This unit is provided by:
Options
-
[Service]
-
AppArmorProfile=-system_tor
-
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE CAP_DAC_READ_SEARCH
-
ExecReload=/bin/kill -HUP ${MAINPID}
-
ExecStart=/usr/bin/tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc -f /etc/tor/torrc --RunAsDaemon 0
-
ExecStartPre=/usr/bin/install -Z -m 02755 -o debian-tor -g debian-tor -d /run/tor /usr/bin/tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc -f /etc/tor/torrc --RunAsDaemon 0 --verify-config
-
KillSignal=SIGINT
-
LimitNOFILE=65536
-
NoNewPrivileges
Introduced in systemd 239=yes -
NotifyAccess=all
-
PIDFile=/run/tor/tor.pid
-
PermissionsStartOnly=yes
-
PrivateDevices
Introduced in systemd 209=yes -
PrivateTmp=yes
-
ProtectHome
Introduced in systemd 214=yes -
ProtectSystem
Introduced in systemd 214=full -
ReadOnlyDirectories=/
-
ReadWriteDirectories=-/proc -/var/lib/tor -/var/log/tor -/run
-
Restart=on-failure
-
TimeoutStartSec=300
-
TimeoutStopSec
Introduced in systemd 188=60 -
Type=notify
-
-
[Unit]
-
After=network.target nss-lookup.target
-
Description=Anonymizing overlay network for TCP
-
PartOf=tor.service
-
ReloadPropagatedFrom=tor.service
-
Additionnal notes
Nothing here.