mirror of
https://github.com/evilsocket/opensnitch.git
synced 2025-03-04 08:34:40 +01:00
Update Rules.md
This commit is contained in:
parent
a32abc99e0
commit
7afc24e97d
1 changed files with 7 additions and 2 deletions
|
@ -174,7 +174,8 @@ Example of a complex rule using the operator _list_, saved from the GUI (Note: v
|
|||
|
||||
- Allow systemd-resolved only to your DNS nameservers:
|
||||
* Allow systemd-resolved connect only to your DNS nameservers + port 53 + UID
|
||||
|
||||
|
||||
|
||||
- Limit what an application can do as much as possible:
|
||||
* Filter by executable + command line: You don't want to allow `curl` or `wget` system wide. Instead, allow only a particular command line, for example:
|
||||
|
||||
|
@ -184,7 +185,11 @@ Example of a complex rule using the operator _list_, saved from the GUI (Note: v
|
|||
|
||||
You can narrow it further, by allowing `from this command line` + `from this User ID` + `to this IP` + `to this port`
|
||||
|
||||
- Again: https://github.com/evilsocket/opensnitch/wiki/Rules-examples#filtering-python-scripts-applicable-to-java-and-others-interpreters
|
||||
- Don't allow python3 binary system-wide:
|
||||
* As explained above, filter by executable + command line + (... more parameters ...)
|
||||
If you allow python3, you'll allow ANY python3 script, so be careful.
|
||||
|
||||
https://github.com/evilsocket/opensnitch/wiki/Rules-examples#filtering-python-scripts-applicable-to-java-and-others-interpreters
|
||||
|
||||
- Disable unprivileged namespaces to prevent rules bypass
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue