New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Firewall: support protocl selection in rules #447

Closed
marmarek opened this Issue Mar 8, 2015 · 2 comments

Comments

Projects
None yet
2 participants
@marmarek
Member

marmarek commented Mar 8, 2015

Reported by joanna on 24 Feb 2012 09:43 UTC
Currently all the rules are per-IP and they only result in TCP traffic rules being added, but not UDP rules. Solutions:

  1. Allow to set level 4 protocol (TCP, UDP, etc) for each rule
  2. Keep it simple, stupid: allow only to set rules for IP(s), and always assume all the protocols and all the ports.

Migrated-From: https://wiki.qubes-os.org/ticket/447

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 8, 2015

Member

Comment by marmarek on 27 Feb 2012 01:05 UTC
I vote for 1.
Core side: http://git.qubes-os.org/gitweb/?p=marmarek/core.git;a=commit;h=0ca08d48b8feaae9058865802c447b5b75ea66e1

TODO: GUI (qubes-manager)

Member

marmarek commented Mar 8, 2015

Comment by marmarek on 27 Feb 2012 01:05 UTC
I vote for 1.
Core side: http://git.qubes-os.org/gitweb/?p=marmarek/core.git;a=commit;h=0ca08d48b8feaae9058865802c447b5b75ea66e1

TODO: GUI (qubes-manager)

@marmarek marmarek assigned marmarek and unassigned rootkovska Mar 8, 2015

@marmarek

This comment has been minimized.

Show comment
Hide comment

@marmarek marmarek closed this Mar 8, 2015

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment