| 
									
										
										
										
											2022-12-30 17:37:44 +00:00
										 |  |  | [Unit] | 
					
						
							|  |  |  | Description=collabore tunnel  Make your local services accessible to all on the public Internet | 
					
						
							|  |  |  | After=network.target nginx.service | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | [Service] | 
					
						
							|  |  |  | Environment=UNIX_SOCKETS_DIRECTORY=/tmp/collabore-tunnel | 
					
						
							|  |  |  | Environment=SERVER_HOSTNAME=tnl.clb.re | 
					
						
							|  |  |  | Environment=CONFIG_DIRECTORY=. | 
					
						
							| 
									
										
										
										
											2023-05-13 15:03:49 +00:00
										 |  |  | Environment=WELCOME_BANNER_FILE=./welcome_banner.txt | 
					
						
							|  |  |  | Environment=RATE_LIMIT_COUNT=5 | 
					
						
							|  |  |  | Environment=RATE_LIMIT_INTERVAL=60 | 
					
						
							|  |  |  | Environment=MAX_CONNECTIONS_PER_IP=5 | 
					
						
							|  |  |  | Environment=TIMEOUT=120 | 
					
						
							| 
									
										
										
										
											2022-12-30 17:37:44 +00:00
										 |  |  | Environment=SSH_SERVER_HOST=0.0.0.0 | 
					
						
							|  |  |  | Environment=SSH_SERVER_PORT=22 | 
					
						
							|  |  |  | Environment=LOG_DEPTH=2 | 
					
						
							|  |  |  | WorkingDirectory=/opt/collabore-tunnel | 
					
						
							|  |  |  | ExecStart=/usr/bin/python3 main.py | 
					
						
							|  |  |  | ExecStop=/bin/kill -9 $MAINPID | 
					
						
							|  |  |  | ProtectSystem=strict | 
					
						
							|  |  |  | ReadWritePaths=/opt/collabore-tunnel /tmp | 
					
						
							|  |  |  | ReadOnlyPaths=/usr/bin | 
					
						
							|  |  |  | InaccessiblePaths=... | 
					
						
							|  |  |  | ProtectHome=true | 
					
						
							|  |  |  | ProtectProc=invisible | 
					
						
							|  |  |  | ProtectKernelTunables=true | 
					
						
							|  |  |  | ProtectControlGroups=true | 
					
						
							|  |  |  | NoNewPrivileges=true | 
					
						
							|  |  |  | CapabilityBoundingSet=CAP_NET_BIND_SERVICE | 
					
						
							|  |  |  | RestrictNamespaces=uts ipc pid cgroup | 
					
						
							|  |  |  | RestrictSUIDSGID=true | 
					
						
							|  |  |  | RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 AF_NETLINK | 
					
						
							|  |  |  | RestrictRealtime=yes | 
					
						
							|  |  |  | MemoryDenyWriteExecute=yes | 
					
						
							|  |  |  | LockPersonality=yes | 
					
						
							|  |  |  | IPAddressAllow=192.168.1.0/24 | 
					
						
							|  |  |  | PrivateDevices=true | 
					
						
							|  |  |  | ProtectKernelModules=true | 
					
						
							|  |  |  | ProtectKernelLogs=true | 
					
						
							|  |  |  | ProtectClock=true | 
					
						
							|  |  |  | SystemCallArchitectures=native | 
					
						
							|  |  |  | SystemCallFilter= | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | [Install] | 
					
						
							|  |  |  | WantedBy=multi-user.target |