How to discriminate between connexions that are using a common "proxy" (Python) to reach internet? #612
-
OpenSnitch is an "application firewall" but it fails in front of something like Python that is used by MANY applications to connect to the internet. It is therefore impossible to discriminate between those calls that are all made through /usr/bin/pythonx.x. Examples are Lutris, Bottles, Deluge, even the PPA system uses Python to connect to launchpad.net. Anyway, what to do in this situation? My list of rules for Python is growing by the day and they are filtered against hosts. Of course, I can't use Deluge because of that without whitelist the whole Python process. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Hi @Ileca , I usually filter by that way you only allow or deny that script or command in particular. Otherwise you'd allow everything that uses python3. |
Beta Was this translation helpful? Give feedback.
Hi @Ileca ,
I usually filter by
command line
instead of only theprocess path
, for example:that way you only allow or deny that script or command in particular. Otherwise you'd allow everything that uses python3.