opensnitch/daemon/firewall
Gustavo Iñiguez Goia d11a98e418 fixed interception and system fw rules, default action
- The firewall rules defined in /etc/opensnitchd/system-fw.json take
precedence over the interception rules, but we were inserting the
interception rules before the system's ones. With this change #455
should be fixed.

- On the other hand, the DefaultAction was not being applied correctly
  in all cases. As of today the DefaultAction is applied in 2 scenarios:
  * When the daemon is connected to the GUI and the user doesn't answer
    a pop-up.
  * When the daemon is not connected to the GUI.

  However as we don't parse all network protocols, even if the GUI is
  connected we may end up parsing a connection and don't know what to do
  with it. In this case the DefaultAction was always Deny.

  Now in the above scenario, i.e.: when the GUI is connected but we
  can't parse a connection, we'll apply the DefaultAction configured by
  the user.
2021-08-25 13:06:32 +02:00
..
common allow to configure what firewall to use 2021-08-09 00:32:27 +02:00
config added nftables support 2021-06-07 01:32:05 +02:00
iptables fixed interception and system fw rules, default action 2021-08-25 13:06:32 +02:00
nftables allow to configure what firewall to use 2021-08-09 00:32:27 +02:00
rules.go allow to configure what firewall to use 2021-08-09 00:32:27 +02:00