-
-
Notifications
You must be signed in to change notification settings - Fork 152
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Firewall may be shouldn't block all TCP and UDP conns #26
Comments
Case in point?
|
#65 does something as crude. |
by default safely exclude
To not break things by default broadcast and multicast & mdns? |
It would be good if apps could be individually granted LAN access, instead of it just being a global switch like NetGuard does. |
That's an interesting suggestion. So, a global / universal rule like And then, per individual app, you'd trust / allow LAN IP subnets? |
I don't see much of a point in allowing only specific subnets. I think it should be an ON/OFF switch, per app |
Gotcha. Shouldn't be too hard to implement it. Let's see: #801 |
KDE Connect also doesn't work right now without excluding it from Rethink (or pausing/stopping Rethink completely), because of the multicast/broadcast issue - it can't find or communicate with its counterpart on the desktop machine. Regarding mDNS specifically, there are actually several different issues that could keep it from working, only one of which seems to have anything to do with this. mDNS notes
|
In Re: mDNS: Thanks. That's a lot of information. I don't think I have quite enough expertise to make incoming multicast probes work, but we'll see. |
Implemented. For a power-user use-case, see: Feel free to reopen in case something's wrong. |
rethink-app/app/src/main/java/com/celzero/bravedns/service/BraveVPNService.kt Lines 1911 to 1926 in 66f2970
rethink-app/app/src/main/java/com/celzero/bravedns/service/BraveVPNService.kt Lines 1948 to 1957 in 66f2970
|
I just tried that setting, and it does seem to let KDE Connect see my computer. (Even if the app is set to be blocked - which makes sense, given the option's description, but for now I think I'll keep using the 'exclude' workaround instead, so I can still block other apps from seeing the LAN.)
When you say 'incoming multicast probes', are you referring to other computers asking for the IP address of What I was referring to is: Normally, when (a new enough version of) Android is trying to resolve the domain Currently I just have the few Footnotes
|
Thanks for confirming that KDE Connect works.
If all Rethink has to do is forward
Neat. We intend to implement this someday... #316 |
(Note: take everything I post with a grain of salt, and check the actual specifications. I am not an expert on this stuff by any means.)
Not sure where that list came from. As far as I know, Besides If a domain does need to use mDNS, there are basically two ways to do it:
For IPv6, the equivalent address is [FF02::FB]:5353. (The spec actually reserves FF0X::FB where X is 1 through F, but it looks like only FF02::FB is currently used.)
I may have misunderstood, but it sounded to me like this issue was keeping (among other things) packets that were targeted to multicast addresses from making it out of Rethink's 10.111.222.* net and into the real 192.168.1.* (or whatever) net. What I was describing with that Termux command was actually separate from the "can Android (or Rethink) resolve mDNS Footnotes
|
Thanks a lot for the links and references. Appreciate it.
These are easy to implement. I'll take a stab at it for landing it in
Gotcha. This pdnsf, btw, only traps UDP connections sent to its DNS endpoint (it leaks DNS over TCP For Rethink, I can see why connections over multicast / reserved IPs may not work. Btw, Rethink |
Thanks for the pointers. We've implemented one-shot mdns for Hopefully, it works. |
The firewall mode shouldn't block localhost TCP and UDP.
May be it also shouldn't block connections on the private IPv4 (v6 isn't supported) space? May be it should.
Interestingly, some folks want to block all LAN traffic. So, that should be an option too?
Discuss.
The text was updated successfully, but these errors were encountered: