-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to block program using Network Firewall (WFP) #2915
Comments
|
Indeed. Thank you! I restarted the driver (Menu > Maintenance > Stop All). Now WFP blocks requests. FWIW: Before the maintenance restart, when I enabled WFP, selected "Prompt user to allow an exemption", and denied permission when asked without "remember for this process", the request would pop up 6 or 7 times, and would succeed the 7/8th time. |
Have you also created a rule for the process in the 'Process Restrictions' section of the 'Network Options'?
|
Thanks again. That helped. I didn't understand I had to make exceptions in 2 places. Maybe I make some incorrect assumptions, but I find the entire feature group quite hard to deal with. Other examples.. |
|
|
I'll add this one here:
I tried double-quoting this entry without success. Side note: not a priority for me, but this may cause other issues. Section "Network Firewall" accepts this input but I don't know if the firewall correctly interprets the settng. |
The entire feature group is indeed quite a bit confusing as there are 2 levels of blocking There was an other bug not adding the required that said, not allowing comas in process names is a general sandboxie.ini issue and applies to all options. |
Describe what you noticed and did
Sandboxie-Plus 1.9.3 x64 on Win 10.
I'm unable to block outgoing internet requests with the WFP Network firewall. Where can I find a working example to (1) block a specific executable; (2) block all executables residing inside or outside the sandbox?
Repro:
Expected: Request is blocked.
Actual: Request succeeds.
Same situation when running the default browser (installed outside of the sandbox) in this sandbox.
Related issues:
Expected: Browsing fails
Actual: Browsing succeeds
What is the meaning of this statement? I presume the idea is that if - and only if - "Block by denying access to Network devices" is selected, then the programs added to the list are not excempting executables that reside inside the sandbox folders?
How often did you encounter it so far?
Always
Affected program
Chrome; curl
Download link
https://curl.se/windows/
Where is the program located?
The program is installed only inside a sandbox (NOT in the real system anyway).
Expected behavior
Web requests should be blocked.
What is your Windows edition and version?
Windows 10 Pro 22H2
In which Windows account you have this problem?
A local or Microsoft account without special changes.
Please mention any installed security software
MS Defender only
What version of Sandboxie are you running?
1.9.3
Is it a new installation of Sandboxie?
I recently did a new clean installation.
Is it a regression?
No response
In which sandbox type you have this problem?
In a security hardened sandbox (orange sandbox icon).
Can you reproduce this problem on a new empty sandbox?
I can confirm it also on a new empty sandbox.
Did you previously enable some security policy settings outside Sandboxie?
no
Crash dump
No response
Trace log
No response
Sandboxie.ini configuration
The text was updated successfully, but these errors were encountered: