This is a month old thread, reawakened.
pgeorgan wrote:
This is just a redirect to a post about someone saying you shouldn't use third-party firewalls because it will "cause problems".
Actually, your machine will do exactly what it's intended to do, even without the internet. If you're big into iCloud stuff, sure it can be precarious to use something like Little Snitch.
That being said, in the right hands, Little Snitch is a very effective and powerful tool in combatting bloatware and spying, etc...
Judged solely by the traffic posted around here, Little Snitch exists to cause collateral-damage questions.
Which is why the perceptions of that tool lean negative around here.
Not because the tool doesn’t work, or doesn’t work well, or doesn’t do what it claims, but because the tool does work and does work well, and because the folks around here then get asked to fix the results of the damage caused, or to research and identify what is typically innocuous network activities.
We don’t get the positive postings.
As for this case, I’m mildly puzzled how IP 17/8 can even access the host involved, as most Macs are configured behind a firewall / gateway / router / NAT box. Which would default-block an incoming connection from 17/8. Which means port forwarding or NAT games or an exposed Mac on a public IP address. But details are lacking.
Apple doesn’t list UDP 514, TCP 514, or TCP 6514 TLS usage in their well-known ports list, either.
Whether Little Snitch didn’t provide details of the incoming connection, or those were omitted here, or something else got garbled somewhere?
Next steps are to use tcpdump or a TLS-capable client or maybe mitmproxy or such, and see what the incoming traffic is. On whichever port. But catching unsolicited incoming traffic gets ugly without a managed switch and port mirroring, or without some other layer 3 shenanigans. To also check if anything is connected and listening locally, too.
Or we can also assume that a security attack arising from Apple 17/8 hosts means we’re all doomed.