opensnitch/daemon/firewall/nftables
Gustavo Iñiguez Goia e090833d29
intercept packets only with the SYN flag set
Using "ct state NEW" to intercept packets causes some undesired effects:
  We intercept packets that not only have the SYN flag set, like ACK,
  ACK+PSH or SYN+ACK. Mainly response packets.

  This means that the IPs are not always in the expected order:
  443:1.1.1.1 -> 192.168.1.123:12345
  which causes sometimes not to obtain the process of the connection,
  because the connection in the system appears as
  12345:192.168.1.123 -> 1.1.1.1:443

Intercepting packets with *only* the SYN flag set seems to resolve
this problem.
2023-07-23 15:14:05 +02:00
..
exprs misc: removed debug msg, fixed warning msg 2023-07-17 16:48:44 +02:00
nftest tests: better sys-fw log,meta and ip tests 2023-07-12 12:53:13 +02:00
testdata tests: added nftables/system tests 2023-07-01 22:41:04 +02:00
chains.go tests: added new sys fw tests 2023-07-07 00:46:09 +02:00
chains_test.go tests: updated sys fw tests 2023-07-06 14:27:54 +02:00
monitor.go intercept packets only with the SYN flag set 2023-07-23 15:14:05 +02:00
monitor_test.go tests: updated sys fw tests 2023-07-06 14:27:54 +02:00
nftables.go sys fw: report errors to the GUI after reloading 2023-07-15 20:32:42 +02:00
parser.go sys,fw: export some internal utils. 2023-07-06 13:36:57 +02:00
rule_helpers.go sys,fw: check for errors when adding ports rules 2023-07-06 17:58:17 +02:00
rules.go intercept packets only with the SYN flag set 2023-07-23 15:14:05 +02:00
rules_test.go tests: updated sys fw tests 2023-07-06 14:27:54 +02:00
system.go sys fw: report errors to the GUI after reloading 2023-07-15 20:32:42 +02:00
system_test.go tests: updated sys fw tests 2023-07-06 14:27:54 +02:00
tables.go tests: added new sys fw tests 2023-07-07 00:46:09 +02:00
tables_test.go tests: updated sys fw tests 2023-07-06 14:27:54 +02:00
utils.go sys,fw: export some internal utils. 2023-07-06 13:36:57 +02:00
utils_test.go tests: updated sys fw tests 2023-07-06 14:27:54 +02:00