Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Linux does do that, and has since the Kernel 2.2 or so; In fact, opensnitch is a user mode process thanks to Linux allowing that, whereas windows needed drivers last I checked (win 2000 days, but the network driver model was still the same for win 7 and even later iirc)


I never knew about that, thanks. I always believed one had to either resort to address/packet filtering at machine level or limit access to networking to a certain uid/gid, then running the software under those credentials. But that would defeat the purpose of allowing access while being warned about that, so that for example one could check if an application is really phoning home for innocuous updates or connecting to some shady addresses for unknown purposes.


Windows Filtering Platform also has a user mode component.


That's good to know.

Can it divert, modify and delay packets? Or just have a set of rules for go/no-go?


Not sure, as I never used it. The filter engine runs in user space and several behaviors can be implemented as COM instances.

https://docs.microsoft.com/en-us/windows/win32/fwp/windows-f...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: