Yume sdk log???? - Wildfire Q&A, Help & Troubleshooting

Every now and then I keep finding a yumesdklog.txt folder on my sdcard,inside its mentioning ads of some sort!!! As I switch between (upto 4) roms its kind of hard to determine where its from. Does anyone know what this is and where its being produced from?
Attached log.txt zip if anyone can take a look and figure it out??
Removed log. This has not popped up again for quite some time now. I think it was actually the Google voice search after all as I'm still using all the other apps.
sent from Willy Wilderbeast

slymobi said:
Every now and then I keep finding a yumesdklog.txt folder on my sdcard,inside its mentioning ads of some sort!!! As I switch between (upto 4) roms its kind of hard to determine where its from. Does anyone know what this is and where its being produced from?
sent from Willy Wilderbeast
Click to expand...
Click to collapse
I found this.
http://mediaplayer-gallery.com/2011...me-sdk-to-create-ad-serving-platform-network/
It doesnt explain where the file is from but my help understand what it is maybe? YuMe, something to do with an ad-platform for app developers.

!!!!! Still stumped lol. Only new apps I'm using is new Google play and voice ?? Gonna try removing the voice app (can't remember name) when I switch back to cm7.on sense atm so I can watch cheltenham without stream fail.
UTID

god knows, theres a few posts in android forums about it, but other than that, i think they are just watching you......

Ok its 1 of 4 apps creating this log txt. Skygo,googlevoice search,racingpost or playstore.
I only notice it after switching from the rom I use for skygo,which has the above mentioned apps.
Not too worried about it but would ease my mind knowing lol.
if this text has changed,then so has my rom.

looks like the file is involved in online video advertising centered around LG and samsung

Its just popped up again? Switched from cm7 user build 14 to cm7#255 and the only apps i use on all my roms is the play store and racingpost,so I reckon one of them is causing this log at some point??
The racingpost is a betting app in the UK.
Added log.txt zip in 1st post now!!!
sent from Willy Wilderbeast

Don't think its the play store but you never know.....
I've just downloaded racing post, ill leave it on for a while see if I get it too.
Sent from my HTC Wildfire using xda premium

Scratch0805 said:
Don't think its the play store but you never know.....
I've just downloaded racing post, ill leave it on for a while see if I get it too.
Sent from my HTC Wildfire using xda premium
Click to expand...
Click to collapse
I delete the log when it crops up and then it pops back again when I switch Rom or reboot after a backup. Like I said I have 4 Roms I use and the apps mentioned are on all 4 Roms. I've eliminated Google voice as the suspect and from my roms lol.cheers for testing.I got the racing post app direct from William hill web as its partnered for horse racing betting.
sent from Willy Wilderbeast

my 2 cents
I think Pandora uses this "yume sdk log" now. I really dontt like applications creating multiple random folders. They should have to display everything they have access to on users sdcard as well as any folders that it needs to create to use.

its gone for me,I have no idea what or where it was/from but its never returned to date.
" Tomorrow .... its a brand new Today "

might want to try leaving the file there, but deleting its contents and replacing with "please stop tracking me" or whatever and then changing permissions on the file and it's containing folder to read only.
Sent from my Amazon Kindle Fire using Xparent Blue Tapatalk 2
---------- Post added at 05:05 PM ---------- Previous post was at 05:03 PM ----------
I didn't think of that til after I deleted it, but if it pops up again, I think I'll give it a try.
Sent from my Amazon Kindle Fire using Xparent Blue Tapatalk 2

For me this file was created from using Slacker Radio.
How you can find out what is causing this folder and file to be created is to connect your phone to your computer (enabling USB from phone) then using windows explorer see what date the file was modified. After this do a search on that drive for that date using the "When was it modified?" option with the modified date. Sort the results by date modified and you will see what created it at that same time.

Yume SDK log
Sorry for bumping this old thread, I also posted this response in another thread. I have this log on my transformer and nexus 7. I believe it is from Cut the Rope Free in my case, due to the mention of zeptolab in the log file.
Code:
12:10:42:960 AM: (I): YuMe SDK Instantiated Successfully.
12:10:42:960 AM: (I): YuMeSDK_Init(): Invoked.
12:10:42:961 AM: (I): YuMe SDK Version: 3.0.10.9
12:10:42:962 AM: (I): AD PARAMS SET BY APPLICATION:
12:10:42:962 AM: (I): adDomainUrl: yumenetworks... com/
12:10:42:962 AM: (I): domainId: 791MaaQqZdV
12:10:42:962 AM: (I): qsParams: iabcat=HobbiesandInterests&iabsubcat=VideoandComputerGames
12:10:42:963 AM: (I): adTimeout: 8
12:10:42:963 AM: (I): videoTimeout: 8
12:10:42:964 AM: (I): bSupportMP4: false
12:10:42:964 AM: (I): bSupport3GPP: false
12:10:42:965 AM: (I): bSupportHighBitRate: false
12:10:42:965 AM: (I): bSupportAutoNetworkDetect: false
12:10:42:965 AM: (I): bEnableCaching: true
12:10:42:966 AM: (I): bEnableAutoPrefetch: true
12:10:42:966 AM: (I): storageSize: 10.0
12:10:42:967 AM: (I): bEnableCBToggle: true
12:10:42:967 AM: (I): bEnableLocationSupport: true
12:10:42:967 AM: (I): bEnableFileLogging: true
12:10:43:379 AM: (I): Current Display Orientation: PORTRAIT
12:10:43:380 AM: (I): Device Resolution: Width: 800, Height: 1205
12:10:43:380 AM: (I): Device is identified as an Android TABLET.
12:10:43:382 AM: (I): No Cookies loaded from Persistent Storage.
12:10:43:382 AM: (I): SDK Modules Created.
12:10:43:386 AM: (I): External jars required for supporting 'Tap To Calendar' found.
12:10:43:387 AM: (I): Permission GRANTED for Calendar Read & Write Operations.
12:10:43:388 AM: (I): Permission GRANTED for reading Phone State.
12:10:43:390 AM: (I): WiFi Connectivity not available.
12:10:43:391 AM: (I): Cellular Connectivity available.
12:10:43:396 AM: (I): Permission GRANTED for accessing Location Info.
12:10:43:398 AM: (I): Location Providers Enabled: Network:GPS:Passive => true:false:true
12:10:43:402 AM: (I): Orientation Listener Set Successfully.
12:10:43:404 AM: (I): Broadcast Receiver Set Successfully.
12:10:43:405 AM: (I): External Storage is Accessible.
[B]12:10:43:407 AM: (I): Files Directory Path (External Storage): /storage/sdcard0/Android/data/com.zeptolab.ctr.ads/files[/B]
12:10:43:410 AM: (I): YuMeSDK_Init(): Successful.
12:10:43:411 AM: (I): ********** YuMeSDK_InitAd(): Invoked with AdBlock: YUME_ADBLOCKTYPE_PREROLL **********
12:10:43:411 AM: (I): framePlaylistRequest - Start.
12:10:43:412 AM: (I): WiFi Connectivity not available.
12:10:43:413 AM: (I): Cellular Connectivity available.
12:10:43:416 AM: (I): Playlist Request Body: {"content":{"tags":[],"guid":"","categories":[],"duration":"","title":""},"demography":{"gender":"","keywords":[],"education":"","interests":[],"income":"","age":""},"connection":{"type":"Cellular","bandwidth":"","service_provider":""},"referrer":"","geography":{"ip_address":"","postal_code":"","state":"","gyroscope":"portrait","longitude":"*********","latitude":"**********","city":"","country":""},"player":{"height":"0","width":"0","version":""},"playlist_version":"v2","yume_sdk":{"exclude_placements":[],"pre_fetch":"true","ad_guid":[],"version":"3.0.10.9"},"device":{"os":"Android","storage_quota_in_mb":"10.0","model":"Nexus 7","height":"1205","width":"800","hardware_version":"","uuid":"","make":"asus","os_version":"4.1.1"},"domain":"791MaaQqZdV","publisher_channel":"","imu":[],"publisher_page":""}
12:10:43:416 AM: (I): PF Playlist Url: cat=VideoandComputerGames
12:10:43:416 AM: (I): framePlaylistRequest - End.
12:10:43:417 AM: (I): No Downloads to be Aborted.
12:10:43:418 AM: (I): YuMeSDK_InitAd(): Successful.
12:10:43:823 AM: (I): ORIENTATION Changed to PORTRAIT.
12:10:43:845 AM: (I): PF Playlist Fetched.
12:10:43:881 AM: (E): Empty PF Playlist received.
12:10:43:883 AM: (I): Current Playlist State: YUME_PFPLAYLISTSTATE_PLAYLISTREADY
12:10:43:888 AM: (I): Starting Prefetch Request Callback Timer: Interval (secs): 900
12:10:44:13 AM: (I): Notifying Ad Event(YUME_ADBLOCKTYPE_PREROLL): adEvent: YUME_ADEVENT_ADNOTREADY
12:11:15:545 AM: (I): YuMeSDK_PauseDownload(): Invoked.
12:11:15:546 AM: (I): No Downloads to be Paused.
12:11:15:547 AM: (I): YuMeSDK_PauseDownload(): Successful.
12:11:17:153 AM: (I): YuMeSDK_ResumeDownload(): Invoked.
12:11:17:154 AM: (I): No Downloads to be Resumed.
12:11:17:155 AM: (I): YuMeSDK_ResumeDownload(): Successful.
12:11:26:524 AM: (I): YuMeSDK_DeInit(): Invoked.
12:11:26:531 AM: (I): Orientation Listener Reset Successfully.
12:11:26:535 AM: (I): Broadcast Receiver Reset Successfully.
12:11:26:541 AM: (I): Stopping Prefetch Request Callback Timer.
12:11:26:543 AM: (I): Aborting Common Downloads...
12:11:26:552 AM: (I): YuMeSDK_DeInit(): Successful.

Yume Sdk Log
It's Pandora for sure. I've never seen a file with this name in two years until I installed Pandora. I immediately listened to music for a good 1/2hr on my Marvelc and right after that is when I noticed it.
Eddie O.
New Orleans
sunkistnsudafed said:
Sorry for bumping this old thread, I also posted this response in another thread. I have this log on my transformer and nexus 7. I believe it is from Cut the Rope Free in my case, due to the mention of zeptolab in the log file.
Code:
12:10:42:960 AM: (I): YuMe SDK Instantiated Successfully.
12:10:42:960 AM: (I): YuMeSDK_Init(): Invoked.
12:10:42:961 AM: (I): YuMe SDK Version: 3.0.10.9
12:10:42:962 AM: (I): AD PARAMS SET BY APPLICATION:
12:10:42:962 AM: (I): adDomainUrl: yumenetworks... com/
12:10:42:962 AM: (I): domainId: 791MaaQqZdV
12:10:42:962 AM: (I): qsParams: iabcat=HobbiesandInterests&iabsubcat=VideoandComputerGames
12:10:42:963 AM: (I): adTimeout: 8
12:10:42:963 AM: (I): videoTimeout: 8
12:10:42:964 AM: (I): bSupportMP4: false
12:10:42:964 AM: (I): bSupport3GPP: false
12:10:42:965 AM: (I): bSupportHighBitRate: false
12:10:42:965 AM: (I): bSupportAutoNetworkDetect: false
12:10:42:965 AM: (I): bEnableCaching: true
12:10:42:966 AM: (I): bEnableAutoPrefetch: true
12:10:42:966 AM: (I): storageSize: 10.0
12:10:42:967 AM: (I): bEnableCBToggle: true
12:10:42:967 AM: (I): bEnableLocationSupport: true
12:10:42:967 AM: (I): bEnableFileLogging: true
12:10:43:379 AM: (I): Current Display Orientation: PORTRAIT
12:10:43:380 AM: (I): Device Resolution: Width: 800, Height: 1205
12:10:43:380 AM: (I): Device is identified as an Android TABLET.
12:10:43:382 AM: (I): No Cookies loaded from Persistent Storage.
12:10:43:382 AM: (I): SDK Modules Created.
12:10:43:386 AM: (I): External jars required for supporting 'Tap To Calendar' found.
12:10:43:387 AM: (I): Permission GRANTED for Calendar Read & Write Operations.
12:10:43:388 AM: (I): Permission GRANTED for reading Phone State.
12:10:43:390 AM: (I): WiFi Connectivity not available.
12:10:43:391 AM: (I): Cellular Connectivity available.
12:10:43:396 AM: (I): Permission GRANTED for accessing Location Info.
12:10:43:398 AM: (I): Location Providers Enabled: Network:GPS:Passive => true:false:true
12:10:43:402 AM: (I): Orientation Listener Set Successfully.
12:10:43:404 AM: (I): Broadcast Receiver Set Successfully.
12:10:43:405 AM: (I): External Storage is Accessible.
[B]12:10:43:407 AM: (I): Files Directory Path (External Storage): /storage/sdcard0/Android/data/com.zeptolab.ctr.ads/files[/B]
12:10:43:410 AM: (I): YuMeSDK_Init(): Successful.
12:10:43:411 AM: (I): ********** YuMeSDK_InitAd(): Invoked with AdBlock: YUME_ADBLOCKTYPE_PREROLL **********
12:10:43:411 AM: (I): framePlaylistRequest - Start.
12:10:43:412 AM: (I): WiFi Connectivity not available.
12:10:43:413 AM: (I): Cellular Connectivity available.
12:10:43:416 AM: (I): Playlist Request Body: {"content":{"tags":[],"guid":"","categories":[],"duration":"","title":""},"demography":{"gender":"","keywords":[],"education":"","interests":[],"income":"","age":""},"connection":{"type":"Cellular","bandwidth":"","service_provider":""},"referrer":"","geography":{"ip_address":"","postal_code":"","state":"","gyroscope":"portrait","longitude":"*********","latitude":"**********","city":"","country":""},"player":{"height":"0","width":"0","version":""},"playlist_version":"v2","yume_sdk":{"exclude_placements":[],"pre_fetch":"true","ad_guid":[],"version":"3.0.10.9"},"device":{"os":"Android","storage_quota_in_mb":"10.0","model":"Nexus 7","height":"1205","width":"800","hardware_version":"","uuid":"","make":"asus","os_version":"4.1.1"},"domain":"791MaaQqZdV","publisher_channel":"","imu":[],"publisher_page":""}
12:10:43:416 AM: (I): PF Playlist Url: cat=VideoandComputerGames
12:10:43:416 AM: (I): framePlaylistRequest - End.
12:10:43:417 AM: (I): No Downloads to be Aborted.
12:10:43:418 AM: (I): YuMeSDK_InitAd(): Successful.
12:10:43:823 AM: (I): ORIENTATION Changed to PORTRAIT.
12:10:43:845 AM: (I): PF Playlist Fetched.
12:10:43:881 AM: (E): Empty PF Playlist received.
12:10:43:883 AM: (I): Current Playlist State: YUME_PFPLAYLISTSTATE_PLAYLISTREADY
12:10:43:888 AM: (I): Starting Prefetch Request Callback Timer: Interval (secs): 900
12:10:44:13 AM: (I): Notifying Ad Event(YUME_ADBLOCKTYPE_PREROLL): adEvent: YUME_ADEVENT_ADNOTREADY
12:11:15:545 AM: (I): YuMeSDK_PauseDownload(): Invoked.
12:11:15:546 AM: (I): No Downloads to be Paused.
12:11:15:547 AM: (I): YuMeSDK_PauseDownload(): Successful.
12:11:17:153 AM: (I): YuMeSDK_ResumeDownload(): Invoked.
12:11:17:154 AM: (I): No Downloads to be Resumed.
12:11:17:155 AM: (I): YuMeSDK_ResumeDownload(): Successful.
12:11:26:524 AM: (I): YuMeSDK_DeInit(): Invoked.
12:11:26:531 AM: (I): Orientation Listener Reset Successfully.
12:11:26:535 AM: (I): Broadcast Receiver Reset Successfully.
12:11:26:541 AM: (I): Stopping Prefetch Request Callback Timer.
12:11:26:543 AM: (I): Aborting Common Downloads...
12:11:26:552 AM: (I): YuMeSDK_DeInit(): Successful.
Click to expand...
Click to collapse

Also added by IHeart radio
this file was added to my phone when I added iHeart radio.

Related

[Q] OpenVPN: routing/bridged network and [semi]stock kernel

Hello to everybody,
I'm trying to run open VPN in my rooted stock Galaxy Nexus, with ICS 4.0.3.
My goal is to create a bridged interface to get an ip directly from the same DHCP server that serve to all the pcs at my work network instead of assign a special pool by using a tap interface, but i'm not even able to bring up a tun interface to check if openvpn is working.
I keep getting some error when it's trying to bring up the tun0 interface; openvpn quit with value exit with "Linux ifconfig failed: external program fork failed".
If I try to bring up the tun0 from shell, I get "ifconfig: tun0: error fetching interface information: Device not found".
Then I check if the kernel is running with support for tunneling and i found that CONFIG_TUN is correctly set.
Did I miss something? Did I had to set other kernel modules? Also, somewhere in this forum is said that "tun is possible, tap no due to system limitations": someone knows what this limitations are and how can i pass them?
Also, is this a right place to ask or i'm posting to the wrong forum?
Thank you and sorry for my english
R.
Here is a part of logcat showing the errror (whit location masked at line 4)
Code:
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-mgmt( 1959): =============> 0 == 4 resetting dns, leaving dns alone
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-mgmt( 1959): SUCCESS: bytecount interval changed
D/OpenVPNDaemonEnabler( 1959): Received OpenVPN network state changed from Auth to Get Config
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:43 2012 SENT CONTROL [xx.xx.xx.it]: 'PUSH_REQUEST' (status=1)
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 PUSH: Received control message: 'PUSH_REPLY,route 192.168.11.0 255.255.255.0,dhcp-option DNS 10.8.0.1,dhcp-option WINS 192.168.11.2,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.74 10.8.0.73'
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 OPTIONS IMPORT: timers and/or timeouts modified
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 OPTIONS IMPORT: --ifconfig/up options modified
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 OPTIONS IMPORT: route options modified
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 ROUTE default_gateway=2.195.48.1
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 TUN/TAP device tun0 opened
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 TUN/TAP TX queue length set to 100
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 MANAGEMENT: >STATE:1352902484,ASSIGN_IP,,10.8.0.74,
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 /system/xbin/busybox ifconfig tun0 10.8.0.74 pointopoint 10.8.0.73 mtu 1500
V/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-mgmt( 1959): onState(">STATE:1352902484,ASSIGN_IP,,10.8.0.74,")
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 MANAGEMENT: Client disconnected
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 Linux ifconfig failed: external program fork failed
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/Nexus.ovpn]-daemon-stdout( 1959): Wed Nov 14 15:14:44 2012 Exiting

[Q] (REQUEST) Have VPN working on the FTV

I am from Mexico and when I ordered the FTV I was planning on installing Hotspot Shield Elite to change my VPN to United States and access US Netflix, Pandora etc. The app does install and open but in order for the app to work it needs VPNdialogs.apk installed. I have attempted to install that app various ways but I have failed. I need a way to get VPN working properly. Any ideas?
What is VPN and how does it work?
Sent from my XT1033
KickStart49 said:
What is VPN and how does it work?
Sent from my XT1033
Click to expand...
Click to collapse
VPN is a service that your phone uses to mask or hide your IP Location by using their own servers to access the website. For example, if I am in China and have a USA VPN provider I can use USA Netflix etc bc Netflix thinks I'm in the United States. The app Hotspot Shield is a VPN provider that helps me do this on my android device. Now I installed this in the FTV and it requires more than that. Try it in your phone and you will see what I mean.
Oh sure. Will it help me get the access to the US playstore?
Sent from my XT1033
It should yes. Look it up as Hotspot Shield Elite apk on Google
Sent from my SPH-L600 using XDA Free mobile app
solorzano_felipe said:
It should yes. Look it up as Hotspot Shield Elite apk on Google
Sent from my SPH-L600 using XDA Free mobile app
Click to expand...
Click to collapse
Why VPN. Why not unotelly? that does the dns and can pick up things from around the world. As far as content on Amazon, its not restricted based on the IP you connect from. Its where your account is registered to and you can change that easily back and forth.
I didn't want to change from Hotspot Shield but I just did and Unotelly works perfectly, thanks.
Sent from my SPH-L600 using XDA
solorzano_felipe said:
VPN is a service that your phone uses to mask or hide your IP Location by using their own servers to access the website. For example, if I am in China and have a USA VPN provider I can use USA Netflix etc bc Netflix thinks I'm in the United States. The app Hotspot Shield is a VPN provider that helps me do this on my android device. Now I installed this in the FTV and it requires more than that. Try it in your phone and you will see what I mean.
Click to expand...
Click to collapse
I'm getting VPN API error from HotSpot Shield from my rooted AFTV. Any clue how to fix it?
Sent from my AFTB using Tapatalk
desztan said:
I'm getting VPN API error from HotSpot Shield from my rooted AFTV. Any clue how to fix it?
Sent from my AFTB using Tapatalk
Click to expand...
Click to collapse
I wasn't able to get VPN working on it, I use DNS provider like Unotelly or unblock-us and it works fine most of the time.
Sent from Samsung Galaxy Mega 6.3
solorzano_felipe said:
I wasn't able to get VPN working on it, I use DNS provider like Unotelly or unblock-us and it works fine most of the time.
Sent from Samsung Galaxy Mega 6.3
Click to expand...
Click to collapse
Is there anyway to get a VPN apk working?
Sent from my AFTB using Tapatalk
I try Hotspot Shield on my phone and it didn't work but I try hiddeninja and it works. when I sideload hiddeninja into AFTV it just exit the program when I click connect.
Sent from my SM-N915G using Tapatalk
desztan said:
I try Hotspot Shield on my phone and it didn't work but I try hiddeninja and it works. when I sideload hiddeninja into AFTV it just exit the program when I click connect.
Sent from my SM-N915G using Tapatalk
Click to expand...
Click to collapse
Hotspot Shield works great on my phone. I'll give Hidden Ninja a try and will report if it work.
Sent from Samsung Galaxy Mega 6.3
Was anyone able to go further with a VPN connection ?
I did the following :
db install -r ./de.schaeuffelhut.android.openvpn.installer.apk
adb install -r ./de.schaeuffelhut.android.openvpn.apk
In FireTV -> installed the application openvpn.installer first.
--> kept default location : /system/xbin
ifconfig opener : /system/xbin/busybox ifconfig
==> /system/xbin/openpvn installed as a result.
Created the following dir :
mkdir /sdcard/openvpn.
I copied the .ovpn from my VPN provider (Cyberghost).
I open it and extracted the client.cert client.key and ca.cert from it and created the corresponding text files.
So the .ovpn file now looks like :
Code:
client
remote us-ipeb-openvpn.cyberghostvpn.com 443
dev tun
proto udp
auth-user-pass
resolv-retry infinite
redirect-gateway def1
persist-key
persist-tun
nobind
cipher AES-256-CBC
auth MD5
ping 5
ping-exit 60
ping-timer-rem
explicit-exit-notify 2
script-security 2
remote-cert-tls server
route-delay 5
tun-mtu 1500
fragment 1300
mssfix 1300
verb 4
comp-lzo
ca /sdcard/openvpn/ca.crt
cert /sdcard/openvpn/client.crt
key /sdcard/openvpn/client.key
From my PC, I run adb logcat when trying to use the VPN connection and I keep getting this :
Code:
D/OpenVPNDaemonEnabler(23407): Received OpenVPN network state changed from Wait to Auth
V/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-mgmt(23407): onState(">STATE:1421363388,RECONNECTING,tls-error,,")
D/OpenVPN-Settings-getprop(23407): invoking external process: /system/bin/sh
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 VERIFY OK: depth=1, /C=DE/O=CyberGhost_VPN/OU=CyberGhost/CN=CyberGhost
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 VERIFY ERROR: depth=0, error=certificate signature failure: /C=RO/ST=RO/L=Bucharest/O=CyberGhost_VPN/OU=CyberGhost/CN=CyberGhost/name=CyberGhost_VPN/[email protected]
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 TLS Error: TLS object -> incoming plaintext read error
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 TLS Error: TLS handshake failed
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 TCP/UDP: Closing socket
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 SIGUSR1[soft,tls-error] received, process restarting
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 MANAGEMENT: >STATE:1421363388,RECONNECTING,tls-error,,
I did get the certificate today from cyberghost, so the validity is fine :
Validity
Not Before: Jan 15 21:44:37 2015 GMT
Not After : Jan 12 21:44:37 2025 GMT
Any suggestion is welcome !
Securitykiss vpn worked fine for me on rooted fire tv what I found weird is that not every vpn provider works. Securitykiss has 500 mb free a day so you can try it.
Sent from my SM-N910V using Tapatalk
Astrolabe said:
Was anyone able to go further with a VPN connection ?
I did the following :
db install -r ./de.schaeuffelhut.android.openvpn.installer.apk
adb install -r ./de.schaeuffelhut.android.openvpn.apk
In FireTV -> installed the application openvpn.installer first.
--> kept default location : /system/xbin
ifconfig opener : /system/xbin/busybox ifconfig
==> /system/xbin/openpvn installed as a result.
Created the following dir :
mkdir /sdcard/openvpn.
I copied the .ovpn from my VPN provider (Cyberghost).
I open it and extracted the client.cert client.key and ca.cert from it and created the corresponding text files.
So the .ovpn file now looks like :
Code:
client
remote us-ipeb-openvpn.cyberghostvpn.com 443
dev tun
proto udp
auth-user-pass
resolv-retry infinite
redirect-gateway def1
persist-key
persist-tun
nobind
cipher AES-256-CBC
auth MD5
ping 5
ping-exit 60
ping-timer-rem
explicit-exit-notify 2
script-security 2
remote-cert-tls server
route-delay 5
tun-mtu 1500
fragment 1300
mssfix 1300
verb 4
comp-lzo
ca /sdcard/openvpn/ca.crt
cert /sdcard/openvpn/client.crt
key /sdcard/openvpn/client.key
From my PC, I run adb logcat when trying to use the VPN connection and I keep getting this :
Code:
D/OpenVPNDaemonEnabler(23407): Received OpenVPN network state changed from Wait to Auth
V/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-mgmt(23407): onState(">STATE:1421363388,RECONNECTING,tls-error,,")
D/OpenVPN-Settings-getprop(23407): invoking external process: /system/bin/sh
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 VERIFY OK: depth=1, /C=DE/O=CyberGhost_VPN/OU=CyberGhost/CN=CyberGhost
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 VERIFY ERROR: depth=0, error=certificate signature failure: /C=RO/ST=RO/L=Bucharest/O=CyberGhost_VPN/OU=CyberGhost/CN=CyberGhost/name=CyberGhost_VPN/[email protected]
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 TLS Error: TLS object -> incoming plaintext read error
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 TLS Error: TLS handshake failed
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 TCP/UDP: Closing socket
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 SIGUSR1[soft,tls-error] received, process restarting
D/OpenVPN-DaemonMonitor[/sdcard/openvpn/cbg_USA_noCTRLM_UDP.ovpn]-daemon-stdout(23407): Thu Jan 15 15:09:48 2015 MANAGEMENT: >STATE:1421363388,RECONNECTING,tls-error,,
I did get the certificate today from cyberghost, so the validity is fine :
Validity
Not Before: Jan 15 21:44:37 2015 GMT
Not After : Jan 12 21:44:37 2025 GMT
Any suggestion is welcome !
Click to expand...
Click to collapse
Would like to find a answer for either CyberGhost of PIA but I think the only way to figure this is thru their live or email support department... Can you try to get a hold of CyberGhost live support to see if they help fix this ??
I use droidvpn and it works prefect on my fire tv.
hi all, and there are no FREE Vpn APK work on amazon fire tv?
Anyone try hola ?
Sent from this Oneplus "BOS" One!!!
Too much effort to get VPN running directly on the fire tV. Just get a SmartDNS/VPN enabled router and set it up that way.
DIR-615 router, with DD-WRT, £10. Problem solved.
you can also try hola vpn from app store. it is free and has integration of netfix to make region free.

Debugging SIM-card detection failure in CM13 builds

Hi,
I've tried to compile my own builds of CM13 since the nightly versions moved to CM14.1 - I know that there is a thread around with a build from November, but I'd prefer having my own build rather than having to trust unofficial sources and also having the latest changes included.
However, the builds have the issue that network connectivity doesn't work. There's the "No SIM found" icon in the notification drawer, all individual settings in the mobile data settings are greyed out, and the SIM card status screen shows that there is no information available. Logcat and dmesg don't show anything on radio/SIM. Back when there still were nightly versions around I've often compiled my own builds to test small changes to some parts of the code, so I'm quite confident that the error isn't in the building process. I've also compared the list of vendor files from the freshly generated rom with the last nightly - they are identical. I have never laid hands on the telephony/network part of Android before, so I don't really know where to start digging.
Can anyone point me towards some useful resources, or give me some general hints on which components could be responsible?
(I do know that bisecting the whole source tree would be an option, but I'd prefer to avoid that, because there's been a total of 1537 changes since the latest nightly - especially because lots of changes to the kernel have been merged - and building/flashing/testing the required 10 builds to bisect the issue would take a lot of time. I also have a list of all the changes; it's too long to post here, but here's a pastebin version. The changes since the unofficial build from the other thread are actually not that many, I'll add a list below.)
android: cm: Remove mm-dash repo
AudioFX: Automatic translation import
base: AppOps: Do not prune apps that are not present
base: Automatic translation import
base: Build: use UserHandle.isApp for M compatibility
base: Make Build.TYPE and Build.FINGERPRINT consistent for apps.
base: SettingsLib: Fix possible NPEs
base: Support for MODE_ASK in commandline
base: Themes: Don't cache explicitly themed resources
base: zygote: Add /proc/ged to the FD whitelist
base: zygote: Allow device to append extra whitelisted paths
Bluetooth: Automatic translation import
BluetoothExt: Automatic translation import
Browser: Automatic translation import
build: Revert "qcom: Select Sony display/media variants for Sony devices"
Calendar: Automatic translation import
Camera2: Automatic translation import
CellBroadcastReceiver: Automatic translation import
cm: Add a new APN for new mcc/mnc assigned to Truphone
cm: apns: Add Reliance Jio APNs
cm: apns: Remove loop and bpl mobile
CMAudioService: Automatic translation import
CMBugReport: Automatic translation import
cm: cm: Add more Mi 5 maintainers
cm: config: common: Remove obsolete RomManager props
cm: Contributors: Add maintainer for Xiaomi Redmi 3/Prime (ido)
cm: Contributors: Add Xiaomi Mi 5 maintainer
CMFileManager: Automatic translation import
cm: Fix Truphone APN
cmsdk: Automatic translation import
CMUpdater: Automatic translation import
cm: vendor_cm: Vodafone TR: Fix mobile data on first boot
CMWallpapers: Automatic translation import
Contacts: Automatic translation import
ContactsCommon: Automatic translation import
Contacts: Contacts: Fix infinite loop in queryContactProviderByRawContactIds
core: init: Fix possible open file pointer
cts: Add CTS test for CVE_2016_2463 This test verifies whether a mp4 file limits the memory usage during decode media am: 931bb65066
cts: DO NOT MERGE: Bump CTS and CTS Verifier to 5.1_r14
cts: DO NOT MERGE: Bump CTS and CTS Verifier to 5.1_r14 am: c6f25a3d0b -s ours
cts: DO NOT MERGE: Bump CTS and CTS Verifier to 6.0_r13
cts: DO NOT MERGE: remove 2 hammerhead knownfailures (fixes are in)
cts: DO NOT MERGE: Updating CTS Security Patch Month to "11" for November 2016
cts: Don't include ScreenPinning test on auto am: be2b17c293
cts: Merge "AdaptivePlaybackTest: dequeue more output buffers at the end." into marshmallow-cts-dev
cts: Merge "Add CTS test for CVE_2016_2463 This test verifies whether a mp4 file limits the memory usage during decode media am: 931bb65066" into marshmallow-cts-dev
cts: Merge "Add CTS test for CVE_2016_2463 This test verifies whether a mp4 file limits the memory usage during decode media" into lollipop-mr1-cts-dev
cts: Merge "Add CTS test for CVE_2016_2463 This test verifies whether a mp4 file limits the memory usage during decode media" into lollipop-mr1-cts-dev am: 78aa98cbb8
cts: Merge "Allow failing testUsbAccessory CTS test in some cases." into marshmallow-cts-dev
cts: Merge "DO NOT MERGE: Bump CTS and CTS Verifier to 5.1_r14 am: c6f25a3d0b -s ours" into marshmallow-cts-dev
cts: Merge "DO NOT MERGE: Bump CTS and CTS Verifier to 5.1_r14" into lollipop-mr1-cts-dev
cts: Merge "DO NOT MERGE: Bump CTS and CTS Verifier to 5.1_r14" into lollipop-mr1-cts-dev am: 8fea137869 -s ours
cts: Merge "DO NOT MERGE: Bump CTS and CTS Verifier to 6.0_r13" into marshmallow-cts-dev
cts: Merge "DO NOT MERGE: remove 2 hammerhead knownfailures (fixes are in)" into marshmallow-cts-dev
cts: Merge "DO NOT MERGE: remove 2 hammerhead knownfailures (fixes are in)" into marshmallow-cts-release
cts: Merge "DO NOT MERGE: Updating CTS Security Patch Month to "11" for November 2016" into marshmallow-cts-dev
cts: Merge "Don't include ScreenPinning test on auto am: be2b17c293" into marshmallow-cts-dev
cts: Merge "Don't include ScreenPinning test on auto" into lollipop-mr1-cts-dev
cts: Merge "Don't include ScreenPinning test on auto" into lollipop-mr1-cts-dev am: 70649a6f9e
cts: Merge "fix android.graphics2#android.graphics2.cts.TextureViewTest#testTextureViewActivity for TV" into marshmallow-cts-dev
cts: Merge "fix android.hardware.camera2.cts.CameraManagerTest#testManagerGetDeviceIdList for TV" into marshmallow-cts-dev
cts: Merge "Fix StagefrightTest" into marshmallow-cts-dev
cts: merge in marshmallow-cts-release history after reset to marshmallow-cts-dev
cts: Merge "Merge "Add CTS test for CVE_2016_2463 This test verifies whether a mp4 file limits the memory usage during decode media" into lollipop-mr1-cts-dev am: 78aa98cbb8" into marshmallow-cts-dev
cts: Merge "Merge "DO NOT MERGE: Bump CTS and CTS Verifier to 5.1_r14" into lollipop-mr1-cts-dev am: 8fea137869 -s ours" into marshmallow-cts-dev
cts: Merge "Merge "Don't include ScreenPinning test on auto" into lollipop-mr1-cts-dev am: 70649a6f9e" into marshmallow-cts-dev
cts: Merge "Merge "PlayVideoActivity: update comments for ENABLE_PASS_DELAY" into lollipop-mr1-cts-dev am: 7ecee98066" into marshmallow-cts-dev
cts: Merge "Merge "streamquality: reduce ENABLE_PASS_DELAY to 5 seconds" into lollipop-mr1-cts-dev am: ee5668e042" into marshmallow-cts-dev
cts: Merge "Merge "Test: Fix testFindAll result listener not set issue" into lollipop-mr1-cts-dev am: 548f71f142" into marshmallow-cts-dev
cts: Merge "Merge "Test: fix WebView testFindNext flakyness" into lollipop-mr1-cts-dev am: 9f7059f0f8" into marshmallow-cts-dev
cts: Merge "PlayVideoActivity: update comments for ENABLE_PASS_DELAY am: 0b8bed432c" into marshmallow-cts-dev
cts: Merge "PlayVideoActivity: update comments for ENABLE_PASS_DELAY" into lollipop-mr1-cts-dev
cts: Merge "PlayVideoActivity: update comments for ENABLE_PASS_DELAY" into lollipop-mr1-cts-dev am: 7ecee98066
cts: Merge "Revert "DO NOT MERGE: Add CTS For bug - 13225149"" into marshmallow-cts-dev
cts: Merge "streamquality: reduce ENABLE_PASS_DELAY to 5 seconds am: c705f34f0c" into marshmallow-cts-dev
cts: Merge "streamquality: reduce ENABLE_PASS_DELAY to 5 seconds" into lollipop-mr1-cts-dev
cts: Merge "streamquality: reduce ENABLE_PASS_DELAY to 5 seconds" into lollipop-mr1-cts-dev am: ee5668e042
cts: Merge "Test: Fix testFindAll result listener not set issue am: 69c73541a7" into marshmallow-cts-dev
cts: Merge "Test: Fix testFindAll result listener not set issue" into lollipop-mr1-cts-dev
cts: Merge "Test: Fix testFindAll result listener not set issue" into lollipop-mr1-cts-dev am: 548f71f142
cts: Merge "Test: fix WebView testFindNext flakyness am: 77f169c80d" into marshmallow-cts-dev
cts: Merge "Test: fix WebView testFindNext flakyness" into lollipop-mr1-cts-dev
cts: Merge "Test: fix WebView testFindNext flakyness" into lollipop-mr1-cts-dev am: 9f7059f0f8
cts: PlayVideoActivity: update comments for ENABLE_PASS_DELAY
cts: PlayVideoActivity: update comments for ENABLE_PASS_DELAY am: 0b8bed432c
cts: streamquality: reduce ENABLE_PASS_DELAY to 5 seconds
cts: streamquality: reduce ENABLE_PASS_DELAY to 5 seconds am: c705f34f0c
cts: Test: Fix testFindAll result listener not set issue
cts: Test: Fix testFindAll result listener not set issue am: 69c73541a7
cts: Test: fix WebView testFindNext flakyness am: 77f169c80d
DataUsageProvider: Automatic translation import
DeskClock: Automatic translation import
Dialer: Automatic translation import
DownloadProvider: Automatic translation import
Eleven: Automatic translation import
Email: Automatic translation import
Galaxy4: Automatic translation import
Gallery2: Automatic translation import
Gello: Automatic translation import
InCallUI: Automatic translation import
klte: arm: fix handling of F_OFD_... in oabi_fcntl64()
klte: ion: disable system contig heap
klte: packet: fix race condition in packet_set_ring
LatinIME: LatinIME: Remove gesture preference if gesture lib is unavailable
LiveLockScreenService: Automatic translation import
LockClock: Automatic translation import
Messaging: Automatic translation import
Messaging: Messaging: Fix incorrect equality check
msm8960: hal: Port the dock support to non-legacy 8960 hal
omap4: cmhw: Account for devices that don't use manager0 sysfs paths
PhaseBeam: Automatic translation import
PhotoPhase: Automatic translation import
Profiles: Automatic translation import
qcom-common: Automatic translation import
samsung: Automatic translation import
samsung: power: Update DT2W_PATH
Screencast: Automatic translation import
Settings: Automatic translation import
Settings: DataUsageUtils: Clean up based on code review
Settings: NotificationLightSettings: Remove noop fields when LED can't pulse
Settings: Settings: Hide Reset action if Battery LED is not multicolor
Settings: Settings: Make proximity wake string more accurate
Settings: telephony: Disable the SIM state change receiver
SetupWizard: Automatic translation import
Snap: Automatic translation import
SoundRecorder: Automatic translation import
Stk: Automatic translation import
Telecomm: Automatic translation import
Telephony: Automatic translation import
telephony: MSIM: Change access modifier of handleSimLoaded
telephony: MSIM: Pass slotId to EVENT_SIM_LOCKED_QUERY_ICCID_DONE
telephony: SubscriptionInfoUpdater: Unbreak usage of TelephonyPlugin
Terminal: Automatic translation import
ThemeChooser: Automatic translation import
ThemeManagerService: Automatic translation import
ThemesProvider: Automatic translation import
Trebuchet: Automatic translation import
TvSettings: Automatic translation import
UnifiedEmail: ActivityControler: Fix BadPacelableException in certain scenarios
UnifiedEmail: Automatic translation import
WeatherProvider: Automatic translation import
WeatherService: Automatic translation import
I've trimmed your list of commits down to commits that could actually break something (i.e. not translations, not commits to apps, not commits to video libraries etc.)
Base:
Tbh I don't really understand most of these, but I don't think they could actually break telephony
base: Build: use UserHandle.isApp for M compatibility
base: Make Build.TYPE and Build.FINGERPRINT consistent for apps.
base: SettingsLib: Fix possible NPEs
base: Support for MODE_ASK in commandline
base: zygote: Add /proc/ged to the FD whitelist
base: zygote: Allow device to append extra whitelisted paths
CM:
These are APN specific so unless you use one of these APNs I fail to see how anything could break
cm: Add a new APN for new mcc/mnc assigned to Truphone
cm: apns: Add Reliance Jio APNs
cm: apns: Remove loop and bpl mobile
cm: Fix Truphone APN
cm: vendor_cm: Vodafone TR: Fix mobile data on first boot
Hardware:
These might? have broken something but I don't think it's at all likely
core: init: Fix possible open file pointer
klte: arm: fix handling of F_OFD_... in oabi_fcntl64()
klte: ion: disable system contig heap
klte: packet: fix race condition in packet_set_ring
msm8960: hal: Port the dock support to non-legacy 8960 hal
omap4: cmhw: Account for devices that don't use manager0 sysfs paths
Telephony:
Definitely look into these. These are the most likely candidates. I suggest you look at these before you even think of the others
Settings: telephony: Disable the SIM state change receiver
telephony: MSIM: Change access modifier of handleSimLoaded
telephony: MSIM: Pass slotId to EVENT_SIM_LOCKED_QUERY_ICCID_DONE
telephony: SubscriptionInfoUpdater: Unbreak usage of TelephonyPlugin

[REQ] Forum HTTPS support

Dear administrators, why do you force users to use the insecure HTTP protocol while this forum has a valid SSL certificate (used for login) ?
For example, when I try https://forum.xda-developers.com/all, I am being redirected to http://forum.xda-developers.com/all
Code:
HTTP/1.1 301 Moved Permanently
Date: Wed, 14 Dec 2016 17:05:08 GMT
Content-Type: text/html
Content-Length: 178
Connection: keep-alive
Location: http://forum.xda-developers.com/all
...
Please allow us to use a secure HTTPS protocol.
HTTPS will consume more server resources ...

Question Cannot connect Wifi Enterprise EAP/TLS with Xperia 10 III Android 12 Update July 2022 BN 62.1.A.0.617

Hello,
I am trying to connect my smartphone Xperia 10 III Android 12 Update July 2022 BN 62.1.A.0.617
to Enterprise WIFI using certificates CORPORATE-WIFI-WPA_EAPIEEE8021X_TLS_NULL
with following setting pushed by azure intune :
Scep Cert policy to android:
Subject name format CN={{AAD_Device_ID}}
Subject alternative name User principal name (UPN) = {{AAD_Device_ID}}@domain.com
Certificate validity period 1 Years
Key usage Key encipherment, Digital signature
Key size (bits) 2048
Hash algorithm SHA-2
Root Certificate "YOUR ROOT CERT"
Extended key usage Client Authentication enter what you cert template says
Renewal threshold (%) 20
SCEP Server URLs "NDES URL"
WIFI Settings policy to android:
SSID "SSID"
Connect automatically Disable
Hidden network Disable
EAP type EAP - TLS
Radius server name "All Ise Nodes"
Root cert for server valid "Your Root Cert"
Authentication method Certificates
Certificates "Scep Cert From earlier"
Identity privacy anonymous this seems to be important
Unfortunately, Cisco ISE do not see my Smartphone MAC Addr and phone does not connect.
We investigated a lot of about this connection issue but do not find the root cause.
Re-enrolled my phone to Intune more than once, resync'ed mgmt policies,
reinstalled certificated, ... does not seem to help.
Also removed Norton 360 security just in case of but no change.
Any idea about the root cause or where the issue can be ?
Situation was the same with March 2022 Android 12 update
Thanks for your ideas
Th
If You using private MAC, You may try to disable it for this wifi connection.
Hello,
Thanks for reply. Gave a try with Device MAC or Randomized MAC but not change. Is this what you mean ?
Thanks
TH

Categories

Resources