summary refs log tree commit diff
path: root/nixos/modules/security/hidepid.xml
blob: 5a17cb1da412c11114c12d390ad0a0ec58ad36b7 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
<chapter xmlns="http://docbook.org/ns/docbook"
         xmlns:xlink="http://www.w3.org/1999/xlink"
         xmlns:xi="http://www.w3.org/2001/XInclude"
         version="5.0"
         xml:id="sec-hidepid">
 <title>Hiding process information</title>
 <para>
  Setting
<programlisting>
<xref linkend="opt-security.hideProcessInformation"/> = true;
</programlisting>
  ensures that access to process information is restricted to the owning user.
  This implies, among other things, that command-line arguments remain private.
  Unless your deployment relies on unprivileged users being able to inspect the
  process information of other users, this option should be safe to enable.
 </para>
 <para>
  Members of the <literal>proc</literal> group are exempt from process
  information hiding.
 </para>
 <para>
  To allow a service <replaceable>foo</replaceable> to run without process
  information hiding, set
<programlisting>
<link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.<replaceable>foo</replaceable>.serviceConfig</link>.SupplementaryGroups = [ "proc" ];
</programlisting>
 </para>
</chapter>