mirror of
https://github.com/evilsocket/opensnitch.git
synced 2025-03-04 08:34:40 +01:00
![]() - The firewall rules defined in /etc/opensnitchd/system-fw.json take precedence over the interception rules, but we were inserting the interception rules before the system's ones. With this change #455 should be fixed. - On the other hand, the DefaultAction was not being applied correctly in all cases. As of today the DefaultAction is applied in 2 scenarios: * When the daemon is connected to the GUI and the user doesn't answer a pop-up. * When the daemon is not connected to the GUI. However as we don't parse all network protocols, even if the GUI is connected we may end up parsing a connection and don't know what to do with it. In this case the DefaultAction was always Deny. Now in the above scenario, i.e.: when the GUI is connected but we can't parse a connection, we'll apply the DefaultAction configured by the user. |
||
---|---|---|
.. | ||
conman | ||
core | ||
dns | ||
firewall | ||
log | ||
netfilter | ||
netlink | ||
netstat | ||
procmon | ||
rule | ||
statistics | ||
ui | ||
.gitignore | ||
default-config.json | ||
go.mod | ||
Gopkg.toml | ||
main.go | ||
Makefile | ||
opensnitch.spec | ||
opensnitchd.service | ||
system-fw.json |