What would it take to get this done? Could IP tables be set up so that the built in settings or one of the apps would work? I think a lot of people would love to have this capability, including me.
You could check out Proxoid. http://code.google.com/p/proxoid/wiki/installationPhone
I've never used it. It is supposed to let you use your phone for wirer proxy connections.
strongergravity said:
You could check out Proxoid. http://code.google.com/p/proxoid/wiki/installationPhone
I've never used it. It is supposed to let you use your phone for wirer proxy connections.
Click to expand...
Click to collapse
Thanks, but what I'm looking for is a way to use the tablet's browser over wifi through a proxy server. There are lots of apps and even browsers that claim to provide the capability, but our tablets seem to be missing the prerequisite IP tables. My employer's intranet is isolated from the internet with a firewall, and the only way through it is by way of a proxy server.
the UrukDroid mod does support iptables. so the apps like transproxy should work.
if you care to be the guinea pig ...
http://forum.xda-developers.com/showpost.php?p=10239762&postcount=2
jones23 said:
the UrukDroid mod does support iptables. so the apps like transproxy should work.
if you care to be the guinea pig ...
http://forum.xda-developers.com/showpost.php?p=10239762&postcount=2
Click to expand...
Click to collapse
Thanks. I'll have to read up on that a bit. Not sure how much trouble it would be. I'm hoping for a relatively easy solution.
well the mod developers want to include proxy settings in the next releases. guess that is the simplest solution we might get.
i don't expect to get a working proxy solution in the original software anytime soon.
the only hope would be a honeycomb release which is highly unlikely, as android 2.3 doesn't have native proxy support.
Could it be as simple as this?
http://www.mydigitallife.info/2010/...n-rooted-android-motorola-droid-or-milestone/
Hi mates..
Can anyone please tell how t configure Hotspot Shield? My problem is that Market is blocked in my country and the only way to access it is by changing my IP..
I tried adding VPN in the settings/wireless and networks menu but it doesn't work..
I also tried VPN Connections 0.99 app but it FCs when I try to connect..
I think it requires a custom kernel but I hope somone knows how to use it in stock ROM/kernel..
Any help is highly appreciated..
Thanks..
Sent from my 7" slab with a tab
No one?
Sent from my 7" slab with a tab
use ssh tunneling!
matius44 said:
..Market is blocked in my country and the only way to access it is by changing my IP..
Click to expand...
Click to collapse
Hi pal,
Sorry but I know nothing about Hotspot Shield neither would I trust anyone to secure my data on my behalf when I can do it myself, especially if american!
Maybe this could help you, not only Androidwise: you could use it for all your web activities (BTW what's your country?)
You can use "SSH Tunnel Beta" from the market.
As you cannot access it I am posting the apk.
Or you could search SSHTunnel(BETA) v1.6.0beta.apk on google and you might find it.
Works like a charm, I use it to encrypt and to change my IP, whatismyip.org correctly reports the IP of the ssh server.
You need an ssh server to act as a proxy obviously.
(alternative is an proxy but firemole is not available on android)
All you need is a linux box in a datacenter.
Provider gives you root and password that you should change to something super secure, adduser name, disable root logins (/etc/ssh/sshd_config) and a few more things to be secure or if you like to risk.. just use the provided rootassword on your ssh tunnel app
I hire from www.leaseweb.com which is in NL or DE, you can get a VPS linux from many providers and they cost under 10 euro / month or get superb dedicated servers like I do if you have a use for them . Bandwidth is great but depends from the network in you country and also on the backbones used but you hardly care about this others are www.lowendbox.com and www.vps4you.it that offer 30 day trial
Hope this helps and doesn't just confuse you... But if you live in a country where things are banned I guess this would upgrade your web freedom
Now lets get back to work
G
PS you could also use it on your wireless router (get a www.dd-wrt.com / opnwrt / pfsense capable router) and you're done house/firm-wide
Thanks alot for the info mate
I'll see what I can do and report back..
Really appreciate your help
PS. btw am from Sudan..
Really not sure if I am posting this in the right place, so apologies if that's not the case.
I like dropbox's Camera Upload feature, but quite often I find that it will saturate my internet connection and everything else on my network struggles. Especially if it is uploading video recordings off my phone.
Is there a way to place a speed limit to the data upload rate? Kind of like a bandwidth limiter for Android?
mversion said:
Really not sure if I am posting this in the right place, so apologies if that's not the case.
I like dropbox's Camera Upload feature, but quite often I find that it will saturate my internet connection and everything else on my network struggles. Especially if it is uploading video recordings off my phone.
Is there a way to place a speed limit to the data upload rate? Kind of like a bandwidth limiter for Android?
Click to expand...
Click to collapse
Many Android kernels got support for traffic shaping, so you can use the "tc" shell command to implement what you need. Maybe there's some rooted app able to manage this for you, since it's quite a tricky task.
But this is not such a good idea. Instead you should implement the traffic shaping in your WiFi/Internet router. If it doesn't support it native, I suggest you try some other software for it, e.g. OpenWrt, DD-WRT or Tomato.
kuisma said:
Many Android kernels got support for traffic shaping, so you can use the "tc" shell command to implement what you need. Maybe there's some rooted app able to manage this for you, since it's quite a tricky task.
But this is not such a good idea. Instead you should implement the traffic shaping in your WiFi router. If it doesn't support it native, I suggest you try some other software for it, e.g. OpenWrt, DD-WRT or Tomato.
Click to expand...
Click to collapse
Thanks.
I have Tomato installed on an Asus RT-N66U router, but the bandwidth limiting options only work for LAN connections and not WLAN it seems.
A rooted app that puts a limit on a per app basis would be something I'd be happy to pay for.
mversion said:
Thanks.
I have Tomato installed on an Asus RT-N66U router, but the bandwidth limiting options only work for LAN connections and not WLAN it seems.
A rooted app that puts a limit on a per app basis would be something I'd be happy to pay for.
Click to expand...
Click to collapse
Hard to believe it's not working for WLAN connections, and even if so, you can apply the rules on the outbound Internet connection scheduling on source addresses. I.e. you can chose to implement the restrictions on either the receive- or transmit site. Do some more reading on QoS and I'm quite sure you'll manage to implement it as you need. But it IS tricky, even with the Tomato GUI, and would be as tricky as well using a rooted Android app.
And since I know it's not a such a good idea to implement traffic shaping in the Android itself, I'm not going to write this app.
Hey, I'm looking over internet for this exact thing, problem is my Galaxy Tab is hugging my internet, I need to limit it to say, 100kb/s up and down. My router is A-Link WNAP 3G router.
It would be even better to limit all WLAN traffic to 100kB/s because my computer is hooked with an ethernet cable :victory:
Can someone help me ?
kuisma said:
Hard to believe it's not working for WLAN connections, and even if so, you can apply the rules on the outbound Internet connection scheduling on source addresses. I.e. you can chose to implement the restrictions on either the receive- or transmit site. Do some more reading on QoS and I'm quite sure you'll manage to implement it as you need. But it IS tricky, even with the Tomato GUI, and would be as tricky as well using a rooted Android app.
And since I know it's not a such a good idea to implement traffic shaping in the Android itself, I'm not going to write this app.
Click to expand...
Click to collapse
You are very wrong that it isn't a good idea to implement traffic shaping. All new cloud applications have Camera upload feature which clogs the upload of the whole network and then you cannot even surf with your computer while photos are uploaded (not to say videos).
Traffic shaper would solve this things for sure! I would even pay for that app on appstore.
I used bandwidth ruler from the play store to limit upload speed in my galaxy SIII and it works like a charm. but that requires root to work ,
here is the link :
mversion said:
Really not sure if I am posting this in the right place, so apologies if that's not the case.
I like dropbox's Camera Upload feature, but quite often I find that it will saturate my internet connection and everything else on my network struggles. Especially if it is uploading video recordings off my phone.
Is there a way to place a speed limit to the data upload rate? Kind of like a bandwidth limiter for Android?
Click to expand...
Click to collapse
Dear Friend,
did you get what you was looking for?
because i am looking for an App which can control all or Each/ individual app to upload the files. likewise
google+ Google photos, Google hangout, Etc. which i hate the most to upload my photos . for them i have rooted my note4 and install AVAST Anti-Virus + Firewall to prevent the app to access the net .
Because i know what app we allow to access the internet they take away our personal information along with videos and photos which we don't know because our smartphones are 24/7 connected with DSL hight speed internet.
These type of Apps are fully controlled by the remote server to takeaway our data with minimum speed like 10KB to 30KB per mint.
I have already block the apps to access in the internet, but some reason i have to disable firewall, then most of the apps try to get updates, i need an app which can control /allow the app to upload in Bites not in KB or MB.
if you have something like that please advise
awaiting your reply
Thanks
Ismail
Xposed app firewall.
This app is an firewall for the installed apps. Only apps with permission "android.permission.INTERNET" are
shown. IPv4 and IPv6 are supported together with TCP and UDP. You could configure outgoing and incomming
connections independent from each other.
The rules could be applied for each network: W-Lan, local network, mobile, roaming, unknown.
Logging is configurable for incomming/outgoing and allowed/denied connections.
Colors:
Blue: Template is used.
Yellow: Custom settings.
Green: The app is trusted.
Red: The app is blocked.
Features:
No iptables required, the kernel doesn't need to support it.
The firewall is active when Android starts, no startup data leak.
The rules are always active, no re-apply on connection change is needed.
Limitiation:
Host names in the log file are PTR entries.
Works only for Android (Java), not the native (Linux) part
Donation:
No self-promotion in the app.
You could trust or block an app (Menu/ActionBar)
You could use a template for not configured apps
Additional (experimental) networks: Bluetooth, WiMAX, Ethernet
Tasker support, per App
You support this app and further development!
Permissions:
ACCESS_SUPERUSER: apply iptables rules
This app does not connect itself to any websites or hosts!
Important:
This app needs the Xposed Framework. The framework requires root access for installation. Don't forget to enable the module in Xposed. You can grab it here: Xposed Installer
Website: http://tinyurl.com/l5bpv23
Play Store: http://tinyurl.com/ome2pvc
Xposed Repository: http://tinyurl.com/ksc6plz
Changelog: http://tinyurl.com/n8gsqja
Why this app? No firewall for Xposed exists yet
Translation:
You could find here a interface to translate the english strings: http://tinyurl.com/okycacj
A free account of www.oneskyapp.com is required to edit. Additional, please attach your email address or send it via PM
Insane.. I was looking for something like this about 12 hours ago.. its almost like you read my mind and made it just for me!.
I like your style. Nice and simple and keeping it in line with your others.
Sent from my GT-I9300 using Tapatalk
Downloading now.
Sent from my SCH-I535 using XDA Premium 4 mobile app
shivadow said:
Insane.. I was looking for something like this about 12 hours ago.. its almost like you read my mind and made it just for me!.
I like your style. Nice and simple and keeping it in line with your others.
Sent from my GT-I9300 using Tapatalk
Click to expand...
Click to collapse
Maybe you head me thinking loud 6 weeks after starting this app: "i will release today, if there are still error, i'll fix them later"
Am I correct in assuming this is not open source?
I got a question about incoming/outgoing connections, maybe somone else want to know:
Incoming connections are used by less than 1% of all apps. This is used if the app is a "server", like BubbleUPnP. So most time incoming conections could be blocked, i think for mobile network 100%.
An outgoing connection is like a phone call: You call someone (outgoing connection), and can talk (send "data") and hear (receive "data")
Wifi Internet and Network:
If you want to control eg your local tv-receiver, xbmc device or avm router (with FreetzMobil), only connections to the local network are required. This prevents app to send data to the internet.
The "local network" are all "private" IPv4 and IPv6, they will not be forwarded by internet routers. Additionally, if you use "public" IPs they are local if it is in the same subnet as a ip of your device. Uncommon for IPv4 usage, but public IPv6 are the common usage (public IPv6 for every device)
an0n981 said:
Am I correct in assuming this is not open source?
Click to expand...
Click to collapse
As usual i send source only to people i know
I took this mod for a quick test drive, a little feedback:
-Is it not possible to restrict kernel?
-Could it be that apps that use native libraries to connect to the internet cannot be restricted? Firefox and Mega (both use native libraries) were able to connect even when completely restricted.
Also a little cosmetic issue com.android.process.gapps showed completely green at all times. However restrictions were applied properly
an0n981 said:
I took this mod for a quick test drive, a little feedback:
-Is it not possible to restrict kernel?
-Could it be that apps that use native libraries to connect to the internet cannot be restricted? Firefox and Mega (both use native libraries) were able to connect even when completely restricted.
Also a little cosmetic issue com.android.process.gapps showed completely green at all times. However restrictions were applied properly
Click to expand...
Click to collapse
Yes, see OP: "Limitiation: ... no native binaries." This is because the design of Xposed
Isn't it "com.google.process.gapps"? Onyl this one app has the wrong colors? Has it a green dot for "trusted app"? What did you configured for it?
Yes I meant com.google....
I set it from template to custom, blocked everything, however in the app overview it still showed as all green. When it was restricted GCM was blocked and the log showed blocked connections to mtalk.google.com:5228. Then I unrestricted outgoing mobile and wifi and GCM was available and the log correctly showed allowed connections but the colors in the app overview didn't change
Version 1.0.1 uploaded
- fix "incoming" thx @w0rinal
- also an error related to coloring, @an0n981 can you check if it fixes your problem? Toggling options could be required
defim said:
- also an error related to coloring, @an0n981 can you check if it fixes your problem? Toggling options could be required
Click to expand...
Click to collapse
Sorry the bug is still present
Also 1 more questions. Do you see any problem running this along side AFWall?
The bug affects any app that starts end ends with <>. <android.media> and <org.mozilla.firefox.sharedid> also always revert back to displaying completely green once the app is reloaded
an0n981 said:
Also 1 more questions. Do you see any problem running this along side AFWall?
Click to expand...
Click to collapse
No, should work without problems. The one created iptables rules other hooks the connection methods - if one fails, the other does it
an0n981 said:
The bug affects any app that starts end ends with <>. <android.media> and <org.mozilla.firefox.sharedid> also always revert back to displaying completely green once the app is reloaded
Click to expand...
Click to collapse
The "<>" entries are not real apps (.apks) with a package name, they are uids. At app start i load all installed apps with internet-permission and hide apps which are no more installed / have not any longer the permissions -> the uid items are not in the list of installed apps (obviously)
Will be fixed in next release
EDIT: Uploaded
This is awesome ?
A few questions:
- is there a way to edit template? I couldn't find it anywhere in settings- am I missing something?
- Can you add multiple selection? For example, someone has lots of apps and wants to block roaming to them etc. etc. without having to change it manually for each app.
- filtering or sorting apps? perhaps something simple like the way afwall , or a more thorough filter like XPrivacy has?
Sent from my Nexus 5 using Tapatalk
defim said:
The "<>" entries are not real apps (.apks) with a package name, they are uids. At app start i load all installed apps with internet-permission and hide apps which are no more installed / have not any longer the permissions -> the uid items are not in the list of installed apps (obviously)
Will be fixed in next release
EDIT: Uploaded
Click to expand...
Click to collapse
Confirmed fixed
jaibar said:
This is awesome ?
A few questions:
- is there a way to edit template? I couldn't find it anywhere in settings- am I missing something?
- Can you add multiple selection? For example, someone has lots of apps and wants to block roaming to them etc. etc. without having to change it manually for each app.
- filtering or sorting apps? perhaps something simple like the way afwall , or a more thorough filter like XPrivacy has?
Sent from my Nexus 5 using Tapatalk
Click to expand...
Click to collapse
The template is used for all "blue" apps, which where are not configured by user. Modifying template is part of the donator options (see OP).
Btw, next planned feature: detection of VPN connections
defim said:
The template is used for all "blue" apps, which where are not configured by user. Modifying template is part of the donator options (see OP).
Btw, next planned feature: detection of VPN connections
Click to expand...
Click to collapse
Nice feature !
I dry tested this app (i.e. not checked in the Xposed module on my device) and already saw that the VPN was missing. Now I use AFWall+ which is good and has more profiles. I block all Google apps with it with a 'limited internet' profile and every time I download something from Play, I load another profile which allows 'Google Play services' and 'Google Play store' internet connection and after download/update I revert to 'Limited internet'.
On my Mac I have 'Little Snitch' firewall which has the ability to let it prompt for certain apps which I don't want to be connected permanently (such as the Mac App Store), but only when I do e.g. an OSX update. In that case I let it prompt and say 'only this time'.
A similar approach on LightingWall should be very welcome. E.g. a notification that the Play store wants to connect with internet and when one wants to download / update an app, say 'only this time' and not permanently.
mermaidkiller said:
Nice feature !
I dry tested this app (i.e. not checked in the Xposed module on my device) and already saw that the VPN was missing. Now I use AFWall+ which is good and has more profiles. I block all Google apps with it with a 'limited internet' profile and every time I download something from Play, I load another profile which allows 'Google Play services' and 'Google Play store' internet connection and after download/update I revert to 'Limited internet'.
On my Mac I have 'Little Snitch' firewall which has the ability to let it prompt for certain apps which I don't want to be connected permanently (such as the Mac App Store), but only when I do e.g. an OSX update. In that case I let it prompt and say 'only this time'.
A similar approach on LightingWall should be very welcome. E.g. a notification that the Play store wants to connect with internet and when one wants to download / update an app, say 'only this time' and not permanently.
Click to expand...
Click to collapse
Xprivacy implements a similar thing, allowing the user to be informed when one of the restrictions are asking for access of that permission, including internet permissions(no distiction between lan or vpn), i would also welcome an on demand prompt feature for this app, its one faeture i wished afwall had, but believe it cant because of the nature of iptables i believe,
Saying that im also kinda worried that this might conflict, two apps essentially fighting for control to "pause" the system, hope im wrong, maybe if the two devs of the two respective apps co-orporated in implementation,it might be resolved, if there is an issue, i dont know........... but im getting ahead of myself here, defim has not even stated that he'll implement this, still, no harm in discussing possibilities, slim or not
@banderos101 @mermaidkillerIf you want to be informed if an app is allowed or denied to access some hosts, you could get it with Tasker. Just with a simple message box or more enhanced things Tasker can do. It should not be a problem using this app wiht Xprivacy, AFwal etc. If you block a connection with one app, it could be that the others can't see/log it. This depends on the order of the apps, An iptables firewall should be the last the connection is passing.
A per host filter is not planned, if you want to stop connection to some (tracking, malwar, adware) hosts a hosts file filter could be used, like my UnbelovedHosts
defim said:
As usual i send source only to people i know
Click to expand...
Click to collapse
Too big a risk to take for security software like this. Post your work up on Github under a reasonable license.
I'm not seeing a big advantage over the GPL AFWall+ anyway.
i see there is already ssh server available if you copy a key back into the device
but i can see good features like VPN and Hotspot are missing
i can see that vpn could be hard if not in RW mode
and hot spot just needs ap-hotspot installing
is there a way of seeing what apps are going to be available ?
a lot of handy tools on the droid which are missing from here that could be added and probably already available
nmap
virt-manager
to name a few, but handy for system admins to work on remote servers etc ...
wayneward said:
i see there is already ssh server available if you copy a key back into the device
but i can see good features like VPN and Hotspot are missing
i can see that vpn could be hard if not in RW mode
and hot spot just needs ap-hotspot installing
Click to expand...
Click to collapse
Feel free to file a bug at https://bugs.launchpad.net/ubuntu/+source/ubuntu-system-settings.
wayneward said:
is there a way of seeing what apps are going to be available ?
a lot of handy tools on the droid which are missing from here that could be added and probably already available
nmap
virt-manager
to name a few, but handy for system admins to work on remote servers etc ...
Click to expand...
Click to collapse
What do you mean by "what apps are going to be available"? You'll never know what 3rd party devs will do.
However, these things won't be doable by 3rd party apps due to Ubuntu's apparmor security policies. These would have to be implemented in the system settings or as some system service as well.
wayneward said:
i see there is already ssh server available if you copy a key back into the device
but i can see good features like VPN and Hotspot are missing
i can see that vpn could be hard if not in RW mode
and hot spot just needs ap-hotspot installing
is there a way of seeing what apps are going to be available ?
a lot of handy tools on the droid which are missing from here that could be added and probably already available
nmap
virt-manager
to name a few, but handy for system admins to work on remote servers etc ...
Click to expand...
Click to collapse
https://wiki.ubuntu.com/Touch/ReleaseNotes :good:
The following network features are not yet included in the Developer Preview:
Advanced Settings (e.g. Hidden SSIDs, Manual IP, VPNā¦)
Hot Spot/Tethering
@Geeks Empire Those release notes are quite outdates. Hidden SSIDs, for example, have been there for ages now.
Sent from my awesome Ubuntu Touch device using the Forum Browser app