this post was submitted on 27 Sep 2024
85 points (96.7% liked)

Linux

48287 readers
613 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Hey there folks,

I'm trying to figure out how to configure my UFW, and I'm just not sure where to start. What can I do to see the intetnet traffic from individual apps so I can know what I might want to block? This is just my personal computer and I'm a total newbie to configuring firewalls so I'm just not sure how to go about it. Most online guides seem to assume one already knows what they want to block but I don't even know how/where to monitor local traffic to figure out what I can/should consider blocking.

you are viewing a single comment's thread
view the rest of the comments
[–] ReversalHatchery@beehaw.org 1 points 1 month ago (5 children)

I don't have a firewall on my desktop or laptop

you are brave to use your laptop that way. or is it used as a stationary device?

but yes it is useful at home if you live with people who you don't trust to be managing their computer safely

[–] drkt@lemmy.dbzer0.com 1 points 1 month ago (4 children)

you are brave to use your laptop that way

why? I don't connect it to untrusted networks

[–] ReversalHatchery@beehaw.org 2 points 1 month ago (3 children)

run sudo ss -tulpn, and have a look at the processes and their privileges listening for incoming connections. If one of them has a vulnerability, through which a third party can make that software do things it was not intended for.. that's pretty bad.
This can most easily happen with software whose developers are underresouced/careless/stubborn.

A recent case of that happening: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
Tl;Dr, remote code execution vulnerability in software that most often runs as root, automatically.

[–] drkt@lemmy.dbzer0.com 1 points 1 month ago

I understand your point but I reiterate that I don't connect to unsafe networks. If someone has remote code execution on a device on my side of the network then they are also inside my apartment and I'd be more worried about that.

load more comments (2 replies)
load more comments (2 replies)
load more comments (2 replies)