UFW syslog / kernel.log spam for INVALID packets
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ufw (Ubuntu) |
Fix Released
|
Undecided
|
Jamie Strandboge |
Bug Description
Binary package hint: ufw
I have UFW enabled with the default policy set to ALLOW.
When using Deluge, a BitTorrent client, UFW spams the logs with the lines similar to the following:
Mar 26 11:12:53 Gilliam kernel: [ 6507.872105] [UFW BLOCK INVALID]: IN=eth0 OUT= MAC=00:
Mar 26 11:12:54 Gilliam kernel: [ 6508.074424] [UFW BLOCK INPUT]: IN=eth0 OUT= MAC=00:
The [UFW BLOCK INVALID] lines are far more common. Specifying this policy in UFW seems to have no effect:
To Action From
-- ------ ----
51555:tcp ALLOW Anywhere
51555:udp ALLOW Anywhere
Upon closing Deluge, the log entries continue (albeit less frequently) until I close the port 51555 on my router.
Related branches
description: | updated |
description: | updated |
Changed in ufw: | |
assignee: | nobody → jamie-strandboge |
Is there a config file that tells UFW what to log?