Just saw this when executing showlog -f, is there any reason for concern? The packets are exiting via wlan-out
-- Before activating firewall:
Code:
140517:012540 phd[2981]: I udp_tph:listening:host = 23.23.189.4:
140517:012540 phd[2981]: I udp_tph:goto:srv=23.23.189.27, port=33434:GOTO server
-- After activating:
Code:
140517:013011 phd[2981]: E udp_tph:sendto_error:to = 23.23.189.27:33434, ret = -1 (of 149), errno = Operation not permitted (1):
140517:013011 phd[2981]: I udp_tph:restart_udp_tph_rcvr:ret = 6:
140517:013013 phd[2981]: I udp_tph:listening:host = 23.23.189.4:
140517:013013 phd[2981]: E udp_tph:sendto_error:to = 23.23.189.4:33434, ret = -1 (of 136), errno = Operation not permitted (1):
140517:013013 phd[2981]: I udp_tph:restart_udp_tph_rcvr:ret = 6:
140517:013015 phd[2981]: I udp_tph:listening:host = 23.23.189.4:
140517:013015 phd[2981]: E udp_tph:sendto_error:to = 23.23.189.4:33434, ret = -1 (of 136), errno = Operation not permitted (1):
140517:013015 phd[2981]: I udp_tph:restart_udp_tph_rcvr:ret = 6:
Last 3 messages repeat every 2 seconds until firewall is enabled again or airplane mode activated.
Here are the fw stats:
Code:
[root@kindle root]# iptables -L wlan-out -nv | head -n5
Chain wlan-out (1 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 23.0.0.0/12
154 25269 DROP all -- * * 0.0.0.0/0 23.20.0.0/14
0 0 DROP all -- * * 0.0.0.0/0 50.16.0.0/14