mirror of
https://github.com/evilsocket/opensnitch.git
synced 2025-03-04 16:44:46 +01:00
![]() With the current implementation, it's not possible to know what process/pid has created an outgoing connection, but there's still valuable information that the user may want to know, so: - display outgoing connections even if the process name/path is unknown. (src ip, dst ip, dst port, uid) - get outgoing connection uid if kernel > 3.6. |
||
---|---|---|
.. | ||
entry.go | ||
find.go | ||
parse.go |