On Mon, Aug 25, 2014 at 12:58 PM, Yarny <ya...@public-files.de> wrote:
> I recently discovered the PrivateNetwork
> option in systemd.exec(5), and I was wondering:
>
> Is it also possible to restrict user sessions with this option?
>
> I'd like to prevent a certain user's group from
> accessing the network configuration of my machine
> (they should even be forbidden to see the IP address).
>
> To this end, I tried editing files like
> /etc/systemd/system/user@1234.service,
> but it didn't have any effect (openSUSE 13.1 with systemd 208).

At the moment, "user@.service" does not manage your session at all --
it merely runs various 'background' services that you might have added
(cronjobs, tmux, mpd...) The interactive sessions, meanwhile, are
launched directly (by /bin/login or GDM or sshd).

Even though GNOME seems to have plans to migrate the user session
startup to user@, it's not going to help much, as it won't affect
console logins, SSH logins, and so on.

Instead, you should check if someone has written a PAM 'session'
module which could do this. (There's one for mount namespaces.) If
not, one should be easy to write, and it'll protect *all* login
methods.

-- 
Mantas Mikulėnas <graw...@gmail.com>
_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to