Hello,
I was not sure if this should go in the network section or the Macintosh section, since it does have to do with networking.
According to a article little snitch denied connections leaks your ip address when a TCP connection is attempted.
“Every TCP packet, including any packet involved in the handshake, contains the IP addresses of the sender and the receiver. Thus, before Little Snitch can perform deep packet inspection, the IP address of your Mac may have already been sent to the remote server!”
Objective Development (the creators of little snitch) describes the reason for why this happens.
“First of all, it‘s not Little Snitch which is in charge to decide whether these packets leave the computer, it‘s Apple‘s NetworkExtension framework.
Since we are no longer allowed to ship a kernel extension, we are required to code against this new programming interface.
So the question transforms into: “Why does the Network Extension framework allow these data packets?”
"This was a design decision made by Apple.
The Network Extension framework puts the filter code outside of the operating system kernel.
When a connection should be established, the data must be passed from the kernel to an Apple user space process and from this user space process to the respective Network Extension.
The Network Extension makes a decision based on rules, sends back the result via to the original user space process which in turn sends it down to the kernel. A long path, isn‘t it?”
My question: Is using little snitch going to add any additional risks compared to not using it?
I was not sure if this should go in the network section or the Macintosh section, since it does have to do with networking.
According to a article little snitch denied connections leaks your ip address when a TCP connection is attempted.
“Every TCP packet, including any packet involved in the handshake, contains the IP addresses of the sender and the receiver. Thus, before Little Snitch can perform deep packet inspection, the IP address of your Mac may have already been sent to the remote server!”
Little Snitch "denied" connections leak your IP address
lapcatsoftware.com
Objective Development (the creators of little snitch) describes the reason for why this happens.
“First of all, it‘s not Little Snitch which is in charge to decide whether these packets leave the computer, it‘s Apple‘s NetworkExtension framework.
Since we are no longer allowed to ship a kernel extension, we are required to code against this new programming interface.
So the question transforms into: “Why does the Network Extension framework allow these data packets?”
"This was a design decision made by Apple.
The Network Extension framework puts the filter code outside of the operating system kernel.
When a connection should be established, the data must be passed from the kernel to an Apple user space process and from this user space process to the respective Network Extension.
The Network Extension makes a decision based on rules, sends back the result via to the original user space process which in turn sends it down to the kernel. A long path, isn‘t it?”
Three-way handshake bypassing Little Snitch
There has been some discussion recently about the bypassing of Little Snitch by the first datagram of a three-way TCP handshake. The facts: When a deny-rule for a domain is set in Little Snitch, and a TCP connection is made to that domain, a TCP SYN…
obdev.at
My question: Is using little snitch going to add any additional risks compared to not using it?