-
-
Notifications
You must be signed in to change notification settings - Fork 601
Description
Summary:
Problem:
A lot of applications will depend on loopback traffic being unhindered and other firewalls, such as ufw for example, will not filter loopback traffic at all by default.
Background:
I've recently started using opensnitch and have noticed various applications would either time out after long intervals or hang completely if loopback traffic was blocked. This also happened with mate-session (I use MATE as my desktop environment).
I came across this wiki page: https://github.com/evilsocket/opensnitch/wiki/Known-problems#general , which was helpful. However, the provided fix is only partial. Besides IPv4 loopback, some applications (as is the case of mate-session, apparently) will depend on IPv6 loopback being unfiltered (ergo ::1/128) in order to behave properly.
Suggestion:
While I have a background in networking and was able to figure it out, the default behavior can arguably be quite confusing to regular users. Loopback traffic is not usually considered a security risk, nor should it be hindered unless otherwise specified (if a user insists).
I suggest having a global config option for enabling loopback traffic filtering and to leave it disabled/off by default, since most users will have no interest to act on loopback traffic.
Switching the default action to allow traffic when the UI is not connected (as suggested in the Wiki article linked above) is not a good solution IMHO, since security-conscious users would want to whitelist traffic themselves and make sure nothing gets through otherwise.