[Q] 10.1.3 networking flaky? - Nook HD, HD+ Q&A, Help & Troubleshooting

Is the networking flakey in 10.1.3? I've noticed a lot of other comments in the forum related to problems that look on the surface like they are network related.
For my part, it seems like since I did the upgrade to 10.1.3, anything that uses SMB access no longer is able to access shares.
Or is this just a problem I'm running into?
Thanks

I can access smb shares easily using es file Explorer, no issues at all, except I can't share an entire hdd unless I set username & passwors access (I normally use anonymous as I'm behind a good firewall & have nothing that can damage me like passwords or banking info saved anywhere).
That issue exists on smb shares on my galaxy s2 though so I suspect it's not cm10.1 related.

Related

Access phone through internet?

Hi!
When I'm at work, I'm 14 days on an oil rig, while my cell phone lies at home.
The work network has lots of blocked pages, and that's a bit annoying on my spare time.
So I was wondering if anyone knows of an application that makes it possible to remote control my phone through the internet (it's connected to WiFi at home)?
I have with success used TeamViewer for this purpose (on my laptop), but I was hoping the phone could take over this job now.
You can use Droid VNC Server
It's free to obtain.
Good Luck.
Could use a VPN setup to bypass those firewall blocks and give you access to home computer shares...
recommend OpenVPN. i have a tut avaliable for Desire HD aswell. once Uv set the OpenVPN Server up.
Just read about Webkey on Lifehacker. If your DHD is rooted then this is exactly what you asked for. You can control everything via a web browser.
Search Webkey in the market.

2 main problems with android,,,Proxy wifi and internet via USB

I got galaxy s as my 1st android phone months ago
the operating system is well and good i tried some roms here:darky,cyanogen and galent
i think the main problems is that:
you can't share pc internet to phone via usb - i heard that it's available on HTC phones running android-
and you can't play videos,open market or anything else other than browsing if you have to use a wifi protected by proxy and need autherication(like most of universities wifi)
i tried as proxy and transproxy but they seemed to be useless
Is there any absolute solution for that?Anyone has the same problems?

[Q] VPN options on a D3 with CM9

I'm running Hash's ICS on my D3, and can't seem to do anything with any VPN connections. On MavROM 3.5, I was able to make un-encrypted PPTP connections, because for some reason, MPPE support is missing in the Kernel. I know what an absolute pain in the neck getting a PPTP server up and working on Linux can be, so I can't imagine what a pain getting it running on Android is like.
Has anyone been able to make any kind of VPN connection on their D3 with a CM9 based ROM? I have yet to hit my logs, and start capturing packets, but before I did, I wanted to see if its even possible, since having a locked bootloader makes things a little tougher..
Anyone have anything for this? 3rd party options? This is one area where the iPhone just works, and I have had a hell of a time getting various Android flavors connected to our VPN. Either PPTP or L2TP. It's just not as easy as an iPhone or iPad.
This is certainly been a decision factor for Tablet provisioning for our sales guys. One guy did buy his own Android tablet, and just can't get the VPN working, where all of our iPad's work without modification.
I hear crickets chirping...
I've been searching for months.. I have found no viable fix for VPN on either CM7 or CM9, and from what I've found it's an upstream issue in Android itself. Only solutions I've found connect to other service providers to provide anonymity. i have not tried paid solutions.
Not sure if this is an option, but OpenVPN works flawlessly. Unless you strictly require a PPTP/L2TP solution, try it out. I've got an OpenVPN server running on my router at home so I can connect from my phone at any time and have quasi-LAN access to my home network, comes in really handy. Not to mention it's a billion times more configurable than either of the built-in (and outdated) VPN types.
Android has never been known for its VPN compatibility, surprisingly enough. You'd think it would be a major focal point in terms of customer requirements, but I guess it's sort of slipped through the cracks.
Nevertheless, try searching the Market (or Play, whatever they've called it now) for OpenVPN Installer and OpenVPN Settings, the first app does what you'd think and the second is where you initialize and configure your connections.

Samba file sharing does not work in ics 4.0.4

I can not use more samba file sharing after that passed to use ics. Currently i'm with the latest version of 27/05/2012 4.0.4. Any idea about it?
Att
Try this thread http://forum.xda-developers.com/showthread.php?t=653336&highlight=ics
Samba also NOT working on Nook Color (ICS) CM9 nightly (eyeballer)
Samba is working on my Samsung Galaxy S2 with ICS (rooted)
Good Luck
GHRP said:
I can not use more samba file sharing after that passed to use ics. Currently i'm with the latest version of 27/05/2012 4.0.4. Any idea about it?
Att
Click to expand...
Click to collapse
Also not working on Krylon 360's ICS, I have two nook colors running it and it doesn't work on either one.
I am also running CM9 (9-20120727-unofficial-vs660) on my LG VS660 (Vortex) and it is working.
I've noticed I can't ping either of my Nooks but I can ping my Vortex, I'm wondering if the two are related but I have been unable to find anything on Krylon's ROM that is blocking pings.
I've noticed sometihng similar on my Motorola Milestone 2 on Cyanogenmod 9, which is also 4.0.4. While running Samba Filesharing, the device doesn't reply my pings. More than that, it makes the phone having no internet connection anymore. When Samba filesharing has been turned off, I have to turn wifi off and on, and from then on, the phone regains internet connectibity and replies to pings from my windows PC again. Samba Filesharing is the latest version directly from Google Play, 111107m.
There is a patch that makes this Samba Filesharing working on platforms that are newer than ICS (My other phone, a Samsung Galaxy S2 has JB, and Samba works there with this patch), but this patch doesn't work on my Motorola.
Additionally, I've encountered another issue inside Samba Filesharing: I'm unable to set 'second shared folder'. The app says:
'No other read+write FAT based filesystems were detected'
My SD-Card is already in a FAT based format.
Besides, looking around in the Android filesystem of my Cyanogenmod 9 on the Motorola AND my Samsung's JellyBean showed to me, that the android filesystem's structure regarding the mount points have changed and looked quite different than those from Gingerbread. Maybe, this could be a reason, why Samba Filesharing doesn't find my SD-card and showing this error message on 'second shared folder'? But this still doesn't explain the crashing of wifi, when Samba Filesharing is active.
Any ideas?
Zoli

Rooted Chromecast with Web Panel = Problems with security

I was playing with it only for one few hours...
and I am concerned with current level of security of rooted Chromecast.
If you
reboot wireless router(wireless access point)
OR
wireless router is down/malfunction
OR
communication between Chromecast and wireless router is jammed
OR
someone used Aircrack-ng suite to disconnect Chromecast from wireless router
your Chromecast just created open wireless network for configuration purposes...
and Team-Eureka http panel is accessible at most likely default IP address 192.168.255.253,
also provides you with an IP adress via internal dhcp.
look a bit at config:
http://192.168.255.249/?page=status
and than
http://192.168.255.249/?page=settings
be sure that telnet, ssh, adb are running.
Just connect with telnet or SSH, privledged user is root, there is no password
cat /data/wifi/wpa_supplicant.conf
Code:
ctrl_interface=/data/wifi
update_config=1
country=US
network={
ssid="my wifi essid"
scan_ssid=1
psk=my password on a silver plate in WPA PSK HEX(64 characters)
proto=RSN
key_mgmt=WPA-PSK
}
You just owned someone's Chromecast and can abuse his wireless network.
Still got time tinker with Chromecast? Maybe plant some android type of backdoor... NSA style...
How to fix this?
1. be sure that internal web server is not vurnelable.
2. https
3. Http panel accessible only after providing password that is by default for instance sha-1 hash of serial number.
(user may take a picture of his own chromecast and use tool/service to generate hash), it should be changed at first login
4. adb, telnet, ssh disabled by default
5. root password
Basic stuff...
First off, if you are worried about our panels security it is open source, so feel free to audit it for any vulnerabilities.
Also, we are working on a new revision of the panel which not only includes password support, but also the ability to set a SSH password. The reason none is set ATM is because by default the root acc on the chromecast has none, so we have a modified dropbear binary that will allow any password to work.
As for HTTPS over the web panel, that will be available, but it will not be "enforced". (at least that is the current plan). We may add a panel option that enforces https though, for users who are concerned about security on their local wireless network.
Now telnets another story, because its generated with busybox its hard to have a password enforced, but you can just disable it. same goes with ADB.
We know right now our services are not the most locked-down, but trust me most of it has already been fixed on our end and these changes will be out with the next OTA
ddggttff3 said:
First off, if you are worried about our panels security it is open source, so feel free to audit it for any vulnerabilities.
Also, we are working on a new revision of the panel which not only includes password support, but also the ability to set a SSH password. The reason none is set ATM is because by default the root acc on the chromecast has none, so we have a modified dropbear binary that will allow any password to work.
As for HTTPS over the web panel, that will be available, but it will not be "enforced". (at least that is the current plan). We may add a panel option that enforces https though, for users who are concerned about security on their local wireless network.
Now telnets another story, because its generated with busybox its hard to have a password enforced, but you can just disable it. same goes with ADB.
We know right now our services are not the most locked-down, but trust me most of it has already been fixed on our end and these changes will be out with the next OTA
Click to expand...
Click to collapse
Thank you for fast and exhaustive answer.
Any "ETA" of build with features you mentioned ?
Is there any roadmap for Eureka-ROM?
Any chance for something dedicated to LAN streaming?
(Chrome full screen is buggy, Plex is $ app, Fling is written in JAVA and no longer in developement.)
If there will be any beta or rc I am willing to participate.(not so many things to test there)
mathorv said:
Thank you for fast and exhaustive answer.
Any "ETA" of build with features you mentioned ?
Is there any roadmap for Eureka-ROM?
Any chance for something dedicated to LAN streaming?
(Chrome full screen is buggy, Plex is $ app, Fling is written in JAVA and no longer in developement.)
If there will be any beta or rc I am willing to participate.(not so many things to test there)
Click to expand...
Click to collapse
We don't really do ETA's but we try to have updates out right after google OTA's, or when there is a severe bug. As for a roadmap, we currently don't have one public due to it constantly changing.
LAN streaming still works with Fling (as we have fling added back to our roms through our whitelist service), but that is all I know of. If other users want to create apps that can utilize fling, that would be awesome.
And last for testing, currently I have more then enough testers for when beta updates roll out. keep your eyes open in the future as I may do open signups again at a later date.
Well the scenarios you set would apply to non rooted CCasts as well...
If they hacked your wireless with Aircrack to set a disconnect, then you were exposed long before they reconfigured the CCast and they can do a lot more damage with that access without you ever noticing than they could through the CCast.
Your would notice the CCast changing but you wouldn't notice someone hacked your Wireless without looking at the Router Logs or noticing a degraded Network performance.
If these things are a concern for you then I suggest you turn on MAC Filtering on our Router, Set Allows for the CCast and all the devices you own and deny all others.
But the concerns you have exist regardless of a rooted CCast. Leaving a CCast unconnected might expose the CCast to be taken over since it will be an open AP anyone can connect to....And they can Airtcrack you router even with a stock CCast.
But if you see that just look out the window because they would probably have to be sitting on your Porch or parked in your Driveway to do it!
I don't know many Hackers who are THAT Brazen! LOL
Asphyx said:
Well the scenarios you set would apply to non rooted CCasts as well...
If they hacked your wireless with Aircrack to set a disconnect, then you were exposed long before they reconfigured the CCast and they can do a lot more damage with that access without you ever noticing than they could through the CCast.
Your would notice the CCast changing but you wouldn't notice someone hacked your Wireless without looking at the Router Logs or noticing a degraded Network performance.
If these things are a concern for you then I suggest you turn on MAC Filtering on our Router, Set Allows for the CCast and all the devices you own and deny all others.
But the concerns you have exist regardless of a rooted CCast. Leaving a CCast unconnected might expose the CCast to be taken over since it will be an open AP anyone can connect to....And they can Airtcrack you router even with a stock CCast.
But if you see that just look out the window because they would probably have to be sitting on your Porch or parked in your Driveway to do it!
I don't know many Hackers who are THAT Brazen! LOL
Click to expand...
Click to collapse
Reconfiguring stock Chromecast is one thing and that's not so much a problem. Attacker don't get password, just info about name of connected network. In that scenario attacker gets essid and handshakes or reconfigure Chromecast wireless settings(essid/password).
Problem is that with rooted attacker has access to adb/telnet/ssh. In that scenario attacker has easy access to essid/password in plain text and may do this unnoticed.
About ranges:
What if someone lives in center of a city? Skyscrapers area?
About suburban area, I am not convinced that people in US live in houses with brick/concrete block walls, this is not EU.
Have you ever used Aircrack-ng suite and some gnu/linux wireless pentesting distro?
You can attach high gain directional antenna to 2000mW wireless card(Alfa brand for instance) and use software tweaks.
Ranges are much higher than you would anticipate.
About Chromecast setting security - yes it is ridiculous.
It asks if you see XYZ9 on a screen. (always click yes - right?)
It should at least ask for some automatically generated password that is visible on the screen...
So for now we may create additional wireless network/VLAN with max one client and connection restrictions...
mathorv said:
Have you ever used Aircrack-ng suite and some gnu/linux wireless pentesting distro?
You can attach high gain directional antenna to 2000mW wireless card(Alfa brand for instance) and use software tweaks.
Click to expand...
Click to collapse
Yes many times and the loopholes you suggest in your scenario are not limited to the Rooted version at all...
Sure there are extra tools in the rooted version that do not exist in the non-rooted....
But the scenario suggested gives you about 30 seconds to get what you want before the router is back up, CCast re-connects and shuts down your session!
And they still have the problem of how to shut down your router or know when it will happen to start working the hack.
Sure someone could probably get what they want in that timeframe..
But someone that good really is not going to be interested in hacking YOU!
Not Unless your some Cartel leader or Bank Executive.
People who have no business rooting anything if they want security....LOL
Asphyx said:
Yes many times and the loopholes you suggest in your scenario are not limited to the Rooted version at all...
Sure there are extra tools in the rooted version that do not exist in the non-rooted....
But the scenario suggested gives you about 30 seconds to get what you want before the router is back up, CCast re-connects and shuts down your session!
And they still have the problem of how to shut down your router or know when it will happen to start working the hack.
Sure someone could probably get what they want in that timeframe..
But someone that good really is not going to be interested in hacking YOU!
Not Unless your some Cartel leader or Bank Executive.
People who have no business rooting anything if they want security....LOL
Click to expand...
Click to collapse
@but someone that good really is not going to be interested in hacking YOU!
World is full of sick people, besides, over the years it has become easy, primary school kid can do it, every hacking soft has a GUI now
@ features - it would be nice to override wifi from panel - sometimes chromecast indicates connecting status. at the same time is connected to secure wifi and has open configuration wifi.
@ alpha builds, I would be glad to flash anything newer that does not totally brake chromecast and is safer for now
Is web panel risky?
Sorry it's even worse:
1. connect to device if its in open network AP state
2. http://192.168.255.249/?page=debug
3. cat /data/wifi/wpa_supplicant.conf
4. SEND
Gone in less than 30 seconds.
mathorv said:
Sorry it's even worse:
1. connect to device if its in open network AP state
2. http://192.168.255.249/?page=debug
3. cat /data/wifi/wpa_supplicant.conf
4. SEND
Gone in less than 30 seconds.
Click to expand...
Click to collapse
Good thing devices only are in AP mode for setup. Besides, once the new web panel is released, this will be a non issue.

Categories

Resources