I did a search
and didn’t find anything close to my inquiry, so I hope this is okay. I’m not necessarily new to network security, just old hat as in used to delve “deeper” 5-10 years ago on an intermediate level, and my brain is mush right now, dealing with setting up a new router to replace an old Motorola modem/router for the home base. My brain also functions on past experiences with targeted doxxing and no, not paranoid (well, yes, but it’s circumstantial). Any help would be greatly appreciated. (Edited for spelling)
I am setting up a new router and modem combo. Before setting up the modem, I was accessing the Flint AX1800 (edit) firmware 4.7.13, via USB tethered to iOS SE 2, with OS 18 to change security settings. Also using Proton VPN on that phone as well as installed on the router per Wireguard. Macbook Mid 2012 Mojave, also with Proton VPN active, used to access router via ethernet port 1. Set up LuCi for firewall and other settings access. I checked the kernel logs and this seems concerning to me (I use "****" to block out potential identifiers, but I am unsure if necessary):
[ 22.090562] kmwan: sensitivity and mode are set.
[ 23.433904] tertf: br-lan registered, add it
[ 23.477293] br-lan: port 1(eth1) entered blocking state
[ 23.477330] br-lan: port 1(eth1) entered disabled state
[ 23.481600] device eth1 entered promiscuous mode
[ 23.703674] br-lan: port 2(eth2) entered blocking state
[ 23.703714] br-lan: port 2(eth2) entered disabled state
[ 23.710090] device eth2 entered promiscuous mode
[ 23.918109] br-lan: port 3(eth3) entered blocking state
[ 23.918140] br-lan: port 3(eth3) entered disabled state
[ 23.922630] device eth3 entered promiscuous mode
[ 24.130812] br-lan: port 4(eth4) entered blocking state
[ 24.130844] br-lan: port 4(eth4) entered disabled state
[ 24.135153] device eth4 entered promiscuous mode
[ 27.435196] nss-dp 3a001200.dp2 eth1: PHY Link up speed: 1000
[ 27.435295] br-lan: port 1(eth1) entered blocking state
[ 27.439918] br-lan: port 1(eth1) entered forwarding state 10.351860] xt_time: kernel timezone is -0000
[ 10.353919] usbcore: registered new interface driver cdc_ether
[ 10.357664] usbcore: registered new interface driver cdc_ncm
[ 10.378978] usbcore: registered new interface driver huawei_cdc_ncm
[ 10.402234] usbcore: registered new interface driver qmi_wwan
[ 10.404264] usbcore: registered new interface driver rndis_host
[ 10.473862] usbcore: registered new interface driver option
[ 10.473925] usbserial: USB Serial support registered for GSM modem (1-port)
[ 15.515157] ath11k c000000.wifi: Not multipd architecture
[ 15.515439] ath11k c000000.wifi: ipq6018 hw1.0
[ 15.519818] remoteproc remoteproc0: powering up cd00000.remoteproc
[ 15.546918] remoteproc remoteproc0: Booting fw image IPQ6018/q6_fw.mdt, size 7340
[ 16.601379] Subsystem error monitoring/handling services are up
[ 16.607117] qcom,cpr4-apss-regulator b018000.cpr4-ctrl: CPR valid fuse count: 4
[ 16.608281] qcom,cpr4-apss-regulator b018000.cpr4-ctrl: CPR valid fuse count: 4
[ 16.654032] ath11k c000000.wifi: chip_id 0x0 chip_family 0x4 board_id 0xff soc_id 0xffffffff
[ 16.654065] ath11k c000000.wifi: fw_version 0x27038969 fw_build_timestamp 2024-08-07 06:44 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HK.****-****-********-1
[ 16.686635] ath11k c000000.wifi: qmi caldata downloaded: type: 2
[ 16.715159] remoteproc remoteproc0: remote processor cd00000.remoteproc is now up
[ 16.968385] remoteproc remoteproc0: stopped remote processor cd00000.remoteproc
[ 16.968423] remoteproc remoteproc0: powering up cd00000.remoteproc
[ 16.974589] remoteproc remoteproc0: Booting fw image IPQ6018/q6_fw.mdt, size 7340
[ 17.275825] Subsystem error monitoring/handling services are up
[ 17.281463] qcom,cpr4-apss-regulator b018000.cpr4-ctrl: CPR valid fuse count: 4
[ 17.282636] qcom,cpr4-apss-regulator b018000.cpr4-ctrl: CPR valid fuse count: 4
[ 17.328364] ath11k c000000.wifi: chip_id 0x0 chip_family 0x4 board_id 0xff soc_id 0xffffffff
[ 17.328395] ath11k c000000.wifi: fw_version 0x27038969 fw_build_timestamp 2024-08-07 06:44 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HK.****
[ 17.341322] ath11k c000000.wifi: qmi caldata downloaded: type: 2
[ 17.395133] remoteproc remoteproc0: remote processor cd00000.remoteproc is now up
[ 17.395901] kmodloader: done loading kernel modules from /etc/modules.d/*
[ 17.401964] qcom,cpr4-apss-regulator b018000.cpr4-ctrl: CPR valid fuse count: 4
[ 17.483599] applying ath11k-macs
[ 17.514539] ath11k c000000.wifi: Direct firmware load for ath11k/IPQ6018/hw1.0/qdss_trace_config.bin failed with error -2
[ 17.514593] ath11k c000000.wifi: Falling back to sysfs fallback for: ath11k/IPQ6018/hw1.0/qdss_trace_config.bin
[ 17.858871] ath11k c000000.wifi: Direct firmware load for qdss_trace_config.bin failed with error -2
[ 17.858913] ath11k c000000.wifi: Falling back to sysfs fallback for: qdss_trace_config.bin
[ 17.932635] ath11k c000000.wifi: qmi failed to load QDSS config: qdss_trace_config.bin
[ 17.932673] ath11k c000000.wifi: Failed to download QDSS config to FW: -12
[ 22.090562] kmwan: sensitivity and mode are set.
[ 23.433904] tertf: br-lan registered, add it
[ 23.477293] br-lan: port 1(eth1) entered blocking state
[ 23.477330] br-lan: port 1(eth1) entered disabled state
[ 23.481600] device eth1 entered promiscuous mode
[ 23.703674] br-lan: port 2(eth2) entered blocking state
[ 23.703714] br-lan: port 2(eth2) entered disabled state
[ 23.710090] device eth2 entered promiscuous mode
[ 23.918109] br-lan: port 3(eth3) entered blocking state
[ 23.918140] br-lan: port 3(eth3) entered disabled state
[ 23.922630] device eth3 entered promiscuous mode
[ 24.130812] br-lan: port 4(eth4) entered blocking state
[ 24.130844] br-lan: port 4(eth4) entered disabled state
[ 24.135153] device eth4 entered promiscuous mode
[ 27.435196] nss-dp 3a001200.dp2 eth1: PHY Link up speed: 1000
[ 27.435295] br-lan: port 1(eth1) entered blocking state
[ 27.439918] br-lan: port 1(eth1) entered forwarding state
What is concerning me is "[ 23.477293] br-lan: port 1(eth1) entered blocking state
[ 23.477330] br-lan: port 1(eth1) entered disabled state
[ 23.481600] device eth1 entered promiscuous mode"
etc
and
"remoteproc remoteproc0: remote processor cd00000.remoteproc is now up"
What's more, on the macbook in the network activity monitor, Syslog keeps sending out packets with PID 42, root user. Which is another topic in itself along with “sandbox” messages, probably best on a different forum discussion but maybe informative for this topic.
Let me know if anything else is needed. Thank you in advance.