OpenWIPS-ng

OpenSnitch — Interactive Firewall for Linux Desktops Why It Matters Windows users have long been familiar with tools like Little Snitch for monitoring outbound connections. Linux lacked a comparable solution for years, leaving admins and power users with iptables or nftables only. OpenSnitch fills that gap: it’s an application-level firewall for Linux that asks before processes connect out. For anyone who wants tighter visibility over what desktop apps are doing online, it’s a valuable addition.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

OpenSnitch — Interactive Firewall for Linux Desktops

Why It Matters

Windows users have long been familiar with tools like Little Snitch for monitoring outbound connections. Linux lacked a comparable solution for years, leaving admins and power users with iptables or nftables only. OpenSnitch fills that gap: it’s an application-level firewall for Linux that asks before processes connect out. For anyone who wants tighter visibility over what desktop apps are doing online, it’s a valuable addition.

How It Works

OpenSnitch runs a daemon that hooks into Netfilter to watch outbound traffic. When a process initiates a connection, the GUI client prompts the user with details: executable path, destination IP, port, and protocol. The user can block, allow once, or create a persistent rule. Rules are saved in JSON format and can be as broad or as narrow as needed (per-app, per-destination, per-timeframe). It’s designed for desktops but works fine on laptops and developer machines where unknown binaries may run.

Technical Profile

Aspect Details
Platform Linux (desktop distributions, systemd environments)
Core function Application-level outbound firewall
Enforcement Netfilter hooks; per-process connection rules
Interface GUI prompts for rule creation, JSON config files
Features Rules by app, domain, IP, port, or time; notifications; logging
License Open source (GPLv3)

Deployment Notes

1. Install from distribution repositories (Debian/Ubuntu packages available) or build from source.
2. Start the OpenSnitch daemon and GUI client.
3. Test by launching an app that makes outbound connections — expect a popup asking to allow or deny.
4. Save rules as temporary or permanent.
5. Export/import rules for consistency across machines if needed.

Where It Fits

– Linux desktops where users want to know which apps connect online.
– Developer workstations running untrusted or experimental code.
– Privacy-focused setups that aim to minimize data exfiltration.

Caveats

– Linux-only; no Windows or macOS support.
– Interactive prompts can be noisy at first until rules are tuned.
– Not ideal for headless servers — it’s desktop-oriented.
– Still evolving; occasional compatibility quirks with some distributions.

Other programs

Submit your application