Related
My market always says starting download, But never actually starts. It HAS worked, and my connection is fine, but its really finicky.
Anyone else experiencing this?
//from the nook
Think lots of people see this behavior ... and actually it seems that while it looks like it's not DLing, it actually is ... try this ... click on an app you want ... the market will ask if you want to install, after you say OK it goes back to the market .. click again on the app you are DLing and watch for a minute .. it'll probably display that it is now DLing and it seems it really was all along. Also this is not 'repeatable' .. sometimes it behaves this way, other times it goes straight to DLing ... have this same behavior on my Froyo phone and a small android tablet.
I used to have this issue and HTC had no idea about it. Realised that if you have the low disk space icon showing in your notification bar, market will not download or update any applications until the issue of space is sorted.
Hope it helpa
Sent from my HTC Desire using XDA App
Thanks for replying.
Nothing seems to be working. Pandora and jorte Have been starting to download for over 12 hours. My disk space is fine so that can't be the issue. I feel like its connection based in some way, but I have no evidence of that.
//from the nook COLOR
So I jumped on market help just now and this is a very common issue. The fix is just signing or resigning into to gTalk. Weird but it worked immediately after I defrosted and reboot.
//from the nook COLOR
Start downloading in the market only hang on my NC when there's a low on disk space notification even though there's 100MB left. When I clear some addition space, the downloading resume.
My NC was acting the same way last night. Marketplace downloads took forever and many times it would say "download paused". Dolphin HD and default browser were both super slow loading pages if they loaded them at all. I checked the Wireless and it seemed to be "cycling" between "Connected to the Internet" and "Connected, testing...." every 5 to 10 seconds. I managed to load Speedtest and my download rate was 50 Kbps or less. My Samsung Fascinate sitting right beside the NC was hitting close to 1Mbps on Speedtest over WiFi.
So I started backing out the apps I've installed, no change. Frustrated, I end up doing a hard reset to reload the system partition and deregister to clear everything else. So now I'm back to bone stock and it's 1:00 am, still NO CHANGE!! WiFi is still super slow to non-existent
Needless to say at this point I'm a tad irritated with the NC. I box NC up thinking it must have some type of wireless defect and plan on taking it back to Best Buy since I just bought it 3 days ago.
For some reason I decide to check out the Barnes and Noble website thinking it's a long shot they'd have any answers but what the heck. In the Support forum for the NC I found a thread talking about the NC having issues with WiFi when using WEP security. Not 100% of the time but sometimes. Oh my, I'm using WEP security on a DLink router!! (I know, not the best decision I've every made but certainly not the worst, the ex-wife holds that honor!!)
So I unbox and power up the NC, "Forget" the current wireless connection, turned off the wireless all together and power off the NC. I log into the router and change over to use WPA-PSK security. Power up the NC and turn the wireless back on. It finds the network and shows WPA-PSK security in use. I enter the key and it connects immediately. I open the default browser and poof the Barnes and Noble page loads quick!!!
It's now 2:00am and I'm re-rooting the NC and reinstalling apps. The Market Place and Dolphin HD are now responding like they should. The constant "cycling" between "Connected to the Internet" and "Connected, testing..." has stopped. The NC still cycles between the two but it's not nearly as often.
So I've learned: Don't work on the NC at 1:00am. You'll make rash decisions which will cost you a lot of unnecessary work later on. And, if you're having WiFi issues and using WEP try WPA-PSK instead.
Sorry for the long winded ramble, lack of sleep I guess.
T
TCStehle said:
So I've learned: Don't work on the NC at 1:00am. You'll make rash decisions which will cost you a lot of unnecessary work later on. And, if you're having WiFi issues and using WEP try WPA-PSK instead.
T
Click to expand...
Click to collapse
Or just Mac address filter I have no password on my router but if the devices Mac address isn't on the list they can't even connect to the 192.168.2.1/192.168.1.1 router login stuff.
Not recommended unless you like setting stuff up because anything you plan to use have to be added to the list.
sent from a Nook Color using xda-app
Off topic but it's really easy to spoof a mac address. Still use WPA if you care about security. I personally don't.
Sent from my swype-a-myn-a-calkytalky googly super premium deluxe astounda phone
They can determine valid MACs for your network by simply monitoring the traffic and clone one that you've white-listed.
That's like locking your car door and leaving the windows rolled down.
It's still better than WEP, though.
RoboRay said:
They can determine valid MACs for your network by simply monitoring the traffic and clone one that you've white-listed.
That's like locking your car door and leaving the windows rolled down.
It's still better than WEP, though.
Click to expand...
Click to collapse
Thats with anything tho, if a supa n3rd wants to come sniffer/brute force for hours for wifi they will get it.
But, Especially, since it was about the NOOK not liking WEP/WPA2 Mac address filtering is another option with which ive had no problems plus the no password hassle while still enjoying some security.
Crappy belkin routers never have problems with the NC tho WEP/WPA2 or not.
camwinnn said:
Thats with anything tho, if a supa n3rd wants to come sniffer/brute force for hours for wifi they will get it.
Click to expand...
Click to collapse
Sure, but it's a matter of the effort/reward ratio. MAC-cloning and WEP-cracking is trivial. It can be done in 1 minute. That requires no meaningful effort. Brute forcing for hours obviously requires a considerably greater effort and time expended.
You can see the difference, right?
They're going to go after the low-hanging fruit and then move on to more easy-pickings, not waste time hammering away at WPA2 for hours and hours.
RoboRay said:
You can see the difference, right?
They're going to go after the low-hanging fruit and then move on to more easy-pickings, not waste time hammering away at WPA2 for hours and hours.
Click to expand...
Click to collapse
I guess its all your set up, either its was the PSP or DS but I play soulsilver via wifi an one couldn't manage wpa2 and since wep is bad I'd rather not bother with a password.
Plus if my connection lags a second I look up the dhcp list hourly almost if torrent uploads fall below 250k. It still may be easy access but it would be a pain to get my "fruit"
sent from a Nook Color using xda-app
Ok guys. I am not sure what is going on here.
I can't connect to my schools wifi and it is becoming a royal PITA.
I can connect to wifi perfectly fine at home.
At school, they don't require any sort of "password" to access the network. (no wep or anything I mean) They do have one of those annoying/retarded portal login systems which seems to be coded to only care for laptops.... Actually I should say coded for a hand full of browsers ON the laptop.
I once or twice a week or so ago was able to actually access the login page either by entering it manually and being able to actually use wifi for a few minutes.. or by getting redirected.
I took the problem up with the help desk, they said we now have alimit of 4 wireless devices and my allowance was maxed.
Unlikely but, whatever..
So now over the last few days won't redirect me, it won't let me even enter the login address manually.. (before it wasn't a sure thing but, I could at least do it.)
I am rooted running cog 3.03. (Which does have the 2.2 update) Had the same problem on stock 2.1.
Goes without saying I'm rooted and willing to do what it takes to get wifi working here.. Even if I did happen to have unlimited data.. my school is pretty Iphone heavy... especially at lunch, And some days I am just happy to receive the occassional text I can get from my girlfriend.
But, fact is I don't have unlimited data.. I have extremely limited data.
If anyone has a solution, I would appreciate it.
Tried:
Wifi fixer in market.
Rebooting.
"forgetting" then reconnecting. (a million times).
Manually assigning an IP address.
Praying to Cthulhu
Using multiple browsers to see if one works with portal better.
and I am out of idea's..
Any chance you need to enter a proxy server?
I have never needed to enter a proxy server before with any other device.
And I have never found anything suggesting I would anywhere on the school website.
Snow_fox said:
I have never needed to enter a proxy server before with any other device.
And I have never found anything suggesting I would anywhere on the school website.
Click to expand...
Click to collapse
You might ask around about it. The browser is probably set to auto detect a proxy. You don't have that on the phone.
Although, you do indicate you actually did connect for a bit a while back, so it likely isn't the proxy.
Sorry. Don't know what else to offer.
I appreciate the effort, unfortunately my school didn't resolve the issue either so I am unsure what to do..
You might be on to something with the proxy...
No telling how the looney's set this stuff up...
Do you have the login page in your favorites? And does the device connect to the wireless "hotspot"?
I'd test it at a starbucks (or mcdonalds of all places have them too) and see if the issue repeats itself. The ATT hotspot requires you accept the agreement before it allows you to browse.
If it doesn't work.. I'd go back to stock and see if you continue having the same issues. If the issues are resolved when going back to stock - then you'd need to bug DG for a possible fix with his ROM as that is possibly where the problem lies.
Yes it does happen to connect at other places.
I can get it working at home no problem.
I have the url memorized at this point to log in..
Part of the reason i rooted was one or two people said it cleared whatever wifi problems they wre having up..
Infact I would agree with that more than anything..
Although it didn't fix my problems, I have been able to do a bit more..
I hate with a passion bumping my own thread.. but, if anyone can help.. I would appreciate it.
i think your issue might not be your phone but your school unfortunately... when you are there to connect, are there a lot of others there as well?? for example, where i am at, they have their access points set up and i can select it with my phone, but sometimes i get on and sometimes i dont.. the issue is that they limit the amount of connected users and it might show that you are connected, but you don't in fact have access.. does this sound about like what you are having??
a test (and this will suck) is to let it connect and if it isnt connected, sit there for a while and watch as people leave and see if you connect.. usually they slot peeps in order as they log in via their IP.. so depending on how many users are not able to connect, you might not be the first to get on.. this sux and i know.. it happens here all the time and some times i have drained my laptop battery sitting there trying to connect.. now that i have my phone, 1 or the other will connect first
hope it helps a little.. but like said.. good chance its not your phone .. if it is your phone.. i am not really sure what else to think of at the moment..
Zug
Dear Team Eureka there is one thing you may do with security of Chromecast that Google did not.
You may add the missing security feature:
"if there is no connection to preset network" - "do not enable unprotected wifi ap mode" unless user will press reset button for short time (something like enable/disable wifi feature with openwrt)
There is plenty of things you ma use button for in future
(you may use different functions within different interval)
press
1-5 seconds
6- 15... and so on
I like this feature!
I agree that the way it is currently working is not as secure as it could be...
But I think the better way to do all of this is the following:
1 - Never have the CCast automatically connect to an Open Wireless unless specifically told to via Setup (not sure if it does this now or not)
2 - (and this would be the alternative to your suggestion) CCast doesn't leave any unprotected network sans AP connection for setup. It's default setup mode is a protected WiFi either WEP or WPA
CCast should instead set a random pin/pass and WPA/WEP connection for use in setup when it can't find an authorized AP.
Since you should have access to the screen it is plugged into and hackers would not, you would make the connection to the CCast in protected mode using the PIN that is displayed on the screen to make the connection to the protected network. Once connected you set up the device normally.
Much better than walking over to the TV and device to press a button and much more secure because the only way to set up or take over the unit requires access to the TV it is plugged into.
As far as the Button is concerned I would really like to see it used to switch modes and add a DLNA device mode to the custom rom. Unless the ROM could add this feature while still in CCast mode.
Asphyx said:
1 - Never have the CCast automatically connect to an Open Wireless unless specifically told to via Setup
2 - (and this would be the alternative to your suggestion) CCast doesn't leave any unprotected network sans AP connection. It's default setup mode is a protected WiFi either WEP or WPA
CCast should instead set a random pin/pass and WPA/WEP connection for use in setup when it can't find an authorized AP.
Since you should have access to the screen it is plugged into and hackers would not, you would make the connection to the CCast in protected mode using the PIN that is displayed on the screen to make the connection to the protected network. Once connected you set up the device normally.
Click to expand...
Click to collapse
AFAIK Chromecast never does #1 - it won't auto-connect to any AP unless it's already set up.
Agree on #2 though. Actually, both yours and mathorv's suggestion could be used in conjunction - Chromecast should use WEP security* on its setup AP and turning on the setup AP could be set to require human interaction.
*mainly for compatibility with clients/routers that don't support WPA or better - yes, they still exist - crackable, yes, but still better than completely open as it is now.
Since the serial number is easily accessible on the unit itself and its box, that could be an easy-to-get password, and the 4-character alphanumeric ID shown on the TV could be a secondary confirmation for Setup, not just a convenient way to make sure you're connected to the correct Chromecast (does Google really think/hope there will be that many Chromecasts out there being set up at the same time?).
Also if http will be protected with https also passwords it may be better to config Chromecast wireless options via https/ssh.
Is there any way to implement power save for example trigger via ssh/https?
bhiga said:
AFAIK Chromecast never does #1 - it won't auto-connect to any AP unless it's already set up.
Agree on #2 though. Actually, both yours and mathorv's suggestion could be used in conjunction - Chromecast should use WEP security* on its setup AP and turning on the setup AP could be set to require human interaction.
*mainly for compatibility with clients/routers that don't support WPA or better - yes, they still exist - crackable, yes, but still better than completely open as it is now.
Since the serial number is easily accessible on the unit itself and its box, that could be an easy-to-get password, and the 4-character alphanumeric ID shown on the TV could be a secondary confirmation for Setup, not just a convenient way to make sure you're connected to the correct Chromecast (does Google really think/hope there will be that many Chromecasts out there being set up at the same time?).
Click to expand...
Click to collapse
Thats why I think whenever it can't find an AP to connect to it shouldn't take anything for it to generate a random password (changes everytime) that can be used until setup is complete...
As for HTTP access i it is not connected to an AP there really is no HTTP available until you have connected to it in some way.
I would be happy if Google allowed us some config tools but I don't think they are all that interested in us having control over the unit for DRM purposes.
The devs at Plex have even said that Google will not allow them to implement sending to CCast as part of their Local PlexWeb (Plex.TV is fine though)
This suggests they really do not want anything they can't approve or any usage that could expose how the device is talked to being left open to the public.
I guess they figure that if we can see how linkage and communication is done we will reverse engineer it to play and do things they don't want us doing or bypassing DRM schemes as they currently work.
bhiga said:
Agree on #2 though. Actually, both yours and mathorv's suggestion could be used in conjunction - Chromecast should use WEP security* on its setup AP and turning on the setup AP could be set to require human interaction.
*mainly for compatibility with clients/routers that don't support WPA or better - yes, they still exist - crackable, yes, but still better than completely open as it is now.
Click to expand...
Click to collapse
WEP is broken for over 10 years now! No sane human being is using it. Cracking WEP is extremely fast and easy. WEP is a false protection, illlusion of security. Using WEP is BLASHEMY.
mathorv said:
WEP is broken for over 10 years now! No sane human being is using it. Cracking WEP is extremely fast and easy. WEP is a false protection, illlusion of security. Using WEP is BLASHEMY.
Click to expand...
Click to collapse
Obviously you feel strongly about WEP.
I'm not going to argue that, because you are right that WEP is easily broken. WPA can be broken too, but with more effort.
That said, WEP is an illusion of security only if you expect it to be unbreakable, just like passwords and everything else.
Seat belts won't save you in every accident, but if you don't expect them to, they are still helpful in the event of an accident.
Now if you're driving recklessly because you think seat belts and air bags will save you, then yes it is a false sense of security and you're foolish to take extra risks.
But for the Chromecast setup AP that is temporary by nature, are you suggesting that it is better to not use any security at all, just as it is right now?
You know what I always say.....
"Just because you are Diagnosed Paranoid doesn't mean people aren't out to get you!"
LOL
This is the second conversation regarding CCast vulnerability and so far all we have identified as a REAL security concern is that someone could set up the CCast to connect to some WiFi other than yours which would lead to the grand total tragedy that they could send content to your TV.
The other conversation was in regards to the Rooted ROM having SSH and Telnet installed that could be used to hack your Router Password provided you had already hacked the router password to make the connection to the CCast in the first place to use those tools to get what you already have!
Here is something folks should take into account....NOTHING IS SECURE EVER!
Even the Servers in Iran's Nuke Plant that had no connection to the outside world whatsoever were compromised, Hacked and attacked by Stuxnet!
There is no security ever the only thing you can ever really do is make the hack hard enough and as time consuming as possible that they will move onto someone else's system to pry into their Word Docs and that private folder you keep your IFriends profile pictures in instead. LOL
Yes WEP can be hacked. Imagine how much fun someone will have after they set up your CCast to use their network and try to send content to a TV never knowing if you actually noticed it or not because they can't see your TV.
It's still a damn site better than leaving an Open WiFi AP on the CCast until setup which takes no hacking skill at all to crack.
The way I look at it if the person is smart enough to hack they are also smart enough to know there is no point in hacking a CCast...Not when there is a WiFi router that gets them a hell of a lot more personal info and much more access than just displaying content to your TV.
Asphyx said:
This is the second conversation regarding CCast vulnerability and so far all we have identified as a REAL security concern is that someone could set up the CCast to connect to some WiFi other than yours which would lead to the grand total tragedy that they could send content to your TV.
Click to expand...
Click to collapse
While this would be a great dorm prank, at least with the current functionality of Chromecast, that's all they get to do... turn on the TV and send whatever video to the TV they want, which would be quite scary/annoying. Think of the beginning of Back to the Future Part II where all the screens in the house turn on with Marty's boss telling him he's fired.
Asphyx said:
The other conversation was in regards to the Rooted ROM having SSH and Telnet installed that could be used to hack your Router Password provided you had already hacked the router password to make the connection to the CCast in the first place to use those tools to get what you already have!
Click to expand...
Click to collapse
Actually I think the scenario @mathorv described is a little different and easy to exploit.
Chromecast is in setup mode and broadcasting an open AP
Attacker connects to the open AP
Attacker connects to Web Panel and enables ADB/Telnet/SSH (because web panel currently does not require authentication, Team Eureka said authentication is coming)
Attacker connects to Chromecast via ADB, Telnet, or SSH and gets access to the root filesystem, where they can see the cleartext password and SSID of the AP that Chromecast normally connects to (because password is stored in supplicant config file which is accessible)
So the attacker does not need anything more than to see the Chromecastnnnn AP.
Sadly, the WPA authentication seems to be stored the same way on phones/tablets as well. The only thing that shields phones/tablets from the same type of attack is not all of them have root and they usually aren't accessible from the network. Hence, with root comes extra responsibility, which is why root often is made difficult.
Asphyx said:
Here is something folks should take into account....NOTHING IS SECURE EVER!
Click to expand...
Click to collapse
Yup. What we commonly call "security" is really just a deterrent. It increases the effort and the hope is that the attacker will pick an easier target. It's why we put locks on doors when it's often relatively simple to bypass them.
bhiga said:
Chromecast is in setup mode and broadcasting an open AP
Attacker connects to the open AP
Attacker connects to Web Panel and enables ADB/Telnet/SSH (because web panel currently does not require authentication, Team Eureka said authentication is coming)
Attacker connects to Chromecast via ADB, Telnet, or SSH and gets access to the root filesystem, where they can see the cleartext password and SSID of the AP that Chromecast normally connects to (because password is stored in supplicant config file which is accessible)
So the attacker does not need anything more than to see the Chromecastnnnn AP.
Click to expand...
Click to collapse
Except for the fact that if it is not connected to the router then that means the router is unavailable, and or the Password saved in cleartext isn't working. If it was it would be connected and not in Setup mode.
Thats the point I was trying to get across there....
Sure you could find passwords to APs the CCast was connected to...
But if it isn't connected at the time of the hack then those APs are not available if they were you would not be able to connect to the CCast.
And if they are available then anything saved in the CCast is worthless since the CCast couldn't use it to connect either.
And I told him how to plug that hole far better than via the ROM....
Turn on Mac Filtering so not only do you need the password but need to clone a MAC address as well.
And all of this to get at what?
Your last will and testament and some compromising Pictures?
If you make it difficult enough that the payoff isn't worth the effort they will move on....
Asphyx said:
Except for the fact that if it is not connected to the router then that means the router is unavailable, and or the Password saved in cleartext isn't working. If it was it would be connected and not in Setup mode.
Click to expand...
Click to collapse
Ahh, I see your point now.
At least for me, sometimes Chromecast will "miss" the connection shortly after boot, so the setup AP is available for a few minutes after a reboot. To exploit that, someone would need to be sitting and listening for it to pop up - not a "juicy" target, but still possible. People do strange things "just because they can" - at least that's what YouTube teaches me.
As you say, MAC filtering provides an additional deterrent level. Unfortunately the target customer is probably not sophisticated enough to do that. I'm not sure all ISP-provided devices (I avoid integrated hardware that I can't configure) allows setting MAC restrictions though.
Asphyx said:
But if it isn't connected at the time of the hack then those APs are not available if they were you would not be able to connect to the CCast.
And if they are available then anything saved in the CCast is worthless since the CCast couldn't use it to connect either.
Click to expand...
Click to collapse
Well, in theory, you could connect to the CCast when it is in unprotected AP mode, enable ssh, and write a shell script which gets started every boot and sends out the saved wifi password somewhere to the internet. Then, when the CCast owner sets up is wifi, and sometimes later reboots, the wifi passwords will be sent out.
But... since there are probably only a few thousand rooted Chromecasts, and the time window in which to push the script to the Chromecast is so narrow, I doubt anyone would spend any time to try this.
bhiga said:
Unfortunately the target customer is probably not sophisticated enough to do that. I'm not sure all ISP-provided devices (I avoid integrated hardware that I can't configure) allows setting MAC restrictions though.
Click to expand...
Click to collapse
I'm sure thats true but if your not sophisticated enough to control your own Network or let an ISP do it all for you the least of your issues are what might happen in the odd chance CCast is disconnected or in the 30 seconds before it connects to an AP during Bootup. Locking up the holes in a CCast sure isn't going to help you much LOL
frantisek.nesveda said:
Well, in theory, you could connect to the CCast when it is in unprotected AP mode, enable ssh, and write a shell script which gets started every boot and sends out the saved wifi password somewhere to the internet. Then, when the CCast owner sets up is wifi, and sometimes later reboots, the wifi passwords will be sent out.
Click to expand...
Click to collapse
Well in theory you could have it do location checks with Google and map location, SSID and Password of every AP it ever connects to...
Like I said to what end would someone do that?
What is the PAYOFF in the end?
I could understand it if your living next to Bill Gates and wanted to steal banking info....
The Average Joe doesn't have anything worth seeing that would make someone go through all of that especially when they could get it much easier by just sniffing WiFi packets and finding the same data and decrypting it.
They could sit there all day and hack the Router but they have such a small window to work with on an unconnected CCast either because they have to catch it rebooting or catch it in a location that it isn't setup for and unless you have written a program to do all of that without Human Intervention you still got a snowballs chance in hell of getting any worthwhile information...
Security only happens when there are multiple layers of protection that make it so difficult to breach that they won't bother unless the payoff is worth it.
Someone really has to hate you in order to go through all that so some of the best security practices you can implement is don't be an AZZ and no one will have it out for you enough to want to get something on you via a Hack! LOL
(Not suggesting anyone in this discussion is just saying in General LOL)
Asphyx said:
Like I said to what end would someone do that?
Click to expand...
Click to collapse
Well, would you give me your WiFi password?
I can think of a few things you could do with access to someone's WiFi... Free internet, torrenting on someone else's responsibility, or just messing with someone.
Asphyx said:
I could understand it if your living next to Bill Gates and wanted to steal banking info...
Click to expand...
Click to collapse
The real question here is... Would Bill Gates buy a Google Chromecast? :laugh:
frantisek.nesveda said:
Well, would you give me your WiFi password?
I can think of a few things you could do with access to someone's WiFi... Free internet, torrenting on someone else's responsibility, or just messing with someone.
The real question here is... Would Bill Gates buy a Google Chromecast? :laugh:
Click to expand...
Click to collapse
Sure! I could very easily give you my router password and you would still not be able to do anything you mentioned until you figured out a MAC address one of my networked devices actually uses.
And to my other point...Is Free Internet or messing with someone really worth the risk of going to a Federal Pen for hacking?
As for what Bill Gates has I wonder if he is even running Windows 8 cause I don't know anyone who has it that likes it! LOL
Asphyx said:
Sure! I could very easily give you my router password and you would still not be able to do anything you mentioned until you figured out a MAC address one of my networked devices actually uses.
Click to expand...
Click to collapse
Good point.
I guess that if we really wanted, we could play this cat and mouse game for quite some time, but the outcome would be that if you really care about security, you can make your network secure enough. But that would be just spamming the thread.
frantisek.nesveda said:
but the outcome would be that if you really care about security, you can make your network secure enough. But that would be just spamming the thread.
Click to expand...
Click to collapse
Actually I think what I was trying to say is that no matter how much you care and try to be secure...
If they want you they WILL get you and they don't need nor would they do it through your CCast when there are far better tried and true methods to attack a wireless router directly that doesn't require LUCK of a device not connecting or the timing of catching it while it is booting up in order to catch the weakness.
Any security hole that results from the CCast will likely never amount to anything more than the Prankish "Look what dirtyPorn I put on your screen"
If they want dirt they will go to the router which is always up and doesn't require some act of god or electronics to happen.
You secure your router the best you can and if that isn't enough then you need to keep your wireless off until you need it to be TRULY secure....
And even then there is nothing to stop them from tapping into the pole where your Internet connection comes in and getting you that way!
Security is nothing more than an illusion and a deterrent...Truth is your never secure no matter how much you worry which says to me...Worrying is pointless. Unless you have enemies that really want to get you...and if thats the case all the security in the world won't stop them!
Asphyx said:
Actually I think what I was trying to say is that no matter how much you care and try to be secure...
If they want you they WILL get you and they don't need nor would they do it through your CCast when there are far better tried and true methods to attack a wireless router directly that doesn't require LUCK of a device not connecting or the timing of catching it while it is booting up in order to catch the weakness.
Any security hole that results from the CCast will likely never amount to anything more than the Prankish "Look what dirtyPorn I put on your screen"
If they want dirt they will go to the router which is always up and doesn't require some act of god or electronics to happen.
You secure your router the best you can and if that isn't enough then you need to keep your wireless off until you need it to be TRULY secure....
And even then there is nothing to stop them from tapping into the pole where your Internet connection comes in and getting you that way!
Security is nothing more than an illusion and a deterrent...Truth is your never secure no matter how much you worry which says to me...Worrying is pointless. Unless you have enemies that really want to get you...and if thats the case all the security in the world won't stop them!
Click to expand...
Click to collapse
MAC access list = joke, blacklist is also a illusion changing MAC address(spoofing MAC) is extremely easy on any platform.
In case of whitelist Attacker will look into it just a bit for a longer, to know list of allowed devices.
At home you will have to whitelist every new device...
In corporate environment it will take you more time also WPA2-PSK is not suitable for serous corporate use.
About absolute security.
Security is relative term. Its just like healthy life style, it will not make you immune to diseases, it will make you generally healthier, less likely to get ill.
I just wanted to make a thread to see if anyone else was experiencing an annoyance I've been dealing with for the past few days. I don't know if it's due to a new firmware version on the Chromecast, or the recent update to the Play Music app, but casting music hasn't been such an intuitive experience for me recently. As a relevant note, both my Chromecasts are running the latest Eureka-ROM.
As long as I've had the Chromecast, casting music from Play Music has been fluent and the connection between the Chromecast and my HTC One was hard to break, even as I switched between apps and let my phone go to sleep. Recently, this hasn't been the case. If I am listening to an album on the Chromecast while tethered to my phone, I may pause it for a number of reasons and step away, then come back and expect to resume it. When I pause the song, then walk away, my phone will obviously go to sleep (since my screen timeout is 1 minute). As of the last few days, when I return to my phone after such a break, I look at my TV and find my Chromecast back at the homescreen. I then look at my phone and the Play Music app thinks it is still connected and the song is paused. When trying to press play a dialog pops up and says something along the lines of "The song cannot be played at this time." The only way to resume playback is to click "Disconnect" in the app, then reconnect and it goes back to normal once I restart the song.
So anyway, I suppose this may be a Eureka-ROM thing, but I don't see the reasoning behind that line of thinking. Has anyone else been experiencing this or any other change of behavior in Play Music?
Just to make sure, double-check your Keep Wi-Fi on during sleep setting.
bhiga said:
Just to make sure, double-check your Keep Wi-Fi on during sleep setting.
Click to expand...
Click to collapse
I could see that helping to keep control but if GPlay is working correctly he shouldn't have to be connected to the CCast with his device at all...
Does GPlay Music work differently than everything else does?
Asphyx said:
I could see that helping to keep control but if GPlay is working correctly he shouldn't have to be connected to the CCast with his device at all...
Does GPlay Music work differently than everything else does?
Click to expand...
Click to collapse
Many of the playlist-enabled apps have some level of "ping back" to manage the playlist functionality if it's not handled server-side.
bhiga said:
Many of the playlist-enabled apps have some level of "ping back" to manage the playlist functionality if it's not handled server-side.
Click to expand...
Click to collapse
Ahhh OK that does make some sense since no one seems able to do a proper playlist on the CCast that I have found...
Not the way it should work but I guess thats the workaround.
Google really should address this somehow...
Asphyx said:
Ahhh OK that does make some sense since no one seems able to do a proper playlist on the CCast that I have found...
Click to expand...
Click to collapse
The alternative would be to maintain a queue at the server's end, like how YouTube does TV Queue. Problem is, when interfacing with locally-hosted media it raises some privacy issues as the location leaves your network. It also would incur Internet traffic for those on limited/paid connections, albeit tiny, it'll still add up.
And of course not every app has a login/server attached to it. Perhaps something could be rigged with a cloud-hosted playlist file or something via Google Drive or another location that Chromecast can directly access.
bhiga said:
The alternative would be to maintain a queue at the server's end, like how YouTube does TV Queue. Problem is, when interfacing with locally-hosted media it raises some privacy issues as the location leaves your network. It also would incur Internet traffic for those on limited/paid connections, albeit tiny, it'll still add up.
And of course not every app has a login/server attached to it. Perhaps something could be rigged with a cloud-hosted playlist file or something via Google Drive or another location that Chromecast can directly access.
Click to expand...
Click to collapse
Or you could send the app a playlist of links to play one after the other...
Sort of the way the old ASF files used to work.
Asphyx said:
Or you could send the app a playlist of links to play one after the other...
Sort of the way the old ASF files used to work.
Click to expand...
Click to collapse
I think some of the apps have moved to that buffered playlist model, though it still requires some callback and housekeeping in case the controller changes the playlist, etc.
bhiga said:
I think some of the apps have moved to that buffered playlist model, though it still requires some callback and housekeeping in case the controller changes the playlist, etc.
Click to expand...
Click to collapse
I suppose...But they could allow changes via the control channel if they fleshed that channel out....
It definitely is one of the things Google has dropped the ball on in their design.
Thanks for the responses guys! Yeah, my Wi-Fi sleep policy is set to "Always", so that's not the issue. It's weird, my CCs have also not been showing up at all until a reboot sometimes. Something in the new GMusic or new CC firmware is not working as well as it used to.
For the sake of being thorough, give your router a reboot if you haven't already.
Also, do a ping test on your network to ensure it's not a faulty router/switch. I recently had to replace a switch (under lifetime warranty, luckily) because it had silently gone bad. It was still passing some traffic - enough for me not to notice immediately, but then my server lost its Gigabit connection (would only connect at 100 Mbps) and that got me investigating more.
bhiga said:
For the sake of being thorough, give your router a reboot if you haven't already.
Also, do a ping test on your network to ensure it's not a faulty router/switch. I recently had to replace a switch (under lifetime warranty, luckily) because it had silently gone bad. It was still passing some traffic - enough for me not to notice immediately, but then my server lost its Gigabit connection (would only connect at 100 Mbps) and that got me investigating more.
Click to expand...
Click to collapse
That probably has a lot to do with it, now that you mention it. My AP is a crappy Linksys and I experience random connection drops occasionally. I've been meaning to replace it with something better for a while. I just power cycled it and I am casting fine now. I also paused a song and gave it a few minutes without touching my phone and it resumed alright. Then ten seconds later the song started back from the beginning. Since this isn't a known problem it probably is dropped packets from my AP or something similar.
Synthic said:
That probably has a lot to do with it, now that you mention it. My AP is a crappy Linksys and I experience random connection drops occasionally. I've been meaning to replace it with something better for a while. I just power cycled it and I am casting fine now. I also paused a song and gave it a few minutes without touching my phone and it resumed alright. Then ten seconds later the song started back from the beginning. Since this isn't a known problem it probably is dropped packets from my AP or something similar.
Click to expand...
Click to collapse
If your AP is dropping out that can cause a number of problems. Is it one of the older WRT54G models? I used to run a bunch of those but there's a logging bug (even with logging turned off) that causes the router to go haywire. The third-party firmwares fixed it by flushing the logs via a cron job or firewall rule, I believe. I ended up with a pile of them after I moved to Pogoplugs for my VPN endpoints/servers.
bhiga said:
If your AP is dropping out that can cause a number of problems. Is it one of the older WRT54G models? I used to run a bunch of those but there's a logging bug (even with logging turned off) that causes the router to go haywire. The third-party firmwares fixed it by flushing the logs via a cron job or firewall rule, I believe. I ended up with a pile of them after I moved to Pogoplugs for my VPN endpoints/servers.
Click to expand...
Click to collapse
That's interesting, I never knew that. I did actually used to have a WRT54G, but have since upgraded to a EA2700. I was playing around with the settings and I switched it over to "bridge mode" which I think fixed the issue. I use a router provided by Comcast so the Linksys was supposed to be acting strictly as an AP but it wasn't. Any casting I've done since has been working well.
Hey,
So I am having serious wifi issues since I installed my Google Home. I use a chromecast too, but I think it's safe to say that it's the Home device that f-ed up wifi network.
I did read all the articles back i January/February that I was not alone with the issue, and as far as I understand - Google rolled out a fix about a month ago.
However, I am still having issues. My wifi drops for no reason (on all devices at the same time, phones included) for a few seconds and then comes back up. I've tried rebooting the router, and updating firmware on the router but no help. Today I pulled the plug to the Google Home until this has been fully resolved.
I love my Home and would like to have it connected. Did the correction that Google rolled out solve it for everyone else here or does anyone still have issues - or is it just me?
How can I see what firmware/software I am running on the Home? I have obviously tried to ask it, but it responds "this is not supported yet".
Any ideas?
Vol
I had the same problem on my main router, so I tried connecting it to my secondary router, and it worked, but since that one was supposed to be for the other part of the house, I got a cheapest used router I could (doesn't even support n standard) and created a separate network with different SSID, now I use it only to connect google home devices, chromecasts and other smart home wifi devices, and it works (it still uses my main router's DHCP server, and network, it is just AP with a different SSID), oh and I use channel 6 on that router btw.
Volatyle said:
Hey,
So I am having serious wifi issues since I installed my Google Home. I use a chromecast too, but I think it's safe to say that it's the Home device that f-ed up wifi network.
I did read all the articles back i January/February that I was not alone with the issue, and as far as I understand - Google rolled out a fix about a month ago.
However, I am still having issues. My wifi drops for no reason (on all devices at the same time, phones included) for a few seconds and then comes back up. I've tried rebooting the router, and updating firmware on the router but no help. Today I pulled the plug to the Google Home until this has been fully resolved.
I love my Home and would like to have it connected. Did the correction that Google rolled out solve it for everyone else here or does anyone still have issues - or is it just me?
How can I see what firmware/software I am running on the Home? I have obviously tried to ask it, but it responds "this is not supported yet".
Any ideas?
Vol
Click to expand...
Click to collapse
Ok, i feel my networking knowledge can come handy here! Lol. Home,three chromcasts, firetv, firestick x2; Nghthawk x8000->asusrtac68u->lan2wanWNR1000(for old 2nd gen sony bluray dlna and one roomstreaming)+wirelessLinksysEA6350->asusrtac88u. Yes, intriguing network! 6bdrm 3300sqft house. Biggest ever afforded! So, needless to say i pay TWC for 100Mbps, capping at 230mbps on the rtac68u ethernet bridge to wired desktop! All running my own modified compiled tomatousb. Linksysea6350 is ddwrt, kongbuild and a PIA so thats w/e stock kong wanted. Well safe to say ive been at making all this work!! What i need from you is topology and setup, running broadcoms or others? I find broadcom way easier to mess with. Second, you running custom or boxed units? And third is the google products subnetted (more of a b***h if you ask me!) And connected 2.4 or 5? N or AC? And how are you allocating resources? IE using QOS or similar? If you can't answer those im need (if unboxed and freed) "logcats", iptables, etc.. more than safe to say, the home not the culprit in sense to it "drowning" out the wifi band, but could for drown resources, IE low grade hardware, hardware beginning stages of failure and one extra workhorse did it, RAM, eMMC, getting the gist? Im gonna say w/slight certainty you might be rebooting not wifi actually cutting out. You also could if custom firmware corrupted something that the home doesnt like. But wont know w/out the numbers to look at. All i got from you is, either a LAN2LAN or bridge as i read your main hib is the DHCP, and is the SSID you "created" a subnet? And your "30" dollar router also could not be up to task.
And sorry if the reply is anything not right, first post ever here! Years of only reading lol. And something wrong with my cheap phone cracked screen phone replacement everytime keyboard is opened! Doubt its this website. my pixel xl tried to drive on the interstate outside of my car...so sad.. just know im gonna punch this phone or throw from the anger ive gained trying to type and the sign-in to post.. thank you.
Similar solution worked for me
I use a dedicated connection for all things GH related. This stopped the wifi dropout.