You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: implement comprehensive TCP jailing for macOS
Extended the comprehensive TCP jailing approach to macOS using PF rules.
Replaced port-specific rules (80, 443) with comprehensive TCP interception
to prevent bypass via non-standard ports.
## macOS Security Improvements
- **Before**: Only HTTP (80) and HTTPS (443) intercepted
- **After**: ALL TCP traffic from jailed group intercepted
## Key Changes
- Removed port-specific PF rules (port 80, port 443)
- Added comprehensive TCP redirection for all ports
- Routes ALL TCP traffic to HTTPS proxy port
- Prevents bypass via database ports, SSH, custom APIs, etc.
## Bypass Prevention (macOS)
Applications can no longer escape jail by using:
- HTTP on non-standard ports (8080, 3000, etc.)
- Database connections (3306, 5432, 27017)
- SSH connections (22)
- Custom API ports
- Any TCP-based protocol on any port
This ensures both Linux and macOS provide identical comprehensive
network jailing capabilities.
Tested: Build succeeds, all tests pass.
Co-authored-by: f0ssel <[email protected]>
0 commit comments