of-the-stack wrote:
I just want fw to block all incoming non-essential traffic, don't care about anything else since it's...well, non-essential...
Honest question - do those settings actually do that?
Here is what those settings are doing...
--setblockall off - this basically turns off blocking.
--setallowsigned on - enables all built-in apps to listen for connections.
--setallowsignedapp on - enables all 3rd party apps to listen for connections.
--setloggingmode on - I challenge you to find these logs.
--setstealthmode on - does not rely to ping requests.
--setglobalstate on - this enables the firewall, subject to other configuration settings. In your case, you are blocking incoming connections to ping and any unsigned software.
Most people do not have a direct connection to the internet, so I will skip talking about data centres and internet exchanges. It is possible that you've setup your Mac as a DMZ on your home network. I don't recommend that. If you haven't configured your Mac to be the DMZ, then really none of this applies at all. All network requests come into your router. You would have to configure the router to direct certain requests to your Mac. Otherwise, the router will simply ignore them. A DMZ would direct all external requests directly to your Mac. You don't want to do that. So in most cases, the firewall is essentially protecting your Mac from any other computer that is also connected to your WiFi. That's it.
But let's assume you did configure your Mac to be a DMZ. This is more interesting. Let's look at what the firewall is actually doing. Since you have enabled "stealth mode", it is blocking ping requests. OK. I don't know how your WiFi is configured, but mine already doesn't respond to ping requests.
However, you are allowing all other built-in apps to listen for incoming network connections. You are even allowing all signed 3rd party apps to listen for incoming network connections. Unsigned software is blocked. This would include malware, because it is usually unsigned. But malware typically doesn't listen for connections to begin with. Malware assumes you are on a WiFi connection so it is going to initiate connections to its command-and-control server. Probably the only software that would be blocked is open source software that you've compiled on your own machine. This is often server software for running some kind of server on your home computer. In short, the only software that is likely to be blocked is the software that, if you have it, you most likely don't want blocked at all.
So do you see what this is useless? It literally isn't blocking anything. What little it does block is probably already blocked even if the firewall is turned off. If you did have your Mac configured as a DMZ, it is wide open. Any external connection you make could be logged and tracked. And those logs you are leaving all across the internet are much easier to read than the firewall logs that you've enabled. If someone wants to explore your computer, they aren't going to use ping. They are going to use any one of the few hundred well-known ports. Those are the same ports that, with your configuration, your Mac is listening for.