OPENSNITCHD(1) | General Commands Manual | OPENSNITCHD(1) |
opensnitchd - GNU/Linux interactive firewall application
opensnitchd |
[-rules-path path] [-cpu-profile path] [-debug] [-error] [-warning] [-important] [-log-file path]... [-mem-profile path]... [-no-live-reload] [-process-monitor-method name]... [-queue-num num]... [-ui-socket path]... [-version] [-workers num]... |
opensnitchd is the OpenSnitch agent that intercepts outbound connections, and send them to the server. The server can be a GUI, a TUI, or a headless component to just log the network activity (a SIEM for example). By default it'll allow all connections, creating temporal rules for you so you can review them later.
/etc/opensnitchd/rules/
OpenSnitch needs at least one firewall rule to intercept outbound connections:
iptables -t mangle -L OUTPUT | grep NFQUEUE
If you suspect that OpenSnitch blocks an application and doesn't prompt you to allow or deny it, using the GUI enable the option [x] Debug invalid connections under Preferences -> Nodes. Or set the configuration option InterceptUnknown to true.
Tip: You can also add rules to the file /etc/opensnitchd/system-fw.json, to allow network services without being intercepted by the daemon.
Another way of debugging errors is by launching the daemon from the command line:
Problems with opensnitchd should be reported on github https://github.com/evilsocket/opensnitch/issues https://github.com/evilsocket/opensnitch/issues
OpenSnitch was originally written by Simone Margaritelli (evilsocket) in 2017-2018.
In 2019, after some time of inactivity, Gustavo Iñiguez Goya started contributing, fixing bugs and adding new functionality, with the esential help of the community, and valuable contributions from themighty1 and calesanz among others.
The complete list of OpenSnitch contributors can be found on https://github.com/evilsocket/opensnitch
2023-02-12 | opensnitchd 1.5.6 |