aboutsummaryrefslogtreecommitdiff
path: root/nixos/modules/security/hidepid.xml
diff options
context:
space:
mode:
Diffstat (limited to 'nixos/modules/security/hidepid.xml')
-rw-r--r--nixos/modules/security/hidepid.xml11
1 files changed, 3 insertions, 8 deletions
diff --git a/nixos/modules/security/hidepid.xml b/nixos/modules/security/hidepid.xml
index 5a17cb1da41..979d0215ab3 100644
--- a/nixos/modules/security/hidepid.xml
+++ b/nixos/modules/security/hidepid.xml
@@ -9,18 +9,13 @@
<programlisting>
<xref linkend="opt-security.hideProcessInformation"/> = true;
</programlisting>
- ensures that access to process information is restricted to the owning user.
- This implies, among other things, that command-line arguments remain private.
- Unless your deployment relies on unprivileged users being able to inspect the
- process information of other users, this option should be safe to enable.
+ ensures that access to process information is restricted to the owning user. This implies, among other things, that command-line arguments remain private. Unless your deployment relies on unprivileged users being able to inspect the process information of other users, this option should be safe to enable.
</para>
<para>
- Members of the <literal>proc</literal> group are exempt from process
- information hiding.
+ Members of the <literal>proc</literal> group are exempt from process information hiding.
</para>
<para>
- To allow a service <replaceable>foo</replaceable> to run without process
- information hiding, set
+ To allow a service <replaceable>foo</replaceable> to run without process information hiding, set
<programlisting>
<link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.<replaceable>foo</replaceable>.serviceConfig</link>.SupplementaryGroups = [ "proc" ];
</programlisting>