TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSnitch is a GNU/Linux port of the Little Snitch application firewall

208 pointsby btdmasteralmost 3 years ago

13 comments

dylan604almost 3 years ago
I love Little Snitch. I hate Little Snitch.<p>The first time I installed and ran Little Snitch, I was pretty much flabergassted at how chatty my system was. Just constantly being presented with requests to the point that made it impossible to work. I loved learning how prevelant E.T. phoned home.<p>But then as I was just constantly inundated with those requests, I hated having to constantly deal with it. Now it&#x27;s time to whitelist&#x2F;authorize&#x2F;etc. But do I really want to blanket OK something just because I&#x27;m annoyed? What does one do to stay sane and safe?<p>&lt;disables Little Snitch&gt; securely places head back in sand<p>Little Snitch is the single program to illustrate all of the scary websites&#x2F;blogs&#x2F;etc of how shitty companies are about their &quot;free&quot; software and other shenanigans that devs play and from some &quot;legit&quot; companies.<p>I love Little Snitch and I hate Little Snitch, and it&#x27;s not their fault.
评论 #31881045 未加载
评论 #31882488 未加载
egberts1almost 3 years ago
Until Linux duplicates that BSD tagging of inbound packets to process ID, no Linux-derivative LittleSnitch is going to match macOS&#x2F;BSD-variant LittleSnitch’s capability set of detecting WHICH application having received a network packet.<p>Given the above, sandboxing with namespace nftable is still required for ultimate inbound security (I am looking at you, systemd).
评论 #31880253 未加载
评论 #31880630 未加载
评论 #31880271 未加载
评论 #31879908 未加载
jwilkalmost 3 years ago
Previous discussions:<p>2017: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14245270" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14245270</a> (103 comments)<p>2020: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22206116" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22206116</a> (131 comments)
dark-staralmost 3 years ago
What exactly is the use case of such an application firewall?<p>I mean I get what it is supposed to do, but if I already have a means of blocking certain spam&#x2F;telemetry URLs that I don&#x27;t want (via etc&#x2F;hosts, or PiHole), is there any <i>real</i> benefit of using an application firewall on top?<p>As others have said, micro-managing all these connections is not really feasible in most cases. And if I have a domain I don&#x27;t trust, I can just globally block that.<p>What are some real-world use-case scenarios of a domain that I want to block for one application, but not generally for all applications? It sounds cool in theory to be able to fine-tune all that on an application basis, but is this actually useful&#x2F;sensible in practice?
评论 #31882499 未加载
nathantsalmost 3 years ago
this is a really great project.<p>if you haven’t heard of libnetfilterqueue, this is what it’s for. it’s really good. tremendous thanks to the author for introducing me to it via this project.<p>the main problem with libnetfilterqueue is that it doesn’t have pid information. you have to look that up in &#x2F;proc or via a hashmap maintained by ebpf. either method has issues.<p>an unexplored alternative, afaik, is seccomp with userspace filtering[1]. then you get pid information and direct control of syscalls. this may still need to be paired with libnetfilterqueue depending on implementation.<p>1. <a href="https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;756233&#x2F;" rel="nofollow">https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;756233&#x2F;</a>
throwawaynfwalmost 3 years ago
Anyone aware of userspace application firewalls that be run for a process from cli? No requiring system level configs&#x2F;packages or root privileges.<p>Something like this:<p><pre><code> app_firewall --block all --allow www.google.com .&#x2F;my_untrusted_application </code></pre> Or like this:<p><pre><code> app_firewall --rules my_employer_network.conf .&#x2F;untrusted_employer_application </code></pre> Then you can do cool stuff like:<p><pre><code> app_firewall --block microsoft.com qemu my_dirty_windows_virtual_machine.qcow</code></pre>
评论 #31884809 未加载
squarefootalmost 3 years ago
How does it compare to Bubblewrap? I tried it to test Windows software that I don&#x27;t trust under WINE and it worked, but a few times the sandboxed program wouldn&#x27;t work although it would when run under a non networked machine, so I thought the sandboxing was also affecting Unix sockets, that is, IPC.<p>Command used was: &quot;bwrap --bind &#x2F; &#x2F; --dev &#x2F;dev --unshare-net -- exe_name&quot;
评论 #31885573 未加载
metadatalmost 3 years ago
This looks great, but is there a TUI or headless mode?<p>I don&#x27;t really like GUIs in my Linux, setting up VNC is such a pain.
评论 #31877441 未加载
评论 #31878574 未加载
评论 #31878005 未加载
lapseralmost 3 years ago
There is also eBPFSnitch, though it hasn&#x27;t been updated in a while. It uses eBPF for packet filtering.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;harporoeder&#x2F;ebpfsnitch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;harporoeder&#x2F;ebpfsnitch</a>
评论 #31879190 未加载
beermonsteralmost 3 years ago
Also see <a href="https:&#x2F;&#x2F;objective-see.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;objective-see.org&#x2F;</a> and their LuLu tool if you&#x27;re on MacOS.
评论 #31882773 未加载
throwawei369almost 3 years ago
So Wireshark but with connection permission toggles... Why does anyone need this on Linux? You can already block domains you know are malicious in the hosts file or use a personalized DNS resolver for that. Or am I missing something?
评论 #31880740 未加载
a-dubalmost 3 years ago
i want a cable modem + oss router&#x2F;outbound firewall&#x2F;egress logger all in one device. does such a thing exist?
评论 #31878460 未加载
评论 #31878117 未加载
评论 #31877985 未加载
评论 #31879150 未加载
Elyraalmost 3 years ago
Unfortunately without sandboxing, these sorts of tools just add an extra layer of maintenance to your system for a false sense of security [1, 2].<p>This can actually be harmful for less experienced Linux users who may trust something like this to keep them safe for running random scripts, especially since I see this tool often recommended for such a use case.<p>[1] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22208223" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22208223</a><p>[2] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14254679" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14254679</a>
评论 #31877838 未加载
评论 #31878728 未加载
评论 #31877763 未加载