Skip to content

[Feature Request] Option to ignore (allow) loopback traffic #965

@WinterSnowfall

Description

@WinterSnowfall

Summary:

Problem:

A lot of applications will depend on loopback traffic being unhindered and other firewalls, such as ufw for example, will not filter loopback traffic at all by default.

Background:

I've recently started using opensnitch and have noticed various applications would either time out after long intervals or hang completely if loopback traffic was blocked. This also happened with mate-session (I use MATE as my desktop environment).

I came across this wiki page: https://github.com/evilsocket/opensnitch/wiki/Known-problems#general , which was helpful. However, the provided fix is only partial. Besides IPv4 loopback, some applications (as is the case of mate-session, apparently) will depend on IPv6 loopback being unfiltered (ergo ::1/128) in order to behave properly.

Suggestion:

While I have a background in networking and was able to figure it out, the default behavior can arguably be quite confusing to regular users. Loopback traffic is not usually considered a security risk, nor should it be hindered unless otherwise specified (if a user insists).

I suggest having a global config option for enabling loopback traffic filtering and to leave it disabled/off by default, since most users will have no interest to act on loopback traffic.

Switching the default action to allow traffic when the UI is not connected (as suggested in the Wiki article linked above) is not a good solution IMHO, since security-conscious users would want to whitelist traffic themselves and make sure nothing gets through otherwise.

Metadata

Metadata

Assignees

No one assigned

    Labels

    featurea whole new feature

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions