-
-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make use of systemd's hardening? #19
Comments
I don't see why we wouldn't consider a PR that materially hardens Keep in mind also that |
Perhaps related to this, would it be possible to run this service as a non-root user, perhaps in the audio group? |
In my experient with Void Linux void-linux/void-packages#54446 I only had to patch it to use |
Just to follow up: running as non-root with no capabilities has been working fine for me. The user is in audio group, and the only change is as I said: |
Given that the process uses uclamp, maybe it is safer to give it |
I've been toying with
systemd-analyze security
, and the results forsystemd-analyze security speakersafetyd.service
aren't super-duper-great. While speakersafetyd is written in Rust, it's still running as root, which is scary. Would it make sense to make use of systemd's hardening to reduce a bit the attack surface? If so, I'd be happy to send a pull-request.The text was updated successfully, but these errors were encountered: