Top
Best
New

Posted by pluc 1 day ago

LittleSnitch for Linux(obdev.at)
1274 points | 413 commentspage 6
FloatArtifact 1 day ago|
I wish applications like this could coordinate with upstream firewall like opnsense
jimgill 12 hours ago||
Old bottle with new lable, but good to keep eye on interfaces
SamuelAdams 1 day ago||
So if this is free to use on linux, what is to stop someone from doing what Colima did to Docker? Aka make a tiny Linux VM on MacOS and package Little Snitch within that?
Cider9986 1 day ago||
It barely has any of the features of the MacOS version, there is no shortage of cracks for Little Snitch, and there is Lulu. Other than that, I am not sure.
azinman2 1 day ago|||
I don't think it'll have access to the macOS connections, and certainly cannot act at the kernel-supported level as a firewall on the Mac side.
firelizzard 23 hours ago|||
Little Snitch requires packet inspection. If you ran it in a Linux VM, it will inspect packets within the VM. So... kind of useless for monitoring connections on the host.
I_am_tiberius 13 hours ago||
FYI: It's an Austrian company behind that software.
Tepix 21 hours ago||
> One thing to be aware of: the .lsrules format from Little Snitch on macOS is not compatible with the Linux version.

Why?

littlesnitch 17 hours ago||
Just because I did not port the parser for it to Rust. And I thought that the lsrules format is rare for blocklists. If there is popular demand, we can add it.
ProllyInfamous 9 hours ago||
You should add this feature.
cromka 21 hours ago||
Probably because it relies on eBPF rules on Linux?
cromka 20 hours ago||
I'd like to point out it uses very little memory, barely 33MB here. That's impressive!
sersi 21 hours ago||
> For keeping tabs on what your software is up to and blocking legitimate software from phoning home, Little Snitch for Linux works well. For hardening a system against a determined adversary, it's not the right tool.

What would be the right tool to harden in a similar way to little snitch on mac? Meaning intercepting any connection and whitelisting them reliably.

computing 1 day ago||
doesn't work on arch (btw)
Jakson_Tate 17 hours ago||
cool to see eBPF used for a desktop firewall instead of just ddos packet dropping. the note about bpf map overflows is super relatable, dealing with that on bare-metal is a pain.

my question is... if the tracking maps fill up completely, does the daemon fail-open or fail-closed?

littlesnitch 15 hours ago|
There is currently no treatment of errors because I would not know how to handle them anyway. There are two tables which can overflow affecting the filter: the table of open flows and the table of recent DNS lookups. The table of flows just fills up, meaning that we cannot store state about new flows. Without state, we can't attribute a process to them and end up evaluating rules on each packet. I guess that blocklists would still work, but more specific rules would not be applied (and the default decision would be taken, whatever you have configured).

The DNS lookups, on the other hand, are LRU. If the table overflows too soon, we won't be able to derive names for IP addresses and name-based rules would fail.

Jakson_Tate 17 minutes ago||
gotcha... makes total sense. LRU for the DNS map is definitely the right call for a desktop setup. and falling back to the user's default policy is smart so you don't randomly brick their internet if an app goes crazy.

really appreciate the honest answer, man. awesome work on this...!

rvz 1 day ago|
Also from [0].

> You can find Little Snitch for Linux here. It is free, and it will stay that way.

Don't worry, the authors know that there's no point in charging Linux users. Unlike Mac users.

So you might as well make it $0 and the (Linux) crowd goes wild that they don't need to pay a cent.

However...

> I researched a bit, found OpenSnitch, several command line tools, and various security systems built for servers. None of these gave me what I wanted: see which process is making which connections, and in the best case deny with a single click.

OpenSnitch is open source. You don't need to trust it as you can see the code yourself. Little Snitch on the other hand, is completely closed source.

Do you still trust them not to do self-reporting or phoning home, even though it is $0 and closed source?

[0] https://obdev.at/blog/little-snitch-for-linux/

papascrubs 1 day ago||
Two of the three components of LittleSnitch for Linux are open source. The eBPF (kernel portion) and UI are fully open source.
lapcat 1 day ago||
> Do you still trust them not to do self-reporting or phoning home, even though it is $0 and closed source?

If you trust Little Snitch on Mac, then yes.

They've been in business for over 20 years. They're not going to blow their entire business and reputation for a few Linux users.

emmelaich 1 day ago||
Yep, I trust the obdev.at / Snitch guys.

I do wonder however, are they sufficiently careful about their processes and own machines to avoid a supply chain attack completely.

They must be a target for the various hacking groups out there.

littlesnitch 16 hours ago|||
We have not detected a targeted attack yet. On the Mac side, we are safe: No dependencies on any third party libraries. Only Apple.

On the Linux side, there is no single big vendor such as Apple who provides all the necessary libraries. I have tried to choose reputable sources from crates.io only, but to be honest, I don't know a secure solution to the problem.

lapcat 1 day ago|||
This comment seems a bit confused.

A supply chain attack doesn't directly attack an end developer but rather a supplier of the developer. So who or what is the supplier in this case?

emmelaich 1 day ago|||
They don't build their own machines or write their compilers or write their own crpyto code or ... so many other things.
lapcat 1 day ago||
> They don't build their own machines or write their compilers or write their own crpyto code or ... so many other things.

An attack on any of these things has nothing specifically to do with the developers of Little Snitch and would have vastly more widespread and important effects.

Why would you even be talking about Little Snitch if a compiler were compromised?!? Your paranoia here is bizarrely narrow. Little Snitch would be the least of our problems in that case.

emmelaich 23 hours ago||
Their copy of the compiler. Just an example. ¯\_(ツ)_/¯
lapcat 17 hours ago||
> Their copy of the compiler.

This doesn't even make sense. You have no examples.

LamaOfRuin 1 day ago||||
That seems... not correct?

The comment was asking about preventing a compromised supplier for the developers.

A supply chain attack can be anywhere in the supply chain to the target. If I, the end user, am the target, then a supply chain attack compromising the developer of LittleSnitch is effective.

I may then be a conduit to compromising other software or components, and would both I and LittleSnitch would be part of the supply chain that could be attacked targeting them.

lapcat 1 day ago||
> If I, the end user, am the target

You're not a target, anonymous rando.

microtonal 21 hours ago||
Many supply chain attacks aim to run malware on the end-users machine to harvest authentication tokens, etc. So pretty much everyone here who is a developer is the target.
lapcat 17 hours ago||
> So pretty much everyone here who is a developer is the target.

Are you going to have this same discussion about every piece of software every mentioned on Hacker News? Why are we having it for Little Snitch specifically?

hsbauauvhabzb 1 day ago|||
This seems pedantic and I think you know what they’re questioning and why.
BoredPositron 1 day ago|||
If they trust the devs why would they not trust them to not yolo deploy new versions?
dylan604 1 day ago|||
because a company worthy of trust doesn't yolo their versions. a company that does yolo versions is not trustworthy.
hsbauauvhabzb 1 day ago|||
Because it might not be the developers doing the deploying, but a malicious actor?
lapcat 1 day ago|||
> I think you know what they’re questioning and why.

No, not really. And I disagree with the premise, "They must be a target for the various hacking groups out there."

How would you even hack them? I'm a developer too; how would you hack me?

heartbreak 1 day ago|||
Options range from carefully targeted phishing or social engineering attacks to poor opsec and a five dollar wrench.
lapcat 1 day ago||
> a five dollar wrench.

I'm not even going to respond to this ridiculousness.

I still don't know why anyone thinks that, among all developers in the world, a little indie Mac developer is getting targeted specifically.

emmelaich 23 hours ago|||
Some targets are more valuable than others. A firewall product has obvious security value. The fact that it requires high privilege is another reason.

I have the same thoughts about other Mac apps. e.g. iTerm2 - cause they "see" so much sensitive data.

lapcat 17 hours ago||
[flagged]
hsbauauvhabzb 16 hours ago||
Yeah just yolo install whatever, it’s not like applications or libraries such as axios which have a decade of trusted history would all of a sudden become malicious and do nasty things to developer machines, just chill, everything’s fine.
lapcat 16 hours ago||
> Yeah just yolo install whatever

That's not even remotely what I said.

> it’s not like applications or libraries such as axios

iTerm doesn't use NPM. Little Snitch doesn't use NPM. I don't use NPM.

hsbauauvhabzb 16 hours ago||
[flagged]
tomhow 13 hours ago||
WTF? This is not an acceptable comment on HN, no matter who or what you're replying to. This style of commenting is not what this site is for, and destroys what it is for.

If you wouldn't mind reviewing https://news.ycombinator.com/newsguidelines.html and taking the intended spirit of the site more to heart, we'd be grateful.

heartbreak 16 hours ago||||
> I'm not even going to respond to this ridiculousness.

Why is it ridiculous? If you have electronic access to something of value and broadcast that fact on the internet, you’re at risk of a physical attack. That’s not controversial? Companies make employees do training about this for a reason.

lapcat 16 hours ago||
> If you have electronic access to something of value and broadcast that fact on the internet, you’re at risk of a physical attack. That’s not controversial? Companies make employees do training about this for a reason.

You're talking as if all all "value" and all "risk" is equal, when they're definitely not. You can't equate a megacorporation with a little indie developer. Nobody cares about the latter.

I am a software developer, and I broadcast that fact on the internet. But nobody is coming to Wisconsin to hit me on the head with a wrench. That's just a silly paranoid fantasy.

If anyone hits me on the head with a wrench, it would be not be a nation-state but rather a two-bit local mugger who has no idea who I am and just wants cash from my wallet. I live in a pretty safe area though.

balamatom 15 hours ago||
Nobody that you know of.
hsbauauvhabzb 16 hours ago|||
The same people who targeted the open source uncommercial library axios *last week*?

Access to little snitch would be worth millions to the right party.

lapcat 16 hours ago||
>> I still don't know why anyone thinks that, among all developers in the world, a little indie Mac developer is getting targeted specifically.

> The same people who targeted the open source uncommercial library axios last week?

axios is an NPM package. Little Snitch doesn't use NPM. Thus, these people must be pretty damn incompetent if they were trying to target Little Snitch.

> Access to little snitch would be worth millions to the right party.

This is a bold claim with no evidence. I don't think it's true.

hsbauauvhabzb 16 hours ago||
Shell (and probably root) access to tens of thousands of development machines wouldn’t be worth millions to the right party?
emmelaich 1 day ago|||
?! The same way every other developer that has been hacked. You surely cannot be suggesting you're un-hackable. That seems ludicrously hubristic.
lapcat 1 day ago||
> The same way every other developer that has been hacked.

There's not one single way, so, no, you're just hand-waving here.

emmelaich 23 hours ago||
Just saying developers have been hacked. Underrated existence proof.
lapcat 17 hours ago||
> Just saying developers have been hacked.

So are you going to have this same discussion in every HN submission that mentions any piece of software?

hsbauauvhabzb 17 hours ago||
What software do you actually develop? You clearly don’t give a shit about your users and I want to make sure I’m not using your software .
More comments...