Little Snitch

Transcription

Little Snitch
Little Snitch
Eric Postpischil
Senior Software Engineer
Vector and Numerics Group
Core OS
Apple, Inc.
I am not speaking for Apple, Inc.
http://edp.org/Presentations/LittleSnitch.pdf
1
Little Snitch
Introduction
•
•
•
•
•
•
Features
Purchase
Installation
•
Some of My Settings
Demonstration
Tips
More to Explore
2
Saturday, July 27, 2013
Little Snitch
Features
•
•
•
•
•
Alert (snitch) when applications use network.
Block applications from using network.
Learn what to allow or deny.
Comparison to OS X firewall.
•
•
Firewall regulates incoming connections.
Little Snitch regulates outgoing (also).
Borderline general user / expert software.
3
Little Snitch
Features
•
What I Use Little Snitch For.
•
Snitch when installing applications and using
them for the first time, to detect portability
and license problems.
•
•
•
Block email programs from accessing links.
Block unwanted update checks.
Block applications reporting to publisher.
4
Saturday, July 27, 2013
Little Snitch
Purchase
•
•
Published by Objective Development.
•
•
Family: $34.95 for one seat, $69 household (five).
<http://www.obdev.at/products/littlesnitch/
index.html>.
Business: $129 for five seats, $219 for ten.
5
Little Snitch
Installation
•
•
•
•
Run installer from disk image.
Enter registration information.
Configure desired settings.
Learn and set rules as desired.
•
Pesky at first. That is what you sign up for.
6
Saturday, July 27, 2013
Little Snitch
Some of My Settings
•
Alert.
•
•
Detail Level: Show Full Details.
Confirm with Return and Escape:
Off.
7
Little Snitch
Some of My Settings
•
Monitor.
•
Show automatically when mouse enters menu
bar icon: Off.
8
Saturday, July 27, 2013
Little Snitch
Some of My Settings
•
Advanced.
•
Mark rules from connection alert as
unapproved: On.
•
Approve rules automatically: Off.
9
Little Snitch
Some of My Settings
•
Update.
•
Automatically check for updates: Off.
10
Saturday, July 27, 2013
Little Snitch
Demonstration
11
Little Snitch
Demonstration
•
Alert.
12
Saturday, July 27, 2013
Little Snitch
Demonstration
•
Hover to show Show Details button.
13
Little Snitch
Demonstration
14
Saturday, July 27, 2013
Little Snitch
Demonstration
•
Parts of an Alert.
•
•
•
•
•
Application (via process).
Wants to connect to some destination.
Forever, Until Quit, other durations.
Any Connection or fine controls.
Deny or Allow.
15
Little Snitch
Demonstration
•
Parts of an Alert.
•
Research Assistant. “?” button in lower left.
16
Saturday, July 27, 2013
Little Snitch
Demonstration
•
Handling Alerts while Little Snitch is learning.
•
For initial training, you can select Forever and
Allow for every alert. Run every program you
have that accesses the network.
•
Little Snitch creates rules.You can delete or
edit these later.
17
Little Snitch
Demonstration
•
Allowing or denying a rule with duration other
than Once creates a rule.
•
View rules with Menu Bar icon > Rules…
18
Saturday, July 27, 2013
Little Snitch
Demonstration
•
Last 24 Hours, Temporary Rules, Unapproved.
19
Little Snitch
Demonstration
•
All Rules.
20
Saturday, July 27, 2013
Little Snitch
Demonstration
•
Calculator Rule.
21
Little Snitch
Demonstration
•
Parts of a Rule.
•
Allow, Deny, Ask.
•
•
Duration.
Process.
•
Via.
22
Saturday, July 27, 2013
Little Snitch
Demonstration
•
Parts of a Rule.
•
Owner
•
Server.
23
Little Snitch
Demonstration
•
Parts of a Rule.
•
•
Port and Protocol.
Enabled.
24
Saturday, July 27, 2013
Little Snitch
Demonstration
•
Stop/Start Network Filter (in Menu Bar icon).
25
Little Snitch
Tips
•
Log into each configured account (including
Guest) and ensure Little Snitch rules are set.
•
Important if you have Prey Project or other
anti-theft/tracking software. Little Snitch
should be transparent and allow software to
work.
26
Saturday, July 27, 2013
Little Snitch
More to Explore
•
•
•
•
Control incoming connections.
Configuring differently for different users.
•
Who can edit rules.
Profiles for multiple networks (home, office, café).
•
Allow local connections at home, not in café.
Network monitor.
27
Little Snitch
More to Explore
•
Fine-grain control.
•
•
•
•
•
•
ICMP, UDP, TCP.
Host, domain, local, classes of destinations.
User or system process.
Port.
Protocol.
E.g., could disable insecure email, allow secure.
28
Saturday, July 27, 2013