diff --git a/dap_stream_ch_vpn.c b/dap_stream_ch_vpn.c
index 856052824af3fe6ebb812a17833510767419449b..ed3c6722cb5f3053324fb16d1a134d69f83a5b7d 100644
--- a/dap_stream_ch_vpn.c
+++ b/dap_stream_ch_vpn.c
@@ -493,8 +493,8 @@ void ch_sf_packet_in(stream_ch_t* ch , void* arg)
                 sin.sin_port = 0;
                 sin.sin_addr.s_addr = in_daddr.s_addr;
 
-                if((ret=sendto(CH_SF(ch)->raw_l3_sock , sf_pkt->data,sf_pkt->header.op_data.data_size,0,(struct sockaddr *) &sin, sizeof (sin)))<0){
-                //    if((ret = write(raw_server->tun_fd, sf_pkt->data, sf_pkt->header.op_data.data_size))<0){
+                //if((ret=sendto(CH_SF(ch)->raw_l3_sock , sf_pkt->data,sf_pkt->header.op_data.data_size,0,(struct sockaddr *) &sin, sizeof (sin)))<0){
+                if((ret = write(raw_server->tun_fd, sf_pkt->data, sf_pkt->header.op_data.data_size))<0){
                     log_it(L_ERROR,"write() returned error %d : '%s'",ret,strerror(errno));
                         //log_it(L_ERROR,"raw socket ring buffer overflowed");
                     ch_sf_pkt_t *pkt_out = (ch_sf_pkt_t*) calloc(1,sizeof(pkt_out->header));
@@ -504,9 +504,9 @@ void ch_sf_packet_in(stream_ch_t* ch , void* arg)
                     stream_ch_pkt_write(ch,'d',pkt_out,pkt_out->header.op_data.data_size+sizeof(pkt_out->header));
                     stream_sf_socket_ready_to_write(ch,true);
                 }else{
-                //log_it(L_DEBUG, "Raw IP packet daddr:%s saddr:%s  %u from %d bytes sent to tun/tap interface",
-                //     str_saddr,str_daddr, sf_pkt->header.op_data.data_size,ret);
-                //log_it(L_DEBUG,"Raw IP sent %u bytes ",ret);
+               // log_it(L_DEBUG, "Raw IP packet daddr:%s saddr:%s  %u from %d bytes sent to tun/tap interface",
+                     //str_saddr,str_daddr, sf_pkt->header.op_data.data_size,ret);                     
+               // log_it(L_DEBUG,"Raw IP sent %u bytes ",ret);
                 }
             //}
             }break;