Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Portmaster block only tcp and udp protocol and not blocking other protocols #1751

Open
rajagopalan181 opened this issue Nov 25, 2024 · 6 comments
Labels
bug TYPE: a report on something that isn't working

Comments

@rajagopalan181
Copy link

Pre-Submit Checklist:

What happened:

Portmaster block only tcp and udp protocol and not blocking other protocols as per this list ( https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml )

What did you expect to happen?:
All the protocol is this list - ( https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml ) must be blocked

How did you reproduce it?:

Debug Information:

@rajagopalan181 rajagopalan181 added the bug TYPE: a report on something that isn't working label Nov 25, 2024
Copy link

Greetings and welcome to our community! As this is the first issue you opened here, we wanted to share some useful infos with you:

  • 🗣️ Our community on Discord is super helpful and active. We also have an AI-enabled support bot that knows Portmaster well and can give you immediate help.
  • 📖 The Wiki answers all common questions and has many important details. If you can't find an answer there, let us know, so we can add anything that's missing.

@Daksani
Copy link

Daksani commented Nov 25, 2024

What specific protocol are you finding isn’t being blocked? The majority of the protocols you listed still rely on TCP or UDP for transport. Portmaster is a consumer-focused firewall, and like most firewalls, it primarily targets TCP and UDP traffic because these are the protocols most frequently exploited in attacks. Additionally, most routers are not configured to forward other types of protocols, and even if they did, the network stack on the destination device would typically discard such traffic, as it wouldn’t know how to process it. This effectively eliminates a significant attack vector for non-TCP/UDP protocols.

If you are using specialized application-layer protocols, you’re likely operating within a private network or managing some kind of backbone infrastructure, where such traffic is intentionally permitted rather than blocked by your firewall.

For cases where protection against non-standard or application-specific protocols is necessary, you’ll probably need to invest in enterprise-grade hardware, which offers more granular control over protocol-level filtering.

@rajagopalan181
Copy link
Author

rajagopalan181 commented Nov 25, 2024 via email

@rajagopalan181
Copy link
Author

rajagopalan181 commented Nov 25, 2024 via email

@Raphty
Copy link
Member

Raphty commented Nov 26, 2024

This is not correct! what do you base this wrong assumption on?

@vlabo
Copy link
Member

vlabo commented Nov 27, 2024

If you are referring to ICMP like some of the other issues you opened try switching to the beta channel and see if this fixes the behavior you are experiencing.
https://wiki.safing.io/en/FAQ/SwitchReleaseChannel

If not please provide more details how you are doing the tests and what is not blocked.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug TYPE: a report on something that isn't working
Projects
None yet
Development

No branches or pull requests

4 participants