Serious Discussion Fort Firewall

Can we expect secure DNS management in this software like "Portmaster" ?

If not, it is possible to modify in Windows settings (Control Panel and Network) and the desired DNS in ipv4 and 6 or with a tool like ChrisTitus "WinUtil".
 
Will we be able to choose NextDNS as resolver for one app, then AdGuard DNS for another, and Cloudflare for another app and none for other apps?
Is it possible with Postmaster?

I think, it's not possible without dll function hooking. And I don't want to use such dirty methods.

I was planning something similar to DNSCrypt-Proxy mechanism.
 
By default, is on "Block"

How to put "Allow" on choice by default, I have to confirm only...

FortFirewall_8HnvMap2hM.png
 
Is it possible with Postmaster?
As far as I can see selecting a different DNS for each application is not possible in PortMaster, but you can create your own filtering rules both by IP and by host.

Are you not planning to add pre-defined filters for “bad” Ip and hosts in the future? That would be useful.
 
  • Like
Reactions: tnodir
How to put "Allow" on choice by default
Set Filter mode to "Allow, ...".

But keep in mind, that it will auto-allow new programs. So, programs will have access to Internet by default.

Fort does not pause the connections, but just shows popup for already blocked or allowed program. (A not yet implemented "Ask to connect" filter mode will pause the connections.)
 
Last edited:
Set Filter mode to "Allow, ...".

But keep in mind, that it will auto-allow new programs. So, programs will have access to Internet by default.

Fort does not pause the connections, but just shows popup for already blocked or allowed program. (A not yet implemented "Ask to connect" filter mode will pause the connections.)
fine, I'll leave it that way...
 
A search tells me that (without being exhaustive):



“FireHOL Level 1 is a list of IP addresses used for filtering network traffic. It comprises several types of IP addresses, including :



Buggy addresses, which are IP addresses that should never appear on an Internet interface1

.

Private and local IP addresses, such as 10.0.0.0/8 and 192.168.0.0/243.

.

Other IP addresses considered potentially malicious or suspicious.”
 
  • Like
Reactions: tnodir