ColDen
Senior Member
Here are the results:Gather some data and reinstall if you prefer:
Code:cat /tmp/skynet.lock ls -l /tmp/skynet.lock ps ww | grep firewall lsof | grep skynet.lock
Here are the results:Gather some data and reinstall if you prefer:
Code:cat /tmp/skynet.lock ls -l /tmp/skynet.lock ps ww | grep firewall lsof | grep skynet.lock
Wow. That’s a mess, kind of. I would reboot and upgrade.Here are the results:
The whitelist works, but there’s a bug in the comment being added and they are added with the comment “nofilter” instead of “ManualWlist:…”. The order of parameters passed to the wrapper function seems to be wrong in that scenario. For @Adamm to fix.whitelist don't appear to be working.
I tried adding a single IP address in as 12.34.56.78/32 and as 12.34.56.78, or without the bitmask, and it's not showing up when I go to view the whitelist, that's without CDN whitelisting turned on. I have chosen to save changes, and then view, this works for the CDN whitelisting so that when going to view and having disabled the CDN whitelisting--viewing the whitelist shows only what's been whitelisted and not the CDNs.The whitelist works, but there’s a bug in the comment being added and they are added with the comment “nofilter” instead of “ManualWlist:…”. The order of parameters passed to the wrapper function seems to be wrong in that scenario. For @Adamm to fix.
Actually, the ranges won’t work since the nofilter option isn’t passed properly. So you can whitelist an IP, but not a range at the moment.
For now, you can verify if they are there withI tried adding a single IP address in as 12.34.56.78/32 and as 12.34.56.78, or without the bitmask, and it's not showing up when I go to view the whitelist,
ipset -L Skynet-Whitelist | grep nofilterfix whitelist parameters to wrapper function @dave14305
Improve Domain_Lookup()
- No accidental whitelisting of DNS resolvers.
- Correct handling for CNAME → A-record chains.
Improve Check_Lock() handling of existing processes
Update to new ban reason method in WebUI stats
Fix Refresh_MBans()
IPTables Rules | [Failed]
[*] Skynet Not Running - Exiting
Log Level 6 Settings [Failed]
IPTables Rules [Failed]
[*] Rule Integrity Violation - [ #12 ]
This is related to a check when a vpn server is enabled. Check the output of[*] Rule Integrity Violation - [ #12 ]
iptables -S FORWARD | grep Skynet-IOT for tun2+ rules. Skynet is looking for:-A FORWARD -i br+ -o tun2+ -m set --match-set Skynet-IOT src -j ACCEPT
I don't have any VPN server active on that router. I think line #12 is looking for WireGuard VPN. Here is what I tried next:This is related to a check when a vpn server is enabled. Check the output ofiptables -S FORWARD | grep Skynet-IOTfor tun2+ rules. Skynet is looking for:
Code:-A FORWARD -i br+ -o tun2+ -m set --match-set Skynet-IOT src -j ACCEPT
iptables -S FORWARD | grep Skynet-IOT
iptables -I FORWARD -i br+ -o tun2+ -m set --match-set Skynet-IOT src -j ACCEPT
iptables -I FORWARD -i br+ -o wgs+ -m set --match-set Skynet-IOT src -j ACCEPT
-A FORWARD -i br+ -o eth1 -p icmp -m set --match-set Skynet-IOT src -j ACCEPT
-A FORWARD -i br+ -o eth1 -p udp --dport 123 -m set --match-set Skynet-IOT src -j ACCEPT
-A FORWARD -i br+ -m set --match-set Skynet-IOT src -j LOG --log-prefix "[BLOCKED - IOT]"
-A FORWARD -i br+ -m set --match-set Skynet-IOT src -j DROP
-A FORWARD -i br+ -o tun2+ -m set --match-set Skynet-IOT src -j ACCEPT
Thanks for your assistance,Wow. That’s a mess, kind of. I would reboot and upgrade.
What is process 22813 (nvram)?

Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!