A desktop application firewall for Subgraph OS.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
Go to file
shw 8546f6c416
Working (but not intensively tested) IPv6 support!
7 years ago
Godeps Added toml dependency... 8 years ago
fw-ozcli Added ephemeral oz sandbox/fw-daemon rules that can be updated via IPC connection. 7 years ago
fw-prompt Very noisy, experimental support for asynchronous multi-rule firewall prompting. 7 years ago
fw-settings Full support for multiple protocol types (UDP, ICMP). 7 years ago
gnome-shell/firewall@subgraph.com Very noisy, experimental support for asynchronous multi-rule firewall prompting. 7 years ago
nfqueue Very dirty/experimental replacement of nfqueue with native github.com/subgraph/go-nfnetlink package. 7 years ago
proc-coroner Introduced per-process DNS cache segregation for all A records not returned by local resolver. 7 years ago
sgfw Working (but not intensively tested) IPv6 support! 7 years ago
sources Added requisite Dbus code so that fw-settings automatically refreshes its rulelist on fw-daemon update. 7 years ago
vendor Working (but not intensively tested) IPv6 support! 7 years ago
.gitignore ... 8 years ago
LICENSE Add license, closes #17 8 years ago
README-DEV.txt Full support for multiple protocol types (UDP, ICMP). 7 years ago
README.md Fixed typos in readme... 7 years ago
README.testing Readme for testing fw-daemon with bridged traffic. 7 years ago
main.go moved main... 8 years ago

README.md

Subgraph Firewall

A desktop application firewall for Subgraph OS.

Subgraph Firewall is an application firewall that is included in Subgraph OS. While most firewalls are designed to handle incoming network communications, an application firewall can handle outgoing network communications. Subgraph Firewall can apply policies to outgoing connections on a per-application basis.

Application firewalls are useful for monitoring unexpected connections from applications. For example, some applications may phone home to the vendor's website. Often this activity is legitimate (non-malicious) but it still may violate the user's privacy or expectations of how the software operates. Subgraph Firewall gives users the choice to allow or deny these connections.

Malicious code may also phone home to a website or server that is operated by the hacker or malicious code author. Subgraph Firewall can also alert the user of these connections so that they can be denied.

Application firewalls cannot prevent all malicious code from connecting to the Internet. Sophisticated malicious code can subvert the allowed connections to bypass the firewall. However, the firewall may alert the user of connection attempts by less sophisticated malicious code.

Read more in the Subgraph OS Handbook.

Building

# To build the Debian package:
git clone -b debian https://github.com/subgraph/fw-daemon.git
cd fw-daemon
## To build from stable
gbp buildpackage -us -uc
## To build from head
gbp buildpackage -us -uc --git-upstream-tree=master
## Install the package
dpkg -i /tmp/build-area/fw-daemon{,-gnome}-*.deb
## Refresh your gnome-shell session 'alt-r' type 'r' hit enter.