Then I opened the /etc/ufw/user.rules file and saw this:
Code: Select all
### RULES ###
### tuple ### allow tcp 1714:1764 ::/0 any ::/0 in
-A ufw6-user-input -p tcp -m multiport --dports 1714:1764 -j ACCEPT
### tuple ### allow udp 1714:1764 ::/0 any ::/0 in
-A ufw6-user-input -p udp -m multiport --dports 1714:1764 -j ACCEPT
### END RULES ###
In other words, I thought that in a house having three doors, I give the key to one of the doors to one trusted neighbour. Now, it seems to me that in a house with three doors ... one door is left open for whoever pulls the handle. Is this metaphor correct?
Is it possible to set more restrictive rules in the firewall, e.g. rules that distinguish (even directly) between the real traffic from KDE Connect and potential attack traffic on ports typically used by KDE Connect? If possible, I would ask for a template of enhanced rules for the firewall.
Maybe is it possible to leave these ports open, but restrict only for the traffic from my particular devices, not for the whole internet?
Maybe it would be a good idea to protect KDE Connect differently, e.g. with AppArmor? Does it make some sense?