mirror of
https://github.com/evilsocket/opensnitch.git
synced 2025-03-06 09:30:58 +01:00
![]() In some scenarios (#47) may be useful to have a set of rules handled from OpenSnitch, although you can accomplish it with other software (ufw,...). This rules will sit just above default intercetion, so if you want to allow or deny something, just place it here. These priority rules are defined in /etc/opensnitchd/fw.json, with the following format (example): { "PriorityRules": { "out": { "allow": [ ], "deny": [ "-m conntrack --ctstate INVALID", "-p tcp ! --syn -m conntrack --ctstate NEW" ] } } } The structure must exist even if you haven't defined any rule, for example: { "PriorityRules": { "out": { "allow": [ ], "deny": [ ] } } } |
||
---|---|---|
.. | ||
config.go | ||
rules.go |