Related
Would like to edit my DNS settings on this. Is it possible? After hearing what sounds like a DNS poisoning, would like to swap out TMOs DNS for another provider.
Grab anycut off the marketplace.
Long tap on the desktop -> shortcut -> activity -> ip settings.
I've been using openDNS from the moment I got the phone. Works like a charm.
edit - shouldn't have replied that quickly... this only works for WiFi as far as I know... but I haven't tested that. Will do so now.
edit 2 - well... scratch all that. I just tested opendns on both wifi at my home and using edge and both did not work. I guess ip settings doesn't work?
That is a nice find for when you are on wifi. It doesn't change your DNS when you are on the network. I have also wanted to change my DNS to Opendns but have not found a way to change dns on data connection. Any help would be appreciated.
angel-78 said:
That is a nice find for when you are on wifi. It doesn't change your DNS when you are on the network. I have also wanted to change my DNS to Opendns but have not found a way to change dns on data connection. Any help would be appreciated.
Click to expand...
Click to collapse
Can you confirm that is works for wifi? Opendns.com/org isn't showing that it's working for me.
Ummm opendns.com/org doesn't work for me and I am on opendns
Stupid question: why are you worried about DNS poisoning? I'm aware of what it is, but I'm not aware of how someone would exploit it.
They'd have to find an exploit on T-Mobiles DNS servers (or the higher servers that they receive the information from), that would either: a) use a "fake" higher DNS server to get info from, one that would provide spoofed entries, or b) insert fake entries into the cache. Correct?
Curious as to why you'd be paranoid about this tbh. Even with OpenDNS, if there's an exploits on T-Mobiles servers, wouldn't they be able to exploit it on the edge/3g servers? And if OpenDNS were ever compromised, it would leave hundreds of thousands of users more vulnerable, vs the (very) few people who use their cell phone for web banking.
neoobs said:
Ummm opendns.com/org doesn't work for me and I am on opendns
Click to expand...
Click to collapse
Confusing syntax on my part. I meant .com or .org.
Gary13579 said:
Stupid question: why are you worried about DNS poisoning? I'm aware of what it is, but I'm not aware of how someone would exploit it.
They'd have to find an exploit on T-Mobiles DNS servers (or the higher servers that they receive the information from), that would either: a) use a "fake" higher DNS server to get info from, one that would provide spoofed entries, or b) insert fake entries into the cache. Correct?
Curious as to why you'd be paranoid about this tbh. Even with OpenDNS, if there's an exploits on T-Mobiles servers, wouldn't they be able to exploit it on the edge/3g servers? And if OpenDNS were ever compromised, it would leave hundreds of thousands of users more vulnerable, vs the (very) few people who use their cell phone for web banking.
Click to expand...
Click to collapse
Guess you don't frequent boards as much as myself. It has already happened twice now. Just search for browser hijacked...
Being it has only been on Edge/3G, it must be their DNS. WIFI has never been affected.
Open an adb shell or Terminal Emulator and type
Code:
setprop ro.kernel.android.ndns 2
setprop net.eth0.dns1 208.67.222.222
setprop net.eth0.dns2 208.67.220.220
Those are ip addresses for OpenDNS, so use your own if you want something else. It might not be persistent through reboots though. If it isn't, append it to init.rc. I can't test this on actual hardware right now but on the emulator it does pass OpenDNS's test (in the upper right corner). Make sure you set the properties before opening the browser.
jashsu said:
Open an adb shell or Terminal Emulator and type
Code:
setprop ro.kernel.android.ndns 2
setprop net.eth0.dns1 208.67.222.222
setprop net.eth0.dns2 208.67.220.220
Those are ip addresses for OpenDNS, so use your own if you want something else. It might not be persistent through reboots though. If it isn't, append it to init.rc. I can't test this on actual hardware right now but on the emulator it does pass OpenDNS's test (in the upper right corner). Make sure you set the properties before opening the browser.
Click to expand...
Click to collapse
thanks trying this now and it seems to work well
Not only will it not persist on reboot, it will not persist over DHCP, so every time it reconnects to the network, this will have to be redone.
well, dunnow if you'v seen this
Mobile or other devices :
DNS servers are typically specified under advanced wi-fi settings. However, as every mobile device uses a different user interface for configuring DNS server settings, we provide only a generic procedure below. For more information, please consult your mobile provider's documentation.
To change your settings on a mobile device:
1. Go to the screen in which wi-fi settings are specified.
2. Find the screen in which DNS server settings are specified.
3. If there are IP addresses specified in the fields for the primary and seconday DNS servers, write them down for future reference.
4. Replace those addresses with Google IP addresses: 8.8.8.8 and 8.8.4.4.
5. Save and exit.
6. Test that your setup is working correctly; see Testing your new settings below.
Click to expand...
Click to collapse
Ather said:
well, dunnow if you'v seen this
Click to expand...
Click to collapse
Nice try
But that will only affect WiFi.
Ather said:
well, dunnow if you'v seen this
Click to expand...
Click to collapse
that only works for wifi or 3g connection as well?
I think the only way you can use T-Mobiles network is through there DNS. I think they have it locked to that. I remember when I used to tether if you right clicked a picture (that is on the internet obviously not on your hard drive) and went to properties it was never listed just the url that it was supposed to be it also had an ip before that url. That ip was always the same no matter what site. I think there is a proxy running on one end or the other.
aad4321 said:
google dns is the fastest and best...
8.8.8.8
8.8.4.4
Click to expand...
Click to collapse
Prove that google dns is faster than opendns, it hasn't even been out for a week yet while opendns is very mature.
This benchmark would have to disagree with you.
http://gizmodo.com/5420931/namebench-helps-you-find-the-fastest-dns-server-for-your-computer
It is highly dependent on your location. Google DNS might be faster than OpenDNS for some, while UltraDNS might be faster than Google DNS for others.
Try out the benchmarks yourself to see which one is the fastest for you. I use OpenDNS myself.
google dns is not at the moment everywhere the fastest but dont worry it will be. suggest you dont use this for t-mobile nl tv coz this wont count for your download limit and wont add to your download fair-use-time other dns probably will
tried nice worked on x10
I'm using my transformer at school and the school is providing wifi to its students. But there are apparently some odd restrictions associated with it. No app of mine is allowed to access the internet with the exception of browsers and also I'm not allowed to download anything (it just says "download unsuccesful" no matter what I download or from where). I've tried to look for a reson for this and I found out that it might be some firewall settings on the computer that is hosting the wifi, I also asked the school's IT guy and he said that it's likely to be the reason. But the thing is that all the people with computers and iPhones can use applications that use the internet with no problems at all. This makes me think that the wifi host regards me as dangerous or suspicious for some reason, and because it does allow computers and iPhones to use apps that access the internet and are allowed to download files, I think that it might be fixable. Perhaps there are some particular settings that make the wifi host's security to regard me as dangerous and doesn't allow my apps to go to the internet. So what do I have to do for my apps to be able to access the internet and to be able to download files? I really want to know this, because many of the useful apps require internet and by not using them I'm not taking the full advantage of the device. I should also mention that my tablet is running 3.2.1.
But have you tried asking them about letting you use your "netbook" on their netbook. What's the worst they can do? say NO TABLETS ALLOWED? Because unless they know your exact MAC address, they probably won't be able to do anything about it. In my old school, I brought up that I would like to connect my windows mobile device to their network (when I was using it as an mp3 player) and they said sure (they had terrible firewalls which blocked most every site that was fun). Sometimes, the best kind of hackery is the social kind.
Dyskmaster said:
But have you tried asking them about letting you use your "netbook" on their netbook.
Click to expand...
Click to collapse
What do you mean by that?
norsul said:
What do you mean by that?
Click to expand...
Click to collapse
I guess his telling you to ask for permission to use your netbook on their network.
Well first of all I'm using a tablet running android 3.2.1. And I'm kind of confused by your use of the word network, because I said that I can use the school's wifi network for students, but only to some extent, meaning that none of my apps with the exception of the browser are not allowed to access the internet e. g. android market, google translate don't work, they just say that they are unable to connect to the network or something similar. Also downloading any file from anywhere is not allowed, it says download unsuccessful. But iPhone user's apps work perfectly fine. From this I concluded that there must be something about my tablet that makes their security think my apps are dangerous and therefore blocks them, and that because there is no such problem on iOS, I thought that the might be something wrong with my end, and that it it fixable. And my question was what do I need to do to fiz this? I hope that clarifies my point.
statsminister said:
I guess his telling you to ask for permission to use your netbook on their network.
Click to expand...
Click to collapse
yes, thanks, I was kinda in a hurry when I typed that
Ask your school's IT department. Network configurations can be quite complex, and without knowledge of how or what they're blocking- it's hard for us to help. IT would know the issue better, or at least give the explanation as to why it isn't working. For instance, last year at my college nothing but computers were allowed to connect to the wifi. Such control can be done on the network side, and it may not be your tablet's fault.
Have you any friends with an Android device, or better yet android tablet?
I did ask the IT guy and he said that he has no control over the security settings, because it's a network across all of the schools in the city, not just the school in which I am.
Hey, I've tried using dropbox at school and then it says "cache access denied", maybe that can somehow clarify my problem.
settings
Have you set your settings/applications to allow unknown sources (ie is it ticked).
Colin
colint3 said:
Have you set your settings/applications to allow unknown sources (ie is it ticked).
Colin
Click to expand...
Click to collapse
That's only to allow installing apps not from the Market (sideloading). It has nothing to do with an app working or not.
Haven't you ever heard of proxy and content filtering?
Schools often set up proxies to restrict certain sites and content from working on their networks. They do it for a variety of reason, including bandwidth conservation, content filtering, network security, etc.
More than likely, they have blocked anything that they deem unnecessary. That means that probably only port 80 is allowed (the http port), possibly a few others for https, pop3 and imap for email, etc.
However, if you're a more advanced user, you can probably bypass right past all of this stuff by setting up your own proxy, or using encapsulation (like nstx or icmptx) to bypass their proxy by encapsulating other services inside DNS or ICMP traffic which are usually allowed to bypass the proxy at school. Like I said though, these are advanced techniques and require you to research and set it up yourself.
a.mcdear said:
Haven't you ever heard of proxy and content filtering?
Schools often set up proxies to restrict certain sites and content from working on their networks. They do it for a variety of reason, including bandwidth conservation, content filtering, network security, etc.
More than likely, they have blocked anything that they deem unnecessary. That means that probably only port 80 is allowed (the http port), possibly a few others for https, pop3 and imap for email, etc.
However, if you're a more advanced user, you can probably bypass right past all of this stuff by setting up your own proxy, or using encapsulation (like nstx or icmptx) to bypass their proxy by encapsulating other services inside DNS or ICMP traffic which are usually allowed to bypass the proxy at school. Like I said though, these are advanced techniques and require you to research and set it up yourself.
Click to expand...
Click to collapse
No, I do not no anything about proxy or content filtering, but I remember when I was connecting to the wifi network of the school I was asked to configure the proxy settings by putting some ip address ( I presume that it is an ip adress because it looked like one) and writing 8080 in the port field. If I didn't configure it like that, the internet would simply not work. Could you please tell me where I could educate myself about bypassing proxies or is i a matter that would require a very long time to learn and a lot of prerequisite knowledge?
And by the way, are you sure that this could be done on a tablet? All of that fiddling around seems to require a considerable degree of control which android may lack, or would rooting give me that control?
norsul said:
No, I do not no anything about proxy or content filtering, but I remember when I was connecting to the wifi network of the school I was asked to configure the proxy settings by putting some ip address ( I presume that it is an ip adress because it looked like one) and writing 8080 in the port field. If I didn't configure it like that, the internet would simply not work. Could you please tell me where I could educate myself about bypassing proxies or is i a matter that would require a very long time to learn and a lot of prerequisite knowledge?
And by the way, are you sure that this could be done on a tablet? All of that fiddling around seems to require a considerable degree of control which android may lack, or would rooting give me that control?
Click to expand...
Click to collapse
OK yeah you are going through a proxy then. The good news is, that because you have to configure it manually, they probably aren't using transparent proxy which can make it easier to bypass.
Getting nstx or icmptx working natively on Android should be possible in theory as both are lightweight and designed to work in Linux... perhaps it can be made into a module that can be activated/deactivated with a shell script, or added to a custom kernel.. obviously this would require a rooted tablet to accomplish.
The other required part of the equation is a computer accessible from the internet, which you can set up install a DNS server and nstx on.
If you manage to get it all working correctly, set your home IP address as your proxy instead of your schools proxy, and you should be able to get through. It should also work to let you access the web for free at places like Starbucks or at hotels where the web is normally routed to a site where you have to pay for web access.
Good luck!
a.mcdear said:
OK yeah you are going through a proxy then. The good news is, that because you have to configure it manually, they probably aren't using transparent proxy which can make it easier to bypass.
Getting nstx or icmptx working natively on Android should be possible in theory as both are lightweight and designed to work in Linux... perhaps it can be made into a module that can be activated/deactivated with a shell script, or added to a custom kernel.. obviously this would require a rooted tablet to accomplish.
The other required part of the equation is a computer accessible from the internet, which you can set up install a DNS server and nstx on.
If you manage to get it all working correctly, set your home IP address as your proxy instead of your schools proxy, and you should be able to get through. It should also work to let you access the web for free at places like Starbucks or at hotels where the web is normally routed to a site where you have to pay for web access.
Good luck!
Click to expand...
Click to collapse
That sounds awesome maybe you could make the app id buy it
I found two apps on the android market : proxydroid and ssh tunnel, do you think they would help me to bypass the school's proxy?
And by the way, how legal is this business? I mean I doubt that the school would send be to jail for using google translate but I'm still curious.
Legal issues are a potential problem, but its doubtful it would ever be a problem at school. Setting this up on your tablet certainly isn't illegal in itself, but if you're stealing wifi that you would otherwise have to pay for, you CAN get yourself in quite a bit of trouble if you get caught.
a.mcdear said:
Legal issues are a potential problem, but its doubtful it would ever be a problem at school. Setting this up on your tablet certainly isn't illegal in itself, but if you're stealing wifi that you would otherwise have to pay for, you CAN get yourself in quite a bit of trouble if you get caught.
Click to expand...
Click to collapse
Ok thanks, wifi network in the school is free for all students so I should be ok. But what about those apps I mentioned before?
And how would I protect myself from geting caught and what is the likelyhood of me getting caught? Can they immediately notice it if someone's trying to bypass their firewall or not? I should point out that the it manager in our school knows quite little about the sexurity system or ao he told me when I asked him whether my problem is somehow connected to their security settings, but the network is not pwned by the school, it's owned by the city and it is present in many schools beside mine, so I think that they might take their security seriously. So basically what I am trying to say is that if I investigate this matter, come there and bypass the proxy so that the youtube app works, is it likely that I am going to get caught, and if yes then what are the ways of minimising the risk (please bear in mind that I have not experience in this)? I'm asking this because I think it's not a very good idea to just walk in and hack the network without any experience and expect that there is no possibility of getting caught.
No neither of those apps are really the solution to your problem. There isn't currently an app for Android that will set up encapsulation like I'm talking about.
And yes, your IT manager at school "might" be able to catch you, but only if he's specifically looking for it. What this basically does is encapsulate your regular IP traffic inside DNS packets (or pings for the icmptx method), which are generally allowed to pass through firewalls and content filters. Basically, it is detectable if your network administrator is looking in the right place and knows his stuff. There would either look like a constant stream of DNS requests from a particular IP on the school network, or a constrant stream of ICMP traffic (pings) being sent out. However both ICMP and DNS are normal for any network, so its also equally possible that the administrator never notices that anything is wrong at all...
Some more sophisticated networks may employ transparent DNS or transparent proxy, which would make these efforts much harder. Transparent proxy is able to intercept any traffic and force it through the proxy at school, while transparent DNS is able to intercept DNS traffic and force it to use a specific DNS server regardless of settings on your tablet.
Like I said in the beginning though, these are really advanced networking tricks that certainly aren't easy to set up, even when all the components are readily available.. its possible they haven't even been attempted yet on an Android device. That said, it shouldn't be difficult to port either icmptx or nstx over to Android for somebody with the requisite programming skills.
Hey up,
I have a QNAP-TS410 NAS at home on its own domain, via DynDNS
and (for the most part) I've got my head around SSH Tunnels and realised just how good they are.
Having the SSH tunnel up allows me to route all port traffic through SSH, including AFP, SMB, HTTP, HTTPS etc and close those equivalent ports on my router.
For example, I noticed when I opened an SMB port on my router my NAS would get spammed by break and entry bots. So for me SSH Tunnels are the only way to go now.
Additionally, being able to open an obscure port number for SSH on my router instead of the default 22, makes it very secure and additionally reduces the overheads on the NAS itself.
From my laptop I can establish an SSH Tunnel and mount NAS shares when Im away from home, either via local WiFi or a WiFi tether + 3g connection provided by my HTC Desire HD (rooted, ARHD) I accomplish this via a Mac OS X app called 'SSH Tunnel Manager' or via 'Terminal' with a few command line and simply use the link as a pipe. Great!
I also downloaded an app from Android Market called 'SSHTunnel' for my Desire HD (not sure if anyone is aware of it or not) it seems very feature rich.
I can use it to tunnel any/all web traffic from any app on my phone through the tunnel and out from my NAS at home. Ive had to tweak the SSHD config file on the NAS to allow TCPforwarding etc..
Testing on whatismyip.com, the default browser on my phone correctly reports my home WAN IP. Effectively a SOCKS proxy. Resulting in SUPER SECURE browsing anywhere in the world.
I found out though, there is no built in support on the iPad for a SOCKS proxy, you can only do HTTP Proxies, requiring something like Squid being setup, which would serve the actual web pages itself. I don't need or want this functionality, I simply want to route any/all traffic from the iPad through the tunnel and then out from my home WAN. So I needed a workaround of sorts.
Then it got me thinking...
Can I WiFi tether my iPad to my Phone whilst a SSH Tunnel is active via 'SSHTunnel' app?
If possible, *and I'm right in thinking* this should then create a global SOCKS proxy to allow all iOS apps to communicate through the tunnel?
However, I'm not entirely sure of the actual addresses I would be configuring in each app.
Anybody had experience of this?
I know this is quite old but if you're still looking for one you can get Web Tunnel. It's much better than other tunneling tools.
https://play.google.com/store/apps/details?id=com.in.webtunnel
Hey guys! So I've been desperately trying to connect to tor IRC servers through Orbot and has been failing quite a lot for now. Throughout all of my research, I was able to slowly build up a conclusion on my problem and it seems linked to the iptables... Here's all that happened (in short, of course ) :
I rooted my phone to make any IRC client work thanks to Orbot's transproxy setting.
I added my client to the list of the transproxy, but it didn't work; I tried three different clients: AndChat, AndroIRC and YAAIC, I always got the unresolved Host error.
Thinking it might be a problem with tor, I set up firefox to use the orbot proxy: it worked, which means orbot works perfectly.
I tried connecting to clearnet irc servers with orbot turned on and it worked, so the clients aren't the problem themselves.
At that point, it seems like the irc clients don't connect to the orbot DNS.
I removed AndroIRC from the transproxy list and used the in-app SOCKS proxy settings to try and connect to orbot (similar to firefox, except with the port 9050 and not 8118), but it didn't work. I tried it again with AndroIRC in the transproxy list and it didn't work.
Around that time, I found this thread; since it seemed close to my problem, I decided to give it a try.
I realized in the midst of the action that the folder /data/data/org.torproject.android/app_bin/ did not contain a iptables file. I still followed the tutorial to the end, therefore creating an iptables file.
And so, here I am, and it still doesn't work. I'm using an Xperia U with Android 4.0, Orbot 14.1.4-noPIE(Tor 0.2.5.10-openssl1.0.1i-nonPIE-polipofix) and I can't connect to tor with IRC. Does anyone have an idea of what's even happening here and/or how this could be solved?
Since no one answered, I'll bump hoping someone has a solution...
Basically there's two things I'm trying to accomplish. The first thing is to be able to SAFELY access my pc when I'm not at home. The second is to be able to log onto my local network from the outside world and make it look as if the traffic originates from there.
At home on my local wifi I often access my PC using Remote Desktop. I'd like to safely be able to do the same thing from a phone or external PC. I'm under the impression that the best way to do this was with a VPN but the precise what and how eludes me. My best current guess is to setup a VPN Server on my wifi router but does that mean any generic VPN software I install on my phone can get through? I'm really just guessing but possibly this will accomplish both things I'm trying to do.
Additionally I could also setup a VPN Client on the wifi router which would provide VPN protection to any device logged onto my lan without having to install anything on every tablet in my household.
Added to this is that I've used Kaspersky antivirus for over 20 years on my pc's and VPN just became free with the package so I've used the 3 licenses I get on my PC and my and my wife's phones. Hopefully I can use my Kaspersky VPN to access the DDNS that I got free from ASUS to complete the circle.
It should be clear from this discussion that I'm grasping at straws, I've googled a bunch of confusing and potentially conflicting information along with everybody and his brother that wants to sell something VPN related.
I'm also posting this on the Windows 10 Help forum as here and there is where I get most of my technical advice.
Look inside here:
How to Build Your Own VPN (and Why You Might Want to)
Ever thought of creating a VPN from scratch but didn't know where to start? Get answers to all your questions in this comprehensive guide.
vpnoverview.com
As far as I know, there are many models of home router with built-in VPN server capabilities. Check your router's manual at first.
James_Watson said:
As far as I know, there are many models of home router with built-in VPN server capabilities. Check your router's manual at first.
Click to expand...
Click to collapse
I'm goimg forward on the basis that all I need to do what I want is the Router's built-in server, along with an Asus provided DDNS, to allow VPN connection from my outside devices and the Router's built-in VPN Client to give VPN protection to all devices within my local wifi. I bought the router with this capability in mind as well as speed improvements over my old router. It's the Asus RT-AC86U router and it "should" do the above as well as allow externally connected devices to act as if originating from my home system.
It may take me a bit to do this but I'll report back once I have an answer.
jwoegerbauer said:
Look inside here:
How to Build Your Own VPN (and Why You Might Want to)
Ever thought of creating a VPN from scratch but didn't know where to start? Get answers to all your questions in this comprehensive guide.
vpnoverview.com
Click to expand...
Click to collapse
Thanks for the response. I looked at a number of how to guides, the one I'm going forward with is how-to-easily-access-your-home-network-from-anywhere.
I have an issue with setting up the VPN Server Client on my router (Asus RT-AC86U) that I have a service call in with Asus for, so the VPN Client side is on hold for a bit.
I was able to successfully configure the VPN Server (at least the OpenVPN protocol section) and setup a DDNS. From what I read this should be sufficient to allow an external device to login to my home system but I've seen no guide that describes this final step.
Do I simply use Remote Desktop on the external device to logon to my PC through the DDNS while the VPN (in OpenVPN protocol in this case) is enabled?
That would mostly work but what I really would like would be for the external device appear to be on my local wifi and not on the local PC itself. How do I do that?
Can anyone point me in the correct direction?
I did just find another piece of information the may apply here. In one of the guides I read the following:
"save the OpenVPN configuration file which will be used by the remote device to access your router."
There was a client.ovpn file generated during the router's VPN Server setup. The above sentance implies that I need to somehow get the VPN software on the external device to use this file and then I'll be able to logon to my home system. Can anyone shed more light on this?
*** Update ***
I was able to setup the OpenVPN Server on my ASUS RT-AC86U router and it does allow me to safely access my home LAN from anywhere. I can login to my home router's user interface and use Remote Desktop to login to my PC. Also since the VPN changes my IP address to that of my home system everything works as it would if I was actually there.
The one thing I haven't been able to do is access my pc's shared drive.
Anyone have any clue how to fix that?
Finally I also tried to setup the VPN Client on the router to access the VPN Server. ASUS said you should be able to do that but it results in an IP conflict that their tech support hasn't yet solved.
The benefit of using the router's VPN client is that any device on my local wifi is automatically protected by a VPN without installing anything on the device. The point is somewhat moot since all each device needs is a free app and the config file created by the VPN Server.
I did look at setting up a VPN Server on my Win 10 PC, but it looked like too much work and too much chance of messing something up, to attempt.