Gufw
en.wikipedia.org/wiki/Uncomplicated_Firewall LinuxOpen source GUI firewall for Linux, allowing you to block internet access for certain applications. Supports both simple and advanced mode, GUI and CLI options, very easy to use, lightweight/ low-overhead, under active maintenance and backed by a strong community.
- Homepage: en.wikipedia.org/wiki/Uncomplicated_Firewall
- GitHub: github.com/costales/gufw
- Web info: web-check.xyz/results/en.wikipedia.org
Gufw Source Code
Author
Description
Linux Firewall
Homepage
License
GPL-3.0
Created
30 Oct 19
Last Updated
22 Sept 24
Latest version
Primary Language
Python
Size
2,722 KB
Stars
129
Forks
33
Watchers
129
Language Usage
Star History
Top Contributors
- @costales (38)
- @thibaultmol (3)
- @muzena (2)
- @dominikborkowski (1)
- @gschwaer (1)
- @jeremy447 (1)
- @jbicha (1)
- @ediw8311xht (1)
Recent Commits
- Costales (27 Jan 24)
Merge pull request #57 from ediw8311xht/patch-1 Updated GUFW to ensure absolute path of `gufw-pkexec` is always used.
- Costales (27 Jan 24)
Merge pull request #59 from gschwaer/syncthing_app_profile App Profile For Syncthing
- Costales (27 Jan 24)
Merge pull request #68 from jbicha/webkit Switch from webkit2gtk 4.0 to 4.1
- Jeremy Bícha (25 Jan 24)
Switch from webkit2gtk 4.0 to 4.1
- Costales (01 Nov 23)
Updated i18n
- Costales (01 Nov 23)
Updated version and year
- Costales (01 Nov 23)
Added SMPlayer profile
- Costales (01 Nov 23)
Added PI-Hole profile
- Costales (15 Jul 23)
Merge pull request #55 from dominikborkowski/do_not_wipe_rules_on_status_off allow to send rules on status=False
- Gero Schwäricke (05 Mar 23)
Add app profile for syncthing
- Maximilian Ballard (12 Jan 23)
Updated GUFW to ensure absolute path of `gufw-pkexec` is always used. When running `gufw` from the command line I came across this error: ``` (gufw.py:442919): Gtk-CRITICAL **: 23:10:39.470: _gtk_style_provider_private_get_settings: assertion 'GTK_IS_STYLE_PROVIDER_PRIVATE (provider)' failed /usr/bin//gufw-pkexec: line 2: 442919 Segmentation fault (core dumped) python3 /usr/lib/python3.10/site-packages/gufw/gufw.py "$@" ``` The important bit is `/usr/bin//gufw-pkexec` In the polkit com.ubuntu.pkexec.gufw.policy file it has this line: `<annotate key="org.freedesktop.policykit.exec.path">/usr/bin/gufw-pkexec</annotate>` Polkit does not recognize the paths being the same since it includes a double forward slash ('//'), but they are the same paths. I confirmed this was the issue by adding this line into this file: `<annotate key="org.freedesktop.policykit.exec.path">/usr/bin//gufw-pkexec</annotate>` Which when I restarted the polkit service I was able to run the program without error. Obviously this is not a good solution, so I provided a better solution, which can be seen in my pull request, I changed one line in `gufw` from: `pkexec gufw-pkexec $c_user` to `pkexec "$(which gufw-pkexec)" $c_user` This ensures the correct path of `gufw-pkexec` will always be sent.
- Dominik L. Borkowski (28 Sept 22)
allow to send rules on state=False
- Costales (23 Apr 22)
New README
- Costales (23 Apr 22)
New README
- Costales (25 Jan 22)
Updated version
- Costales (25 Jan 22)
Updated translations
- Costales (25 Jan 22)
Merge pull request #41 from thibaultmol/parsec Added rule: Parsec
- Thibault Molleman (02 Dec 21)
removed incorrect name
- Thibault Molleman (02 Dec 21)
Added Parsec profile
- Thibault Molleman (02 Dec 21)
Added the Parsec streaming app profile
- Costales (05 Jul 21)
Updated i18n strings
- Costales (05 Jul 21)
Fixed #33
- muzena (27 Oct 20)
Add README.md
- costales (27 Oct 20)
Release 21.04.0 - Updated translations
- costales (27 Oct 20)
Adapted tvheadend
- Costales (27 Oct 20)
Merge pull request #23 from muzena/tvheadend_profile Add profile for Tvheadend server
- muzena (27 Oct 20)
Add profile for Tvheadend server
- costales (25 Oct 20)
Improved fix to #9
- costales (23 Oct 20)
Fixed #9
- costales (12 Sept 20)
Updated translations
Gufw Reviews
More Firewalls
-
Provides simple and advanced ways to block access to the internet. Applications and addresses can individually be allowed or denied access to Wi-Fi and/or mobile connection.
-
Notifies you when an app is trying to access the Internet, so all you need to do is just Allow or Deny. Allows you to create filter rules based on IP address, host name or domain name, and you can allow or deny only specific connections of an app.
Not Open Source -
AFWall+
(Android - Rooted)
xdaforums.com/t/5-0-root-3-6-0-afwall-iptables-firewall-28-aug-2023.1957231Android Firewall+ (AFWall+) is an advanced iptables editor (GUI) for rooted Android devices, which provides very fine-grained control over which Android apps are allowed to access the network.
-
An open-source ad-blocker and firewall app for Android 6+ (does not require root).
-
Firewall app for iPhone, allowing you to block any connection to any domain.
Not Open Source -
Tool to control Windows Filtering Platform (WFP), in order to configure detailed network activity on your PC. (Windows)
-
Free, open source macOS firewall. It aims to block unknown outgoing connections, unless explicitly approved by the user.
-
A very polished application firewall, allowing you to easily manage internet connections on a per-app basis. (Mac OS)
Not Open Source -
Makes internet connections from all apps visible, allowing you to block or manage traffic on a per-app basis. GNU/Linux port of the Little Snitch application firewall.
-
The ufw (Uncomplicated Firewall) is a GUI application and CLI, that allows you to configure a firewall using
iptables
much more easily. -
IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Easy to install on a raspberry Pi, since it is lightweight and heavily customizable.
-
An open source firewall tool for Linux that builds upon the Netfilter system built into the Linux kernel, making it easier to manage more complex configuration schemes with iptables.
-
Enterprise firewall and router for protecting networks, built on the FreeBSD system.
About the Data: Gufw
API
You can access Gufw's data programmatically via our API.
Simply make a GET
request to:
https://api.awesome-privacy.xyz/networking/firewalls/gufw
The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
About the Data
Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.
Share Gufw
Help your friends compare Firewalls, and pick privacy-respecting software and services.
Share Gufw and Awesome Privacy with your network!