// Copyright (c) 2023 Private Internet Access, Inc. // // This file is part of the Private Internet Access Desktop Client. // // The Private Internet Access Desktop Client is free software: you can // redistribute it and/or modify it under the terms of the GNU General Public // License as published by the Free Software Foundation, either version 3 of // the License, or (at your option) any later version. // // The Private Internet Access Desktop Client is distributed in the hope that // it will be useful, but WITHOUT ANY WARRANTY; without even the implied // warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with the Private Internet Access Desktop Client. If not, see // . // Copyright (c) 2024 AmneziaVPN // This file has been modified for AmneziaVPN // // This file is based on the work of the Private Internet Access Desktop Client. // The original code of the Private Internet Access Desktop Client is copyrighted (c) 2023 Private Internet Access, Inc. and licensed under GPL3. // // The modified version of this file is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this file. If not, see . #ifndef MACOSFIREWALL_H #define MACOSFIREWALL_H #include #include // Descriptor for a set of firewall rules to be appled. // struct FirewallParams { QStringList dnsServers; QVector excludeApps; // Apps to exclude if VPN exemptions are enabled QStringList allowAddrs; QStringList blockAddrs; // The follow flags indicate which general rulesets are needed. Note that // this is after some sanity filtering, i.e. an allow rule may be listed // as not needed if there were no block rules preceding it. The rulesets // should be thought of as in last-match order. bool blockAll; // Block all traffic by default bool blockNets; bool allowNets; bool allowVPN; // Exempt traffic through VPN tunnel bool allowDHCP; // Exempt DHCP traffic bool blockIPv6; // Block all IPv6 traffic bool allowLAN; // Exempt LAN traffic, including IPv6 LAN traffic bool blockDNS; // Block all DNS traffic except specified DNS servers bool allowPIA; // Exempt PIA executables bool allowLoopback; // Exempt loopback traffic bool allowHnsd; // Exempt Handshake DNS traffic bool allowVpnExemptions; // Exempt specified traffic from the tunnel (route it over the physical uplink instead) }; class MacOSFirewall { private: static int execute(const QString &command, bool ignoreErrors = false); static bool isPFEnabled(); static bool isRootAnchorLoaded(); public: static void install(); static void uninstall(); static bool isInstalled(); static void enableAnchor(const QString &anchor); static void disableAnchor(const QString &anchor); static bool isAnchorEnabled(const QString &anchor); static void setAnchorEnabled(const QString &anchor, bool enable); static void setAnchorTable(const QString &anchor, bool enabled, const QString &table, const QStringList &items); static void setAnchorWithRules(const QString &anchor, bool enabled, const QStringList &rules); static void ensureRootAnchorPriority(); static void installRootAnchors(); }; #endif // MACOSFIREWALL_H