Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hope to add a port blocking feature #242

Open
EsuRt opened this issue May 5, 2024 · 3 comments
Open

Hope to add a port blocking feature #242

EsuRt opened this issue May 5, 2024 · 3 comments

Comments

@EsuRt
Copy link

EsuRt commented May 5, 2024

Sometimes we block software from accessing specific ports, but can’t block all ports. However, the current fort cannot achieve this purpose. We hope it can be enhanced.

@tnodir tnodir mentioned this issue May 30, 2024
@hiccup7
Copy link

hiccup7 commented Jul 13, 2024

For some applications, I would like to allow port 53 for DNS on UDP protocol, but block all other UDP ports. I am waiting for fort to have this capability before I install fort.

@graham00
Copy link

graham00 commented Sep 10, 2024

One real annoyance with Windows is that a lot of network traffic ends up showing up as "NT Kernel & System" (ping.exe traffic, for example, and a lot of other traffic). If we could add port/protocol based rules (even globally, not linked to a specific application profile) then we could for instance globally allow things that aren't really major security concerns like ICMP, DNS, etc.

Without that, the only option as far as I can tell using Fort is to whitelist "NT Kernel & System". The problem with that is that it then opens up god knows what else to escape out via that broad exemption.

If I'm misunderstanding something let me know, but I just thought it might be good to highlight the security importance of this feature. Fort seems to be so close to perfect (open source, great regex wildcard path options, portability, etc) and as far as I can tell, it's only the ability to add (even if only global) traffic rules based on ports and protocols that would let it work as a perfect solution to harden workstation security.

This project is far outside my experience, but if I can find the time I'll try to dive in and see if I can manage something.

@tnodir
Copy link
Owner

tnodir commented Sep 11, 2024

a lot of network traffic ends up showing up as "NT Kernel & System"

It's usually for ping.exe only. I allow the "System" with "Block Internet" flag.

DNS is by DNSCache service. Make it trackable SvcHost service, if it doesn't work as separate process.

traffic rules based on ports and protocols

Yes, it's an important feature. I'm working on it, but it takes a time..

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants