Hello
I wanted to change my DNS tablet
I changed the file 20-dns.conf v
My tablet is not connected to the Internet
I even delete the two lines
I re-download the file and replace it even
But it is not connected to the Internet
I added two lines to the file 20-dns.conf:
setprop dhcp.eth0.dns1 8.8.4.4
setprop dhcp.eth0.dns2 8.8.8.8
File 20-dns.conf:
system / etc / dhcpcd / dhcpcd-hooks / 20-dns.conf
My tablet is rooted
To play it safe
My advice, to play it safe, backup all media from your device, Complete Wipe and reinstall. That should restore everything to its factory settings.
Related
Has anyone else noticed this problem:
After upgrading to an ICS leak (currently stock rooted FE22, although noticed so far on all leaks), my WiFi in the presence of a weak signal will stay connected, but not have an active data connection. For example, at work I get 1 bar of WiFi signal shown, and when I first connect I can use data over the WiFi network (market, browser, email, etc.) but after I let my phone sit at my desk for a while and go to use it again, it still shows it's connected to the WiFi network with 1 bar, but there is no data connection (can't communicate to market, browser, etc.). If I disconnect and reconnect to the WiFi network it will once again get active data for a period of time. I have the WiFi setting to always stay connected. If I set it to 'Only When Plugged In' it works fine because it reconnects when I wake it up, but I have a weak cellular signal at work, so this kills the battery faster during background data. It worked fine on the current OTA release of GB with the 'Always On' setting. Any insight/confirmation about this issue would be appreciated. Thanks!
Are you running a customized wpa_supplicant.conf? If so can you please send a copy by PM or copy/paste here after removing any info that you need to (SSID, pw, etc)? Might help understand what's going on - my PEAP/MSCHAPV2 does a "nod-off" but then comes right back up at times. Thought maybe it's a power saving feature as it only seems to happen at times of low demand for data.
I haven't modified anything at all and am running the unmodified FE22 leak, except for root. Here's what my wpa_supplicant.conf file says in its entirety:
from /system/etc/wifi:
update_config=1
ctrl_interface=wlan0
eapol_version=1
ap_scan=1
fast_reauth=1
p2p_listen_reg_class=81
p2p_listen_channel=1
p2p_oper_reg_class=81
p2p_oper_channel=11
from /data/misc/wifi:
ctrl_interface=wlan0
driver_param=use_p2p_group_interface=1
update_config=1
device_type=0-00000000-0
p2p_listen_reg_class=81
p2p_listen_channel=1
p2p_oper_reg_class=81
p2p_oper_channel=11
network={
ssid="HOME AP"
psk=<removed>
key_mgmt=WPA-PSK
priority=1
}
network={
ssid="WORK AP"
psk=<removed>
key_mgmt=WPA-PSK
priority=2
}
network={
ssid="attwifi"
key_mgmt=NONE
priority=3
}
CHeil402 said:
I haven't modified anything at all and am running the unmodified FE22 leak, except for root. Here's what my wpa_supplicant.conf file says in its entirety:
<snip>
Click to expand...
Click to collapse
Pretty straight forward... no surprises there. Do you keep the sleep setting normally as "Always On"? As I mentioned before I've seen mine nod off (go down to zero bars) and then reconnect - usually when the phone is idling.
*Edit* Noticed 3 lines missing from the default:
Code:
eapol_version=1
ap_scan=1
fast_reauth=1
If you're familiar with editing wpa_supplicant.conf you could try to add these lines in and see if it helps. Just don't forget to reset the permissions and ownership or it may give an error when starting the wi-fi.
garwynn said:
Pretty straight forward... no surprises there. Do you keep the sleep setting normally as "Always On"? As I mentioned before I've seen mine nod off (go down to zero bars) and then reconnect - usually when the phone is idling.
*Edit* Noticed 3 lines missing from the default:
Code:
eapol_version=1
ap_scan=1
fast_reauth=1
If you're familiar with editing wpa_supplicant.conf you could try to add these lines in and see if it helps. Just don't forget to reset the permissions and ownership or it may give an error when starting the wi-fi.
Click to expand...
Click to collapse
I tried adding these lines in /data/misc/wifiwpa_supplicant.conf, but then wifi wouldn't turn on. So I reverted back to the old one and now it still won't turn on! I used ES File Explorer to edit the text of the file, and set the permissions to rw-rw---- as it was before then restarted my phone. Any ideas?
CHeil402 said:
I tried adding these lines in /data/misc/wifiwpa_supplicant.conf, but then wifi wouldn't turn on. So I reverted back to the old one and now it still won't turn on! I used ES File Explorer to edit the text of the file, and set the permissions to rw-rw---- as it was before then restarted my phone. Any ideas?
Click to expand...
Click to collapse
Well, in a worst case, deleting it will force it to be copied and restore the service... but let's try something else first.
1) Turn off wi-fi (always needs to be off before modifying that file.)
2) inside adb shell please enter the following commands:
Code:
su
cd /data/misc/wifi
chmod 660 wpa_supplicant.conf
chown system.wifi wpa_supplicant.conf
3) Exit and turn back on wi-fi.
If it was the permissions this will fix it.
garwynn said:
Well, in a worst case, deleting it will force it to be copied and restore the service... but let's try something else first.
1) Turn off wi-fi (always needs to be off before modifying that file.)
2) inside adb shell please enter the following commands:
Code:
su
cd /data/misc/wifi
chmod 660 wpa_supplicant.conf
chown system.wifi wpa_supplicant.conf
3) Exit and turn back on wi-fi.
If it was the permissions this will fix it.[/QUOTE]
THANK YOU! Apparently, I forgot to set the ownership. I only changed the permissions. I also re-added the lines you mentioned. I'll have to see if that works... I'll let you know.
Click to expand...
Click to collapse
**UPDATE- Still no improvement. It will connect initially, and have active data. But then it will still show as connected with 1/3 WiFi bars, but no active data unless I disconnect and reconnect to the AP and then the same problem repeats itself.
OK, I'm having the same but in all fairness could be because I did 2 nodata updates. Will suggest if you can to backup your stuff and flash the full rooted version of FE22 and see if that fixes it - or hold tight and wait for OTA to drop if it's just nagging you and you don't want to do it now.
Short Version:
Got an OpenVPN server on my NAS. GN connects & works fine; remote resources are reachable. I now want to know how I can route all traffic through the tunnel. (Is this possible?)
Long Version:
For those times when I'm traveling (domestically and internationally) and/or using a questionable Internet connection, I'd like to secure the connection.
I've got a [stock] rooted GN running Jelly Bean with BusyBox installed. My NAS has two built-in VPN solutions one of which being OpenVPN so I got that setup which created an .ovpn file containing the following configuration:
Code:
dev tun
tls-client
remote YOUR_SERVER_IP 1194
# The "float" tells OpenVPN to accept authenticated packets from any address,
# not only the address which was specified in the --remote option.
# This is useful when you are connecting to a peer which holds a dynamic address
# such as a dial-in user or DHCP client.
# (Please refer to the manual of OpenVPN for more information.)
#float
# If redirect-gateway is enabled, the client will redirect it's
# default network gateway through the VPN.
# It means the VPN connection will firstly connect to the VPN Server
# and then to the internet.
# (Please refer to the manual of OpenVPN for more information.)
#redirect-gateway
# dhcp-option DNS: To set primary domain name server address.
# Repeat this option to set secondary DNS server addresses.
#dhcp-option DNS DNS_IP_ADDRESS
pull
proto udp
script-security 2
ca ca.crt
comp-lzo
reneg-sec 0
auth-user-pass
After installing OpenVPN Installer & OpenVPN Settings, I had to manually symlink busybox, ifconfig, and route from /system/bin to /system/xbin in order for OpenVPN to run properly.
Code:
#Note: In an attempt to be thorough, and for any Googlers or forum searchers (+1)...
#First I had to mount /system as read/write via:
mount -o -rw,remount /system
#Then create the symlinks via:
ln -s /system/bin/busybox /system/xbin/busybox
ln -s /system/bin/ifconfig /system/xbin/ifconfig
ln -s /system/bin/route /system/xbin/route
#Then remount /system as read-only via:
mount -o ro,remount /system
Once all of the above was setup, I initiated the connection, successfully authenticated, and was able to reach remote resources without issue.
What I would like to do at this point is get it setup so that I can have a second profile that routes all traffic through the VPN. I assume its a client-side configuration change but I really don't know at this juncture.
Many thanks!
Doesn't CyanogenMod ROM have native OpenVPN support? I think the OpenVPN client on CM has an option to route all traffic through the VPN. I think for what you want to do you should need a custom ROM or kernel that supports iptables.
iptables is a system file that allows the system to redirect network traffic usually for apps like tethering, firewalls, and proxies.
Sent from my Galaxy Nexus using Tapatalk 2
Thanks for taking the time to reply KemikalElite.
I've got BusyBox 1.20.2 installed and I do have an iptables binary (v1.4.11.1). With solutions like Hotspot Shield VPN that don't require root yet supports encryption for all traffic, I figured root + OpenVPN + BusyBox + iptables would be sufficient.
My initial assumption was that I would need to make some changes to my OpenVPN configuration to encrypt & route all traffic through the tunnel. But maybe I've been thinking about this all wrong and its less about OpenVPN and more about running a custom script once connected to route everything through the tunnel; and vice versa when I disconnect to restore the original configuration.
Perhaps I should be scouring OpenVPN forums?
Phylum said:
Thanks for taking the time to reply KemikalElite.
I've got BusyBox 1.20.2 installed and I do have an iptables binary (v1.4.11.1). With solutions like Hotspot Shield VPN that don't require root yet supports encryption for all traffic, I figured root + OpenVPN + BusyBox + iptables would be sufficient.
My initial assumption was that I would need to make some changes to my OpenVPN configuration to encrypt & route all traffic through the tunnel. But maybe I've been thinking about this all wrong and its less about OpenVPN and more about running a custom script once connected to route everything through the tunnel; and vice versa when I disconnect to restore the original configuration.
Perhaps I should be scouring OpenVPN forums?
Click to expand...
Click to collapse
You have the tun module as well right?
code.google.com/p/android-openvpn-settings/issues/list
Check through some of those issues. Something did say that the DNS servers may need to be manually set.
OpenVPN is so complex because of the config options. I find it easier to use native PPTP connections since there's no config only authentication and it routes all traffic automatically.
Sent from my Galaxy Nexus using Tapatalk 2
You need to enter "redirect-gateway" into your ovpn config file.... Just remove the # in the your config
Thanks for the reply ZiCoN!
I should have mentioned this sooner - terribly sorry for omitting this.
Once I got the VPN connected, I did the old 'what is my ip' to verify the route. It was still using the provider's network, but I could reach my NAS and other remote devices in the 192.168.x.x range - so the VPN itself was working. After reading the mini explanation in the config file I enabled 'redirect-gateway' and after reconnecting I could no longer access the Internet. I checked the OpenVPN Manual I added 'def1' after the 'redirect-gateway' statement, reconnected but still no go: I can no longer access the Internet. Remote resources are still accessible in both scenarios.
KemikalElite said:
You have the tun module as well right?
code.google.com/p/android-openvpn-settings/issues/list
Check through some of those issues. Something did say that the DNS servers may need to be manually set.
OpenVPN is so complex because of the config options. I find it easier to use native PPTP connections since there's no config only authentication and it routes all traffic automatically.
Sent from my Galaxy Nexus using Tapatalk 2
Click to expand...
Click to collapse
I somehow missed this when drafting my last reply. I think you're right about it being a DNS problem. I made a change to the config file (adding a few lines for 'dhcp-option DNS x.x.x.x') and within OpenVPN used the 'Fix DNS' button.
Thanks all for your time, thoughts, opinions and instructions!
Phylum said:
Thanks for the reply ZiCoN!
I should have mentioned this sooner - terribly sorry for omitting this.
Once I got the VPN connected, I did the old 'what is my ip' to verify the route. It was still using the provider's network, but I could reach my NAS and other remote devices in the 192.168.x.x range - so the VPN itself was working. After reading the mini explanation in the config file I enabled 'redirect-gateway' and after reconnecting I could no longer access the Internet. I checked the OpenVPN Manual I added 'def1' after the 'redirect-gateway' statement, reconnected but still no go: I can no longer access the Internet. Remote resources are still accessible in both scenarios.
Click to expand...
Click to collapse
You probably need to allow traffic to route back along the vpn film the internet. On your gateway, route vpn addresses to the VPN server and make sure forwarding is enabled on the vpn server.
Questions go in Q&A
Read forum rules and stickies before posting
Thread moved
FNM
Install openvpn and then place your edited client vpn config files and certificate files on the storage of FireTV similar to the raspberry pi method in the thread below:
h**p xbmchub.com/forums/threads/24769-How-to-set-up-your-VPN-on-raspberry-pi-using-Brain-Hornsby-Openvpn-for-XBMC
Thanks for anyone that may know more than me that could maybe get this to work...
Hmm would be nice if that worked. Did u get a chance to try it?
Sent from my Nexus 5 using XDA Free mobile app
tdfsu said:
h**p xbmchub.com/forums/threads/24769-How-to-set-up-your-VPN-on-raspberry-pi-using-Brain-Hornsby-Openvpn-for-XBMC
Click to expand...
Click to collapse
I'm working on something like this just now. Here's the thing: in my logs for the simplest openvpn app to install (not straight openvpn, it turns out, as there's a windowing issue there that makes it difficult / impossible to navigate through setup, even with a keyboard and Droidmote) once I have a config, I get errors in logcat informing me
"Your image does not support the VPNService API, sorry "
There is a manually installable openvpn binary that I've looked at a bit but not yet configured. It is going to require adding a binary to /system/xbin directly, as the installer (at least on my phone) does not understand where /system/xbin really lives and issues a remount command to a nonexistent partition.
If you're running dd-wrt or similar configurable firewall, another option is to get an account with a provider who is set up to let you do a firewall to firewall connection, and then route either all of your traffic or the traffic from your firetv through that firewall-to-firewall connection.
I have a Private Internet Access vpn account.
Installed openvpn on FireTV--
http play.google.com/store/apps/details?id=de.schaeuffelhut.android.openvpn.installer&hl=en
Installed busybox on FireTV--
http play.google.com/store/apps/details?id=stericson.busybox&hl=en
I created a pass.txt file with my PIA username on the first line and password on the second line, nothing else, then saved the file as a text file (pass.txt).
Download the following to PC--
http privateinternetaccess.com/openvpn/openvpn.zip
Extracted the zip file.
Edited the location specific .ovpn file (see below), changing the 'remote', 'ca', 'crl' and 'auth' lines to the following--
client
dev tun
proto udp
remote us-florida.privateinternetaccess.com 1194
resolv-retry infinite
nobind
persist-key
persist-tun
ca /storage/sdcard0/openvpn/ca.crt
tls-client
remote-cert-tls server
auth-user-pass /storage/sdcard0/openvpn/pass.txt
comp-lzo
verb 1
reneg-sec 0
crl-verify /storage/sdcard0/openvpn/crl.pem
Then, save the USFlorida.ovpn file.
Upload ca.crt, crl.pem, pass.txt, and .ovpn file to FireTV to /storage/sdcard0/openvpn/
Open terminal on FireTV. I use jackpal's terminal app below, but you can also use adb.
http play.google.com/store/apps/details?id=jackpal.androidterm
In terminal, type the following--
su
openvpn cd /storage/sdcard0/openvpn/USFlorida.ovpn
But I get several errors. Anyway, that's where I'm at. Maybe someone else more knowledgeable than me can figure it out. Sorry about the links, my low post-count will not allow me to post url's.
Also, you can sideload the following app to verify your external ip address, and it works great with the FireTV remote--
http play.google.com/store/apps/details?id=igit.WhatIsMyIp
The approach you've taken is where I'd be headed next on the client side.
One thing you might want to try is to do the same setup a less locked-down device and confirm that the config files work as expected there.
There's also a good discussion of the hardware approach (setting up a tunnel from your edge to a VPN provider) in the other VPN thread, http://forum.xda-developers.com/showthread.php?t=2797005
also, private internet access will sell a preconfigured router for this purpose!
Hi
I have a galaxy tab s T705 non-rooted device.
some times I use a proxy app like your-freedom or psiphon3 to connect to internet.
I'm using a home WiFi.
after disconnecting the apps I am unable to connect to internet anymore.
while I can connect with other devices and PCs.
I checked my proxy setting under modify network config.
there is no proxy there.
but my firefox and chrome browser showing not able to connect to proxy warning.
any solution?
PS: I had this problem before and factory reset fixing this, but I cant afford factory reset each time I use a proxy app.
I had to problem when connecting to proxys then when I dont use then my internet wont work. The thing that always worked for me is that since the proxy messes with the hosts file in your system, it changes the hosts file that makes you cant connect to the internet. So when you did a factory reset, it resetted that hosts file making your internet work again. If your rooted the fix is to go into etc, and delte the hosts file so when you connect to the internet again, it will make a new hosts file that it was before you used the proxy. Since your not rooted, please try a factory reset again and do not use proxys. Use vpn apps such as cyberghost vpn or hola vpn. Hope this helps!
Hey guys.
I have an old Fire TV 1 box here.
The firmware should be great and unlock'able.
My problem is that I can not block the updates with my router. It's a AVM fritz.box 7490 (all other avm should do the same) and I try it parent controll, balcklist sites. No success.
So at the moment the emmc-adapter is connected and the box is in dl-mode.
So I have access to the hole nand.
There should be a way to disable the auto-update service or enable adb, to disable the auto-update service over shell.
Code:
pm disable com.amazon.dcp
I hope any of you had an idea and can help me!
Greetings by I_did_it_just_tmrrow
EDIT:
SUCCESS!
I read a thread about the fire tablet and that they rename the com.amazon.dcp.apk to com.amazon.dcp.apk.bak .
I just do the same when I was connected with my emmc-adapter in dl-mode. So I just copy the su file to the xbin folder & rename the com.amazon.dcp.apk to com.amazon.dcp.apk.bak with sudo command.
Without blocking url's, the aftv1 just skip from updates process directly to login process in the initial setup.
After log-in I disconnect my lan cable, to be sure and on the safe way. Then simple enable adb, connect with shell & install Supersu. After that "pm disable com.android.dcp" service.
I was on the following os from factory: 51.1.3.0_user_513010720
I can not say anything about earlier or later fw's!