-
-
Notifications
You must be signed in to change notification settings - Fork 513
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update opensnitchd.service #1019
base: master
Are you sure you want to change the base?
Conversation
Linkfix to wiki
@evilsocket seems #118 was not proper after all? 🤔 |
I think i found the spot where the packaged version in the @gustavo-iniguez-goya could you please make that file a symbolic link to the one in the master tree at: https://github.com/evilsocket/opensnitch/blob/master/daemon/opensnitchd.service 🤔 It will eliminate further discrepancies between the packaged version and the sources of the daemon... |
@lainedfles in reply to #1018 (comment)
When not using absolute paths, systemd is using it's own default (build-in) path to find the executables see: systemd-path search-binaries-default.
That makefile could/should be changed to use this access-mode anyway to make that directory more secure... 🤷♀️
The
Nice catch, i expected for it to become empty in the expansion so i didn't expect that 👍
It can be removed when the functionality you mention is implemented, but until then lets keep it in the unit.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sugestions from @lainedfles
Applied suggested changes by @lainedfles
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please see my comment on last commit...
(accessible using the chat icon on the commit line above)
If things do go wrong or just to be extra specific we could add |
Any progress here ? |
@luzpaz ,If i would have made any more changes they would be shown in this thread as commits so no, the PR is still waiting for merging/acceptance... Feel free to do a review if you want though 👍 |
Implements: #1018
Summary:
The systemd service unit can be enhanced to start BEFORE any network is configured, and thus allow interception and protection at an earlier stage...
Notable changes/additions:
Unit filename:
⚠️ The service filename needs tobe changed to
opensnitchd.service
!!!This was needed for automatically using the unit name in the service definition using the
%N
specifier...See: Specifiers@man
systemd.unit#Specifiers
d
in it's name !Unit ordering:
Made sure the daemon starts before any network related devices or services are created/started by using
network-pre.target
, See:Startup target / run-level:
Changed the default install target to
basic.target
instead ofmulti-user.target
.This will allow it to run in any "run-level" in SysV terms.
See: Units managed by the system service manager@man
systemd.special#basic.target
Automatically disable using a kernel-command-line option:
Just in case it is needed, i added the ability to disable the daemon using a kernel-command-line option using the
ConditionKernelCommandLine
directive.When the
no-appfw
option is present in the kernel-command-line, the daemon will not startup.This option functions same as the well-known
quite
option. (only applies when present as a separate word)Automatically create rules directory:
Let systemd automatically create the "rules" directory with proper mode, when non-existent yet, upon starting the daemon service by using the
ConfigurationDirectory
andConfigurationDirectoryMode
directives.Automatically check for kernel support before starting:
Automatically prevent startup when required kernel support is not present by using the
-check-requirements
flag in aExecCondition
directive.(This assumes the command returns a non-zero exit status when not satisfied.)
Reload functionality:
Added support for reloading the daemon using the
ExecReload
directive.Signal-info was taken from the init.d script, but it just exits and then systemd restarts the service...
So this functionality either needs to be implemented in the daemon's code or a different signal needs to be sent to it.
But at least the functionality is now present in the unit file.
Prevent from being killed by the OOM-Killer:
Prevented the daemon to be killed by the Linux kernel's Out-Of-Memory (OOM) killer, using the
OOMScoreAdjust=-1000
directive.See: OOMScoreAdjust@man
systemd.exec#OOMScoreAdjust
(This will ensure that the protection keeps functioning even when other processes cause an OOM)
Admin overrides using drop-ins:
Added support for easily adjusting the directory used for rules and extra options by the local admin.
The local admin can create "drop-in" config(s) under
/etc/systemd/system/opensnitchd.service.d/
even when the service file is installed in other places by the package maintainer, See: 16.14. Extending the default unit configuration@redhat.comExample drop-in(s) contents that can-be-used:
To change the rules directory to be used:
$custom_cfg
is supplied as an argument to the-rules-path
option of the daemon.systemd.unit#Specifiers
%E
expands to/etc
%N
expands to the unit nameopensnitchd
/etc/opensnitchd/rules-special
To enable debug output:
$opts
is supplied as extra argument(s) to the daemon.Combination of both: