tsesani I did look at it deeper and hen you set firewall_type="open"
, that means all traffic is allowed inbound and outbound. It doesn’t just open SSH. It disables packet filtering entirely. So yes, your system is now “open to anything.”
Here’s the breakdown:
firewall_type="workstation"
(the default in GhostBSD now) → Protects only the local machine. Outbound is mostly allowed, but inbound (like SSH) is blocked unless explicitly opened.
firewall_type="open"
→ No restrictions at all. Everything passes.
firewall_enable="NO"
→ Effectively disables the firewall (same effect as open
, but it doesn’t even load the ruleset).
If you want SSH to work but still have some firewall protection, you don’t have to switch to open
. Instead, you can keep firewall_type="workstation"
and allow SSH by adding firewall_myservices="22/tcp"
to /etc/rc.conf
:
That line tells the firewall to permit inbound SSH connections while still blocking other unwanted inbound traffic.