11/16/2023 0 Comments Inet network scanner torrentIdeally the firewall will let all the torrenting through.Ī firewall is important but not the only step in security. Sounds like you've got your firewall rules blocking some torrenting traffic, so you may want to work out what's really getting blocked. That means you'll see inbound and outbound traffic when you start torrenting. You will also seed other downloads with the copies you have previously torrented. When you use torrents, the idea is you can download something from multiple locations. Make sure it's not just your router doing its job and chatting with devices on your network. I encourage you to take the time to understand what UFW is blocking. I agree that apparmor is a good way to go. I am bit concerned about this.So I was thinking should I run Transmission inside Virtualbox ? Despite the router configured in stealth mode I see ufw blocking incoming connections when I do dmesg | tail which means the router's firewall is not all that effective.The number of attempts increases greatly when I am torrenting. All ports of the router are in stealth mode and ICMP is also blocked (I checked that at grc.com).Then there's ufw making all ports stealth on the OS side. Hi,I use DSL router to connect to the internet. Sudo tail -f /var/log/kern.log | grep apparmor Sudo aa-enforce /usr/bin/transmission-gtkģc) Watch the logs for problems and while that is running, put Transmission through its paces. Needs to be done each time the profile is changed. Sudo aa-complain /usr/bin/transmission-gtkĢc) Run transmission through its paces again.ģa) Edit in rule qualifiers like 'owner' and variables like and Load apparmor in enforcing mode. See the manual page for apparmor.d Add in 'includes' as needed, they can be found in /etc/apparmor.d/abstractions/ and /etc/apparmor.d/tunables/ Repeat until "done" with globbing and consolidation.Ģa) Edit the rules manually, globbing where possible. Sudo aa-genprof /usr/bin/transmission-gtkġb) Then I wiped all configurations for Transmission and started it up and ran it through all the actions I could think of:Ģ) Initial refinement of the profile takes several steps. It's the first profile I've tried making so it is likely to be imperfect.ġ) Generating an initial profile takes three steps. I am looking for some good apparmor profiles but I cant find any and if am not wrong profile for a particular app differ from distro to didtro.s I'm not sure how much torrents specifically need ICMP but in general not responding to ICMP means that your corner of the net is a little broken. For everything else, reject is a smoother option. Other machines can still scan your machine and find out just as much, if not more, than if in normal operation.įor *known* malicious traffic, there is always tarpit (), if you want to go that route. That's what apparmor is good at.Ībout 'stealth' mode, there is really no such thing. If you want to contain your bittorrent software probably the best way would be to make an apparmor profile () for it and lock it down that way. VirtualBox will only add another few pieces to possibly break or get in the way.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |