I am using SSH to connect from my phone to my server and I would like to route all off-device network traffic through that connection. To do this, I am using SSH Persistent Tunnels (SPT) with dynamic forwarding (acts as a SOCKS proxy). I then configure the applications so that they route their traffic through this proxy.
In this situation, I would like to use Android Firewall (AF) to block all of my external ports and prevent any traffic from applications that does not flow through SSH. However, it I use AF to block access to WiFi and 3G, it also seems to block access to localhost, and so to SSH.
Is there a way short of writing and importing my own rules to turn off the restriction on traffic to localhost?
I am using SSH to connect from my phone to my server and I would like to route all off-device network traffic through that connection. To do this, I am using SSH Persistent Tunnels (SPT) with dynamic forwarding (acts as a SOCKS proxy). I then configure the applications so that they route their traffic through this proxy.
In this situation, I would like to use Android Firewall (AF) to block all of my external ports and prevent any traffic from applications that does not flow through SSH. However, it I use AF to block access to WiFi and 3G, it also seems to block access to localhost, and so to SSH.
Is there a way short of writing and importing my own rules to turn off the restriction on traffic to localhost?