in systemd 242=yes -
RuntimeDirectory=onionprobe
-
StateDirectory=onionprobe
-
SystemCallArchitectures=native
-
UMask=0077
-
User=_onionprobe
-
-
[Unit]
-
After=network.target
-
Description=Onionprobe
-
Documentation=file:///usr/share/doc/onionprobe/README.Debian man:onionprobe(1) https://gitlab.torproject.org/tpo/onion-services/onionprobe
-
Additionnal notes
Nothing here.