Maybe there's a cheatcode, I don't know, but I tried to create a module with the necessary settings for openrc, so with this files:
Code: Select all
/etc/init.d/opensnitchd
/etc/opensnitchd/rules
/etc/runlevels/default/opensnitchd
Moderator: M. Eerie
Code: Select all
/etc/init.d/opensnitchd
/etc/opensnitchd/rules
/etc/runlevels/default/opensnitchd
this should be a link to /etc/init.d/opensnitchd (see below)
No, my init script was completely wrong! I thought it was a link to the daemon instead it's a script to prepare and then start the daemon. So thank you for this resource.ncmprhnsbl wrote: ↑04 Jul 2024, 23:42this should be a link to /etc/init.d/opensnitchd (see below)
presuming you're using this:
Code: Select all
#!/sbin/openrc-run
# OpenSnitch firewall service
depend() {
before net
after iptables ip6tables
use logger
provide firewall
}
start_pre() {
/bin/mkdir -p /etc/opensnitchd/rules
/bin/chown -R root:root /etc/opensnitchd
/bin/touch /var/log/opensnitchd.log
/bin/chown root:root /var/log/opensnitchd.log
/bin/chmod -R 755 /etc/opensnitchd
/bin/chmod -R 0644 /etc/opensnitchd/rules
/bin/chmod 0600 /var/log/opensnitchd.log
}
start() {
ebegin "Starting application firewall"
# only if the verbose flag is not set (rc-service opensnitchd start -v)
if [ -z "$VERBOSE" ]; then
# redirect stdout and stderr to /dev/null
/usr/bin/opensnitchd -rules-path /etc/opensnitchd/rules -log-file /var/log/opensnitchd.log > /dev/null 2>&1 &
else
/usr/bin/opensnitchd -rules-path /etc/opensnitchd/rules -log-file /var/log/opensnitchd.log
fi
eend $?
}
stop() {
ebegin "Stopping application firewall"
/usr/bin/pkill -SIGINT opensnitchd
eend $?
}
Great system, I find that there are so many things in nemesis/porteus.
well, i'm not saying it's not
Um, it may be an alternative when I start saving the state of the distribution, but for now ncmprhnsbl's solution is perfectly congenial to me, because it works precisely without having to save anything from the distro.beny wrote: ↑05 Jul 2024, 19:56but you have network manager filtered by opensnich that ask you permission for every connection that you have,if you have xfce4 you can add the daemon service to the start at login, in setting manager session and startup maybe mate it have something like that or make make a script that start daemon convert in xzm and activate maybe this software start after networkmanager connection.
there's bits and pieces throughout this area of the forum, ..maybe..
These days I had been experimenting with firejail and it motivated me to try to create the package you pointed out with trizen.ncmprhnsbl wrote: ↑05 Jul 2024, 04:48this: https://aur.archlinux.org/packages/open ... bpf-module ?
Code: Select all
bpftrace --info
System
OS: Linux 6.9.7-porteus #1 SMP PREEMPT_DYNAMIC Sat Jun 29 11:43:36 UTC 2024
Arch: x86_64
Build
version: v0.20.4
LLVM: 17.0.6
unsafe probe: no
bfd: yes
libdw (DWARF support): yes
libbpf: kernel BTF is missing at '/sys/kernel/btf/vmlinux', was CONFIG_DEBUG_INFO_BTF enabled?
Kernel helpers
probe_read: no
probe_read_str: no
probe_read_user: no
probe_read_user_str: no
probe_read_kernel: no
probe_read_kernel_str: no
get_current_cgroup_id: no
send_signal: no
override_return: no
get_boot_ns: no
dpath: no
skboutput: no
get_tai_ns: no
get_func_ip: no
jiffies64: no
Kernel features
Instruction limit: -1
Loop support: no
btf: yes
module btf: no
map batch: yes
uprobe refcount (depends on Build:bcc bpf_attach_uprobe refcount): no
Map types
hash: yes
percpu hash: yes
array: yes
percpu array: yes
stack_trace: yes
perf_event_array: yes
ringbuf: yes
Probe types
kprobe: no
tracepoint: no
perf_event: no
kfunc: no
kprobe_multi: no
uprobe_multi: no
raw_tp_special: no
iter: no
Code: Select all
bpftrace -l '*sleep*'
WARNING: The kernel contains bpf_iter__bpf_map struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__bpf_link struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__cgroup struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__bpf_prog struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__ipv6_route struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__udp struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__ksym struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__task_vma struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__bpf_map_elem struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__task_file struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__bpf_sk_storage_map struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__sockmap struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__netlink struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__task struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__unix struct but does not support loading an iterator program against it. Please report this bug.
WARNING: The kernel contains bpf_iter__tcp struct but does not support loading an iterator program against it. Please report this bug.
WARNING: Could not read symbols from /sys/kernel/tracing/available_events: No such file or directory
/usr/include/c++/14.1.1/bits/unique_ptr.h:447: typename std::add_lvalue_reference<_Tp>::type std::unique_ptr<_Tp, _Dp>::operator*() const [with _Tp = std::basic_istream<char>; _Dp = std::default_delete<std::basic_istream<char> >; typename std::add_lvalue_reference<_Tp>::type = std::basic_istream<char>&]: Assertion 'get() != pointer()' failed.
Aborted
indeed, no trace of CONFIG_DEBUG_INFO_BTF in the kernel build .config (whereas in the standard arch kernel it is present and set) https://gitlab.archlinux.org/archlinux/ ... type=heads