I would like to propose using PrivateTmp for l2tpd systemd unit file This should make the use of /tmp directory more secure and avoid users from being able to potentially effect it. http://fedoraproject.org/wiki/Features/ServicesPrivateTmp
Any change on this bug. We are coming up to Feature Freeze, and would like some comment on this bug. If you do not believe this application uses /tmp than please comment on this and close the bug. If you believe this application needs to use /tmp to communicate with other applications or users then you can close this bug with that comment. If your app does not use systemd, then close this bug with that comment. If you have no idea, then please add a comment, and change the bug to assigned. I need to update the status on this feature. Thanks for your help.
I don't think this daemon needs to write in /tmp at all. The only place where this daemon does need to write is /var/run/ to create the l2tp-socket with which users talk to the daemon (/var/run/xl2tpd/l2tp-socket)
I think at one time the sock file was in /tmp. I will clean up the policy and close this bug.