Package Details: opensnitch-git 20181008.359_c10e7a3-3

Git Clone URL: (read-only)
Package Base: opensnitch-git
Description: A GNU/Linux port of the Little Snitch application firewall.
Upstream URL:
Licenses: GPL
Provides: opensnitch, opensnitch-ui
Submitter: None
Maintainer: lsf
Last Packager: lsf
Votes: 18
Popularity: 0.009234
First Submitted: 2017-05-03 14:15
Last Updated: 2018-10-16 14:26

Latest Comments

1 2 3 4 5 6 Next › Last »

squalou commented on 2019-08-08 11:54

Hi,my daemon doesn't start. In daemons logs I get this weird error.

[2019-08-08 11:51:14] !!! Error while enabling probe descriptor for opensnitch_exec_probe: write /sys/kernel/debug/tracing/kprobe_events: no such file or directory

Some issues in upstream projects seem to state I'm not alone ... did anyone face this ? I'm running 4.19 LTS kernel. In /proc/config.gz I can see : CONFIG_KPROBE_EVENTS=y

debugfs is correctly mounted, files do exist. (-rw-r--r-- 1 root root 0 8 août 13:51 /sys/kernel/debug/tracing/kprobe_events)

lsf commented on 2019-06-25 16:37

That shouldn't be necessary. python-unicode-slugify-git uses provides=(python-unicode-slugify). Your AUR helper should understand this (yay does).

eniac commented on 2019-06-25 15:09

python-unicode-slugify is unavailable, it should be replaced with python-unicode-slugify-git in the pkgbuild

lsf commented on 2019-04-24 21:25

No. Or rather: only under very specific circumstances. I don't know how much you know about gnupg/pgp, so I'll just keep it short: What you did is import a key of some person who signs packages with it. Now you can additionally verify the integrity of packages/files signed with this key (in addition to the basic checksums). In some cases, the keys used are provided by the maintainer of the software that is packaged, in other cases it's by the person packaging it for the AUR, providing different amounts of extra "trust". This would only be an issue if you'd now blindly trust everything signed with this key, installed AUR packages without inspecting them and the key owner intentionally created a "bad" package (or someone got hold of his key and created one). So basically: no, everything's fine, as long as you follow basic "AUR hygiene", as stated in: => "Warning: Carefully check the PKGBUILD, any .install files, and any other files in the package's git repository for malicious or dangerous commands. If in doubt, do not build the package, and seek advice on the forums or mailing list. Malicious code has been found in packages before."

washo commented on 2019-04-24 21:05

@lsf Thank's a lot! By the way, could this compromise the security of the system somehow?

lsf commented on 2019-04-24 18:56

You need to import the public key in your personal gpg keyring (there are ways around cluttering your regular keyring, but let's just stick with using it for simplicity). See:!

It boils down to gpg --recv-keys 8C004C2F93481F6B, but optimally you would also verify the fingerprint of the key as provided "upstream", to ensure it's the actual and correct key you've imported via the aforementioned command.

washo commented on 2019-04-24 18:16

I had this issue when installing. I already installed the package "python-unicode-slugify-git". Any solution? I'm using Antergos linux. Thank you guys :D

==> Validating source files with sha512sums...

grpcio-tools-1.20.0.tar.gz ... Passed
grpcio-tools-1.20.0.tar.gz.sig ... Skipped

==> Verifying source file signatures with gpg...

grpcio-tools-1.20.0.tar.gz ... FAILED (unknown public key 8C004C2F93481F6B)

==> ERROR: One or more PGP signatures could not be verified!

twnaing commented on 2019-02-21 05:42

Dependencies list all the python3 package. opensnitch-ui script use #!/sbin/python2. I have to install dependencies using pip2 install futures grpcio grpcio-tools pyinotify unicode_slugify pyqt5 configparser --user

parkerlreed commented on 2019-02-06 15:32

@gvhoecke git packages don't need their pkgver bumped for every single little update. Use a sane AUR helper that can actually detect upstream changes. There's no reason to flag this.

From the wiki: "Note: VCS packages are not considered out of date when the pkgver changes, do not flag them as the maintainer will merely unflag the package and ignore you. AUR maintainers should not commit mere pkgver bumps."

simona commented on 2018-11-29 23:05

ok:-) installed. thanks.