Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Filter forwarded traffic #1175

Open
ciandonovan opened this issue Aug 16, 2024 · 2 comments
Open

[Feature Request] Filter forwarded traffic #1175

ciandonovan opened this issue Aug 16, 2024 · 2 comments
Labels
feature a whole new feature

Comments

@ciandonovan
Copy link

Summary:

OpenSnitch works quite well testing host-based firewalls. I currently have setup where opensnitchd runs on the client device, and opensnitch-ui is run on the "router".

However, it would be useful to just run both opensnitchd and opensnitch-ui on the router, and have it filter the traffic of multiple client device on a LAN with the same ruleset.

Would this be out of scope for the project?

@ciandonovan ciandonovan added the feature a whole new feature label Aug 16, 2024
@gustavo-iniguez-goya
Copy link
Collaborator

hi @ciandonovan ,

You can configure opensnitch to intercept forwarded traffic by enabling this fw rule:

"Name": "forward",

But I'm not sure if I understand the use case. If the daemon is running on different machines, it'll intercept the outbound connections, and send all the requests/nework activity to the GUI ("router").

If the daemon is running on the router, then yes, you would have to enable the fw rule to intercept the forwarded traffic (we have a limitation there if I'm remember correctly).

If the machines where the daemon is running have containers (k8s, docker), then you would also have to enable the fw rule to intercept the forwarded traffic from the containers to the host (it's not perfect but it works).

@ciandonovan
Copy link
Author

The forward configuration you provided solves that use-case. I'm guessing that option is not exposed in the GUI?

I was shoehorning OpenSnitch into testing a domain - whitelist ruleset for an enterprise deployment. Worked well enough, except OpenSnitch does "reverse-DNS" through caching DNS query responses and local resolver integration (I think), which doesn't catch everything.

Couldn't find any proper solution on Linux surprisingly, and have since moved to OpnSense which is more suited to my particular use-case. Its method is to take a list of domain aliases, and simply re-query them every 5 minutes or so, and cache all the A/AAAA records to be used in the firewall rulesets.

Still a big fan of OpenSnitch, runs on my personal machine :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature a whole new feature
Projects
None yet
Development

No branches or pull requests

2 participants