Linux Application Firewall (LAF) is an application firewall for Linux. It allows users full control over which applications are allowed to communicate over the network.
- Subgraph Firwall(Proc Method)
- OpenSnitch (Proc Method)
- Douaneapp (Kernel Module)
- Linux Application Firewall (Kernel Module)
- Lavender Firewall (Proc Method)
- Leopard Flower (Proc Method)
- TuxGaurdian (Kernel Module)
- Program Guard (Kernel Module)
- FireFlier
- afirewall - Development, Stalled 2 years. (Proc Method)
- AppArmor - Specific Networking Option
- SE Linux
- RSBAC provides a network template
- iptables with group matching ArchForum
- DisableNetwork document listing possibilities.
- Vuurmuur Firewall
- P alcanfw - Perl script.
- Maillist Talk about Hone and snet
- snet linux security module.
- HoneProject Monitoring connections and mapping to PID.
- Tomoyo inet options.
- caitsith Access restriction module.
- libseccomp Syscall filtering lib.
- kernsec
LAF requires libnetfilter-queue, it's dependency libnfnetlink and a kernel 2.6.14 or later.
sudo apt-get install libnfnetlink-dev libnetfilter-queue-dev
Build using meson
meson build
ninja -C build
Run clang static analyser:
sudo apt install clang-tools # To install clangs scan-build.
ninja -C build scan-build
Create an iptables rule:
sudo iptables -A OUTPUT -p all -j NFQUEUE --queue-num 0
Add entries to the whitelist.txt file as follows:
<destination_ip> <port>
<destination_ip> <port>
*
can be used for either as an allow all.
If you are a C or a Python developer you can help us improve LAF. Feel free to take a look at the bug tracker for some tasks to do.
LAF is licensed under GPLv3 license. See LICENSE for more information.