- Sponsor
-
Notifications
You must be signed in to change notification settings - Fork 541
Comparing changes
Open a pull request
base repository: evilsocket/opensnitch
base: v1.4.0
head repository: evilsocket/opensnitch
compare: v1.5.0-rc.1
Commits on Sep 10, 2021
-
Configuration menu - View commit details
-
Copy full SHA for 9ccb649 - Browse repository at this point
Copy the full SHA 9ccb649View commit details
Commits on Sep 12, 2021
-
When blocking a connection via libnetfilter-queue using NF_DROP the connection is discarded. If the blocked connection is a DNS query, the app that initiated it will wait until it times out, which is ~30s. This behaviour can for example cause slowdowns loading web pages: #481 This change adds the option to reject connections by killing the socket that initiated them. Denying: $ time telnet 1.1.1.1 22 Trying 1.1.1.1... telnet: Unable to connect to remote host: Connection timed out real 2m10,039s Rejecting: $ time telnet 1.1.1.1 22 Trying 1.1.1.1... telnet: Unable to connect to remote host: Software caused connection abort real 0m0,005s
Configuration menu - View commit details
-
Copy full SHA for 8d3540f - Browse repository at this point
Copy the full SHA 8d3540fView commit details
Commits on Sep 13, 2021
-
Configuration menu - View commit details
-
Copy full SHA for c66d5d6 - Browse repository at this point
Copy the full SHA c66d5d6View commit details
Commits on Sep 15, 2021
-
Configuration menu - View commit details
-
Copy full SHA for 0776c1b - Browse repository at this point
Copy the full SHA 0776c1bView commit details -
1
Configuration menu - View commit details
-
Copy full SHA for 35975bc - Browse repository at this point
Copy the full SHA 35975bcView commit details -
Merge pull request #505 from themighty1/patch-1
github.com/golang/protobuf deprecated
Configuration menu - View commit details
-
Copy full SHA for 408ce3f - Browse repository at this point
Copy the full SHA 408ce3fView commit details -
Merge pull request #506 from themighty1/patch-2
need to generate go.sum otherwise we get errors
Configuration menu - View commit details
-
Copy full SHA for 2d26865 - Browse repository at this point
Copy the full SHA 2d26865View commit details -
Configuration menu - View commit details
-
Copy full SHA for 500b7c7 - Browse repository at this point
Copy the full SHA 500b7c7View commit details
Commits on Sep 17, 2021
-
rules: added more lists types to block/allow
- Added lists of IPs and network ranges. One per line. Blank lines or lines that start with # are ignored. - Added lists of domains with regular expressions. One per line. Blank lines or lines that start with # are ignored. Until now you could use regular expressions with the fields "To this host" or "To this IP", to match multiple domains or IPs. But if you wanted to use more than 2-3 domains or IPs it was not really user friendly. Hopefully we'll be a little more versatile to cover use cases like #461 and #485.
Configuration menu - View commit details
-
Copy full SHA for 3b6c041 - Browse repository at this point
Copy the full SHA 3b6c041View commit details
Commits on Sep 19, 2021
-
don't overwrite rules if they already exist.
Don't overwrite rules when adding or editing rules, to avoid losing already added rules. closes #512
Configuration menu - View commit details
-
Copy full SHA for c97a01d - Browse repository at this point
Copy the full SHA c97a01dView commit details -
don't overwrite rules if they already exist (2/2)
Don't overwrite rules when adding or editing rules, to avoid losing already added rules. - When adding a rule, check if there's already a rule with the same name. - After adding a new rule, enter into EDIT mode, to allow changes to the rule without closing the dialog. - If the user changes the name after adding a rule, check if there's a rule with the same name. - When editing a rule and the user changes the name, check if there's a rule with the same name. issue #512
Configuration menu - View commit details
-
Copy full SHA for 2c1acdb - Browse repository at this point
Copy the full SHA 2c1acdbView commit details
Commits on Sep 22, 2021
-
Allow to intercept more kernel connections (#513)
* Allow to intercept some kernel connections Some connections are initiated from kernel space, like WireGuard VPNs (#454), NFS or SMB connections (#502) and ip tunnels (#500). Note: This feature is complete for x86_64, WIP for aarch64, and not supported for armhf and i386 #513 (comment) More information regarding this change: #493
Configuration menu - View commit details
-
Copy full SHA for 0526b84 - Browse repository at this point
Copy the full SHA 0526b84View commit details
Commits on Sep 25, 2021
-
ui: allow to filter connections by PID
This change allows to filter connections by PID. Others have referred to this feature as "filter connections for this instance/session" or similar, so maybe a better wording is needed. Open a new discussion or send a PR if you have a better sentence that describe this option please.
Configuration menu - View commit details
-
Copy full SHA for 4ea0904 - Browse repository at this point
Copy the full SHA 4ea0904View commit details
Commits on Oct 5, 2021
-
ui, tests: added rules editor tests
to run them: pytest tests/ They dould be integrated with a github action.
Configuration menu - View commit details
-
Copy full SHA for ff99b39 - Browse repository at this point
Copy the full SHA ff99b39View commit details
Commits on Oct 6, 2021
-
Configuration menu - View commit details
-
Copy full SHA for 655f1eb - Browse repository at this point
Copy the full SHA 655f1ebView commit details -
Configuration menu - View commit details
-
Copy full SHA for 67afb5b - Browse repository at this point
Copy the full SHA 67afb5bView commit details -
Configuration menu - View commit details
-
Copy full SHA for eb51840 - Browse repository at this point
Copy the full SHA eb51840View commit details -
Configuration menu - View commit details
-
Copy full SHA for 3af6a11 - Browse repository at this point
Copy the full SHA 3af6a11View commit details -
Configuration menu - View commit details
-
Copy full SHA for fd40feb - Browse repository at this point
Copy the full SHA fd40febView commit details
Commits on Oct 8, 2021
-
ui: fixed crash when displaying the GUI
On Fedora 34, without the appindicator extension installed, when the GUI was displayed it crashed with the following error: TypeError: index 0 has type 'float' but 'int' is expected. related: #526
Configuration menu - View commit details
-
Copy full SHA for 9ef64da - Browse repository at this point
Copy the full SHA 9ef64daView commit details
Commits on Oct 19, 2021
-
Configuration menu - View commit details
-
Copy full SHA for e8dd174 - Browse repository at this point
Copy the full SHA e8dd174View commit details
Commits on Oct 25, 2021
-
ui, tests: added Preferences dialog tests
TODO: test db configuration changes. There're problems clicking on the QMessageBox.
Configuration menu - View commit details
-
Copy full SHA for c609b09 - Browse repository at this point
Copy the full SHA c609b09View commit details
Commits on Oct 28, 2021
-
ui: fixed GUI loading when DE autologin is on
Fixed GUI loading behaviour when DE's autologin is on. Background: Sometimes the system tray is not available, so our app's icon does not show up. In this case we show the GUI to allow the user manage the rules and view connections. If the user activated the autologin option, on KDE (and probably others) our service was launched before the panel was ready, so the system tray was not available yet and we were showing the Events window. Changes: - Delay 10s the check to see if the system tray is available, to give it time to load. - Add X-KDE-Autostart-after=panel to kcm_opensnitch.desktop, to launch the GUI only after the panel is loaded. - Misc: removed OpenSnitch entry from System Settings on KDE, and update the categories where the app is shown in the menus. Closes #535
Configuration menu - View commit details
-
Copy full SHA for 9d0c5a1 - Browse repository at this point
Copy the full SHA 9d0c5a1View commit details
Commits on Nov 4, 2021
-
set prompt width and height after initial display; set prompt minimum…
… and maximum size using initial width and height values
Configuration menu - View commit details
-
Copy full SHA for c3039dd - Browse repository at this point
Copy the full SHA c3039ddView commit details -
Merge pull request #540 from ryanolton/master
Prompt UI height and width fixes
Configuration menu - View commit details
-
Copy full SHA for 689c83f - Browse repository at this point
Copy the full SHA 689c83fView commit details
Commits on Nov 12, 2021
-
rules: don't load rules that fail to compile
Be sure that we don't load invalid regexp rules. related: #536
Configuration menu - View commit details
-
Copy full SHA for 743ef71 - Browse repository at this point
Copy the full SHA 743ef71View commit details
Commits on Nov 15, 2021
-
Under certain conditions, when we dumped inodes via netlink, we were linking network connections to wrong applications. - To improve this situation: 1) Use netfilter's UID by default: Sometimes the UID reported via netlink was different than the one reported by libnetfilter. libnetfilter UID is always correct. If you had a rule that filtered by UID, this problem could cause to prompt you again to allow the connection. 2) Use the netlink entry that matches exactly the properties of an outgoing connection: There're some in-kernel sockets that doesn't match 1:1 outgoing connections (daemon/netlink/socket.go#L22). In order to identify the applications that initiate these network connections we use a workaround. But under certain conditions (source port reuse), we were associating connections to wrong applications. So in order to avoid this problem, if there's a 1:1 match use that netlink entry. If not, fallback to the workaround. - misc: added more logs to better debug these issues.
Configuration menu - View commit details
-
Copy full SHA for 479b8de - Browse repository at this point
Copy the full SHA 479b8deView commit details
There are no files selected for viewing