LuLu icon indicating copy to clipboard operation
LuLu copied to clipboard

Allow multiple rules per process

Open leipert opened this issue 7 years ago • 33 comments

I really would like more granular level of control over which IPs a process connects to. I definitely do not want a process to connect to any Tracking system, e.g. Google, while maintaining connections to the APIs of the process.

leipert avatar Sep 20 '17 10:09 leipert

currently the rules are per process. it would be much more helpful if they were per process + destination (different rule for different port)

gondo avatar May 01 '18 10:05 gondo

Yeah, something like Default Block *:* + Allow IP:Port per process/application would be nice. This would allow you, for example, to limit your e-mail program to your mail-servers to block all "efail" attacks and tracking-attempts etc.

KizzyCode avatar Jun 03 '18 18:06 KizzyCode

Yeah, per port and/or per destination network rules would make a lot of sense.

ctramnitz avatar Aug 12 '18 18:08 ctramnitz

Another vote for this. This feature is huge.

Wdavery avatar Sep 06 '18 14:09 Wdavery

Voting for this as well, since it's kind of a deal breaker. Mostly for the same reason as @leipert: blocking access to Analytics or Crashlytics should not prevent the process from talking to other APIs.

tbnv avatar Sep 29 '18 11:09 tbnv

I came here just for this reason. LuLu is good so far, but adding this feature would really make it awesome.

peterloron avatar Oct 01 '18 04:10 peterloron

This would be awesome!

grzegor avatar Oct 08 '18 18:10 grzegor

This would be an awesome addition! Hope someone who is more networking savvy than myself would have the time to do a PR.

inteist avatar Oct 19 '18 13:10 inteist

+1

bretello avatar Dec 30 '18 18:12 bretello

+1

working-name avatar Jan 28 '19 20:01 working-name

waiting this feature too!

sashsvamir avatar Feb 11 '19 05:02 sashsvamir

It would be super cool to control which applications have access to specific addresses.

nax-bedroom avatar Feb 21 '19 16:02 nax-bedroom

👍 🌳

360fun avatar Feb 28 '19 12:02 360fun

Please add this!

luco avatar Mar 17 '19 23:03 luco

+1 , this feature is a must for any firewall :)

ghost avatar Mar 31 '19 16:03 ghost

Can't wait!

OiCkilL avatar Oct 24 '19 12:10 OiCkilL

+1, it's the only feature that keeps me from using LuLu as my main firewall!

aAmahQpwRk avatar Dec 07 '19 15:12 aAmahQpwRk

+1, it's the only feature that keeps me from using LuLu as my main firewall!

What are you using as main firewall? I was very happy with LuLu but now i have an use case that need this feature, i need to use another firewall! :( :( :( :(

matatablack avatar Dec 22 '19 17:12 matatablack

+1

smachi avatar Jan 05 '20 08:01 smachi

+1

PencilNotPen avatar Jan 15 '20 08:01 PencilNotPen

+1

pmjohann avatar Feb 05 '20 16:02 pmjohann

+1

jawsoftware avatar Mar 30 '20 19:03 jawsoftware

I'm wondering what's the status on this. Do you plan on implementing this in near future?

LuckyLukert avatar Apr 14 '20 13:04 LuckyLukert

in the meanwhile I decided to try another firewall... :( I really hope that this feature will come in the future to switch back.

360fun avatar Apr 14 '20 22:04 360fun

This is a really important request and I now have a use case: It's a VNC client that I want to green-light for LAN connections but not on the Internet, where it could cross unwanted boundaries and 'phone home' where it has no business doing so.

I'm sad LuLu has not added this, despite 3 years of strong community request for it.

ghost avatar Aug 11 '20 14:08 ghost

do not get it, why after 3 years it is still not implemented, this is a basic need. Going to find another firewall then ..

anymos avatar Aug 18 '20 13:08 anymos

Aloha, I just pushed LuLu 2.0.0 (beta!) Amongst other things, supports multiple rules per process (finally!)

Per Process Rules

(notarized) Download: https://bitbucket.org/objective-see/deploy/downloads/LuLu_2.0.0_BETA.zip

Would love any beta-testers/feedback! Bugs? → https://github.com/objective-see/LuLu/issues

p.s. To view (log) output, while test, run the following from the Terminal: log stream --level debug --predicate="subsystem='com.objective-see.lulu'"

objective-see avatar Sep 21 '20 09:09 objective-see

This is just awesome: thank you!!! 🥳

360fun avatar Sep 22 '20 09:09 360fun

Aloha, I just pushed LuLu 2.0.0 (beta!)

sounds and looks good!

however, i would prefer radio-buttons instead of the drop-down-menu. is faster and easier to use. and it has the place on the window. even if you would offer a complete list of all possibilities, meaning something like this::

  • process (/usr/bin/curl)
  • host (www.example2.com)
  • sub-domain ((*.)example2.com.akadns.net)
  • domain ((*.)example2.com)
  • ip (173.231.210.103)
  • cidr /24 (173.231.192.0-173.231.255.255)
  • port (http/80)
  • port@host (www.example2.com:80)
  • port@sub-domain ((*.)example2.com.akadns.net:80)
  • port@domain ((*.)example2.com:80)
  • port@ip (173.231.210.103:80)
  • port@cidr :80/18 (173.231.192.0-173.231.255.255:80)

are there any more useful options? i think this corresponds to the most important wishes of all... ok, a slider for the cidr or a drop-down-menu... 😇 LuLu-radiorules

the more granular rule-set like this is on my wish list... thanks a lot for rethinking

supervisitor avatar Oct 31 '20 11:10 supervisitor

+1 for allowing more options for rules. Ex: I would like to whitelist all of [Zoom's](https://support.zoom.us/hc/en-us/articles/201362683-Network-Firewall-or-Proxy-Server-Settings-for-Zoom IP addresses] to the specific process. The current options are very granular - either allow every IP Zoom connects to, or whitelist */80, */443 - neither of which are ideal.

initrd avatar Jan 31 '21 20:01 initrd