mirror of
https://github.com/ilyakooo0/nixpkgs.git
synced 2024-12-29 14:57:28 +03:00
34 lines
1.1 KiB
XML
34 lines
1.1 KiB
XML
|
<chapter xmlns="http://docbook.org/ns/docbook"
|
||
|
xmlns:xlink="http://www.w3.org/1999/xlink"
|
||
|
xmlns:xi="http://www.w3.org/2001/XInclude"
|
||
|
version="5.0"
|
||
|
xml:id="sec-hidepid">
|
||
|
|
||
|
<title>Hiding process information</title>
|
||
|
|
||
|
<para>
|
||
|
Setting
|
||
|
<programlisting>
|
||
|
security.hideProcessInformation = true;
|
||
|
</programlisting>
|
||
|
ensures that access to process information is restricted to the
|
||
|
owning user. This implies, among other things, that command-line
|
||
|
arguments remain private. Unless your deployment relies on unprivileged
|
||
|
users being able to inspect the process information of other users, this
|
||
|
option should be safe to enable.
|
||
|
</para>
|
||
|
|
||
|
<para>
|
||
|
Members of the <literal>proc</literal> group are exempt from process
|
||
|
information hiding.
|
||
|
</para>
|
||
|
|
||
|
<para>
|
||
|
To allow a service <replaceable>foo</replaceable> to run without process information hiding, set
|
||
|
<programlisting>
|
||
|
systemd.services.<replaceable>foo</replaceable>.serviceConfig.SupplementaryGroups = [ "proc" ];
|
||
|
</programlisting>
|
||
|
</para>
|
||
|
|
||
|
</chapter>
|