OpenSnitch, The application-level firewall for Linux has been updated to version 1.3.0, which adds the process details dialog box, RPM GUI software package, etc.
Opensnitch will monitor the outbound connections that your application is trying to establish and block or allow its connection based on a set of rules (when no existing rules are found, the system will prompt the user to allow or deny access). The application was inspired by Little Snitch, a host-based commercial application firewall for macOS. It consists of a daemon written in Go and a PyQt5 GUI.
The original OpenSnitch developer Mentioned As early as June 2019, they are no longer engaged in this procedure, so the project is Bifurcation (I wrote it here).But recently, fork developer Gustavo Iñiguez Goia seems to have taken control main The OpenSnitch GitHub repository, where the latest 1.3.0 version was released.
But back to OpenSnitch 1.3.0. The biggest new feature in this version is the addition of the “Process Details” dialog box. It displays process status (used memory, PID, etc.), opened files, I/O statistics, mapped memory files, stack and environment variables.
This file can be accessed by going to the “Applications” tab, double-clicking an item (in the “Content” column), and finally clicking the computer icon on the left side of the executable path:
You might also like: 3 ways to install Tor browser on Linux (Ubuntu, Fedora, openSUSE, etc.)
In addition, in this version, there is also an OpenSnitch GUI RPM package available for download. Previously, only the OpenSnitch daemon was packaged as RPM. Therefore, OpenSnitch is easy to install on RPM-based Linux distributions, such as Fedora, openSUSE, CentOS, etc.
Other changes in OpenSnitch 3.0:
- Allow to add System rules. Now you can configure iptables rules by editing the file /etc/opensnitchd/system-fw.json. OpenSnitch will ensure that the rules you configure there will not be deleted from the system
- Allow to filter connections by target network
- Daemon: fixed ftrace and auditd monitoring methods
- Daemon: Fixed an error when IPv6/IPv6 processing is not enabled in the system
- Daemon: Improved application rule checking
- ui: If a valid icon theme is not configured, return to Qt built-in icons
- ui: fixed compatibility with python3.9
Before using OpenSnitch, be sure to note that the app has a disclaimer on its GitHub project page, which says: “This software is under development. Don’t expect it to be bug-free, and don’t rely on any type of software. It’s safe.” You might also like: How to encrypt a USB drive with VeraCrypt (compatible with Windows, macOS and Linux) This is how OpenSnitch works. Make the OpenSnitch daemon run in the background and run the OpenSnitch tray UI. When the application tries to access the Internet, a dialog box prompt will be displayed asking you whether you want to allow or deny the connection from this process (or port, etc.). , In seconds/minute, or the duration of the session. This dialog box contains the following information such as application name, domain name/IP trying to connect, port, source IP, destination IP and port, user ID and process ID. The tray icon allows access to OpenSnitch statistics. In the “Statistics” dialog box, you can change OpenSnitch preferences, view and edit application rules, etc.
The OpenSnitch release page has DEB (Debian, Ubuntu, Linux Mint, Pop!_OS, etc.) and RPM (Fedora, CentOS, openSUSE, etc.) binaries for the daemon and GUI. If you want to use them on the desktop, please install them at the same time.
Gnome Shell users will need something like Ubuntu AppIndicators Extension (installed on Ubuntu by default) to be able to access the OpenSnitch tray icon.