| 1234567891011121314151617181920212223242526272829303132333435 | 
							- # tor.service -- this systemd configuration file for Tor sets up a
 
- # relatively conservative, hardened Tor service.  You may need to
 
- # edit it if you are making changes to your Tor configuration that it
 
- # does not allow.  Package maintainers: this should be a starting point
 
- # for your tor.service; it is not the last point.
 
- [Unit]
 
- Description = Anonymizing overlay network for TCP
 
- After = syslog.target network.target nss-lookup.target
 
- [Service]
 
- Type = notify
 
- NotifyAccess = all
 
- ExecStartPre = @BINDIR@/tor -f @CONFDIR@/torrc --verify-config
 
- ExecStart = @BINDIR@/tor -f @CONFDIR@/torrc
 
- ExecReload = /bin/kill -HUP ${MAINPID}
 
- KillSignal = SIGINT
 
- TimeoutSec = 30
 
- Restart = on-failure
 
- WatchdogSec = 1m
 
- LimitNOFILE = 32768
 
- # Hardening
 
- PrivateTmp = yes
 
- PrivateDevices = yes
 
- ProtectHome = yes
 
- ProtectSystem = full
 
- ReadOnlyDirectories = /
 
- ReadWriteDirectories = -@LOCALSTATEDIR@/lib/tor
 
- ReadWriteDirectories = -@LOCALSTATEDIR@/log/tor
 
- NoNewPrivileges = yes
 
- CapabilityBoundingSet = CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE
 
- [Install]
 
- WantedBy = multi-user.target
 
 
  |