Serious Discussion Minimal Firewall

I've described about one time installers early.
@rashmi described about HiBit Uninstaller.
You mean when saving outbound packets somewhere, just selecting allow connection will lead to resuming internet connection of HiBit uninstaller without restarting the uninstaller?
 
  • Like
Reactions: rashmi
What is the gain from saving outgoing packets somewhere rather than blocking connection until decision is taken?
There is a small bit of convenience when you try to install a program such as a browser (which generally needs to pull resources online to actually install). If you block the connection, it will fail and tell you to connect, and so you have to double click the .exe again to start again after allowing. If the connection is saved somewhere else, you don't need to double click the .exe again. I'm not sure how reliable it would be for every program though.

Other installers retry a few automatically. For example if you try to download with pip (python), it will show a connection failed, and if you press allow the connection it will continue and download.
 
  • Hundred Points
Reactions: tnodir
In a nutshell, saving those outgoing packets turns an immediate, harsh stop into a brief pause. It keeps your apps happy and responsive, prevents headaches, and gives you a bit more control over your internet traffic.
Where are those packets saved? SSD? and what is the fate of saved packets if I choose block connection? are they deleted automatically or I have to delete them manually?
 
Where are those packets saved? SSD? and what is the fate of saved packets if I choose block connection? are they deleted automatically or I have to delete them manually?
Those waiting packets are temporarily held in your computer's RAM, not your SSD. If you choose to block the connection, those saved packets are automatically deleted and the application trying to send them gets the message that it's a no-go.
 
Those waiting packets are temporarily held in your computer's RAM, not your SSD. If you choose to block the connection, those saved packets are automatically deleted and the application trying to send them gets the message that it's a no-go.
Looks for me too much hassle to save me clicking retry after selecting allow connection!
 
You mean when saving outbound packets somewhere, just selecting allow connection will lead to resuming internet connection of HiBit uninstaller without restarting the uninstaller?
Yes, exactly.

I think, all old school firewalls worked like this (e.g. Agnitum Outpost Firewall).

Comodo Fw, NetLimiter, Portmaster work like this too.
 
Yes, exactly.

I think, all old school firewalls worked like this (e.g. Agnitum Outpost Firewall).

Comodo Fw, NetLimiter, Portmaster work like this too.
All of them; it is the first time for me to know this mechanism.
I can call them using paused connection, while Minimal firewall is using "cached" paused one.
 
I have tried out Minimal firewall but I am not sure how it is supposed to work.

I have a long list of service rules that I am unable to delete.

I am unsure how to add an UWP App. If I allow a UWP App in Pending connections I do not get an UWP App rule.

I am trying to create an advanced rule to allow a program to access anything on the local network only. I have tried 192.168.0.1-192.168.0.255 and LocalSubnet for the IP but Minimal Firewall just crashes.
 
I have tried out Minimal firewall but I am not sure how it is supposed to work.

I have a long list of service rules that I am unable to delete.

I am unsure how to add an UWP App. If I allow a UWP App in Pending connections I do not get an UWP App rule.

I am trying to create an advanced rule to allow a program to access anything on the local network only. I have tried 192.168.0.1-192.168.0.255 and LocalSubnet for the IP but Minimal Firewall just crashes.
The advanced rules still need some work. Minimal Firewall is a true frontend, so I suggest just using Windows Firewall or in cmd as admin, type in something like this:
netsh advfirewall firewall add rule name="Whatever you want to name it" dir=out action=allow program="C:\Path\Program.exe" remoteip=192.168.0.0/24 enable=yes profile=private

The UWP rules from the pending connections will be in advanced rules. I'll update the UWP list later or just combine with advanced rules. I just had a pending connection with Windows Game Bar and blocking it blocked it in advanced rules/windows firewall.

The main point of Minimal Firewall is to be an easy frontend to harden the main rules of Windows Defender as an app-based blocker. The advanced rules were an afterthought and still need work, but all can be achieved easily enough in Windows Firewall. But my next update will be to correct the advanced rules to make it easy to create rules for Wireguard/Mullvad connections.

I'm not sure what you mean about your service rules you are unable to delete. If it says "undefined," there is no rule. They are all held in the list unlike .exe, which can be populated in the undefined programs tab. Here are basic instructions: Minimal Firewall User Guide
 
Thanks.

I think I understand the services now. It is a list of all services and not a list of rules.

I assume the wildcards will only work when the program is running. Do you plan to make it work without a UAC prompt? I am looking for a firewall that is easy to use and does wildcards.
 
Thanks.

I think I understand the services now. It is a list of all services and not a list of rules.

I assume the wildcards will only work when the program is running. Do you plan to make it work without a UAC prompt? I am looking for a firewall that is easy to use and does wildcards.
Wildcards are just for convenience. It just makes it so it auto-blocks or auto-allows when Minimal Firewall is turned on, by adding a rule to Windows Firewall.

So because the default lock mode is to block everything without a rule, if Minimal Firewall is off, then no rule will be created, and it will be blocked. So the only issue that could arise is if you want something allowed, then you will either need a rule for it or to have Minimal Firewall running.
 
hi @deminimis, do your firewall hold DDOSS attacks at kernel level (sys -> dll-> exe) for windows ?
if yes could you tell us how exactly ?
any EV certificate signed on your app ?
those question is because there is no garanty inside your GPL liscence,
have a nice day ^^

No, it can only protect against DDoS attacks as well as Windows Firewall. It's not really a large concern for individuals. Generally, your ISP and router protects against this more robustly. This software will help protects against virus opening malicious ports/listening to connections and worms and the like, and increase privacy at an app-based level. By implementing custom kernel drivers to try to protect against DDoS (I don't think that will even be effective compared to the other options), you are potentially greatly opening the attack service on your system.

So if someone was extra worried about this while they traveled (e.g. a journalist in a hostile country), I think a better defense would be to bring a portable router with OpenWrt with SYN flood protection, rate limiting, Crowdsec, adblock, etc. for your threat level. Add anonymized DNS and Tor. But as an individual this isn't that likely. If you are working on servers, then there are more legitimate worries.

No EV certificate. I could buy an open-source certificate if the app becomes popular. As it is, it's not a complicated app, it's entirely C#. It's basically just a frontend for the Windows Defender Firewall with Advanced Security that's stock. Perhaps when it's a bit more mature I'll try to post on the Windows Store as well.

The security and reliability of Minimal Firewall is on its design, implementation, and the components it relies on, which in this case, is primarily the underlying Windows Firewall. Do other firewall programs have guarantees to willingly open themselves up to civil lawsuits? The trust is in its open-source nature. The reason why people often prefer open-source. Because everything in the code is available for you to inspect and build from source. Anyone can examine and find flaws and correct them.
 
v2.2 Release v2.2 · deminimis/minimalfirewall
I debugged quite a few errors and fixed some memory management, and so this update should provide a much more stable experience. Please see below for information on creating new rules.

Bug fixes​

  • Modified three methods in FirewallActionsService.cs to ensure that when a simple rule is created, it's not restricted to your current network type. This change I made a couple updates back has led to continuous problems with popups even if there was a rule. It should be fixed now. However, you will probably need to delete the rules that say something other than "any"
  • Fixed confusion between reading service/application, causing the program to alert you of a blocked connection even if you already had a rule.
    • Important: This fix only applies to new rules you create. For the apps that are still causing problems, you should delete their existing rules from the "Rules" tab and then recreate them. The new rules will be saved with the correct, broader scope and will work correctly on your VPN.
    • To do this, simply go to the rule tab, click the protocol column to sort by protocol, and shift+select all the rules that say something other than "any" in the protocol.
  • Fixed audit counter.
  • Should now start at startup on Windows 10 if you have that setting added.
  • Updated backend monitoring/memory issues.

Other​

  • Consolidated code.