Hi, guys!
I'm developing an app called TracePing. It is a network diagnostic tool which combines the functionality of the 'traceroute' and 'ping' programs and is similar to mtr.
Neither my provider nor my router don't support IPv6 yet, so I can test it only with link local hosts.
Can anybody who has IPv6 test any IPv6-enabled hosts like ipv6.google.com, xs4all.nl, etc?
Root is needed for IPv6 hosts because because ping6 executable has no SUID bit on ICS and up. There is no way to ping ipv6 without it. Basically, ping6 executable is useless without root...
Thanks!
Related
I am trying to develop a test case that requires whether the network traffic is going through a proxy server or not. I believe that reading the file which contains this information would let me achieve it. Can someone please tell me where the Android OS stores the proxy servers IP (which we set in network settings) in the Android file system.
Hi guys, I'm learning to customize ROMs and want to customize the captive portal server. Since I'm behind the Great Firewall in China, the default server, which is google.com , is blocked. I wonder if there's a way to modify the captive portal server so I can integrate the modified server into a custom ROM, rather than use adb commands after the system is all set up?
I guess if the server URL is written in a certain file and it can be modified on a file level? But so far in the forum I haven't seen another way except for command line .
My phone provider recently enabled IPv6 for data users.
https://www.google.fr/amp/s/www.bbo...en-ipv6-sur-mobile-avec-bouygues-telecom/amp/
in short, it says to edit APN settings and alter the PROTOCOL setting.
I see this setting on Android 7 on Oukitel (K6000 Plus), but not on Android 4.4 (HTC One M8).
Android 4.4 does show full IPv6 connectivity on wifi, and presents a LinkLocal IP on rmnet0.
Since rmnet0 has a LL, what's the trick to enable IPv6 discovery ? is it a limitation on Android 4.4 ? Is there a hidden setting I can tweak with am/pm/adb ? my phone is rooted. In example, on a classic Linux, I would try to echo 1 somewhere in /sys ....
If absolutely required, but I would like to avoid this method, I can put my Bouygues Sim card on the Android 7 phone to write down the IP and gateway, to manually set them on the HTC; not sure it would work; Android usually dislikes when I do this kind of workarounds ...
Just a thought, since the snapdragon version of the S9+ does not have root yet would it be possible to have an edited hosts file to block ads? Would it work to get the matching firmware from samfirm, add the edited hosts file to that and then flash with odin? Has anyone tried this? or is it not possible?
Just use stopad i been using that and haven't had any issues
Blokada.org
Blocks ads via local vpn. Easy to use, just follow directions on site. Best non root adblocker.
Is there a way to block ads with a custom hosts file where you can add entries and it runs not through local vpn? Only one vpn can run at a time so running a vpn service at the same time would not be possible. Without root the hosts file cannot be edited but is there another app or way to do this so that ads can be blocked as well as running a vpn service?
Anyone know how to block apps from accessing the internet in Android AOSP code automatically for Android 9-11?
I found some patch but don't understand how it works.
Just need an easy way to add the package names to block in the patch or to feed an external file like system/etc/blocked_apps.xml to the patch.
Patch
https://pastebin.com/0BsfEECq
For websites it's easy since you can just add them to the host file.
Android's host file is the correct place.
The hosts file is used by Android to map IP addresses to host names or domain names. This file acts as a local DNS service for your Android device, and it overrides the mappings from the DNS server that your Android device is connected to, through the network.
Here an example how to block all connections to Google.
So all you have to know which URL the app in question tries to connect to. This you can find it out with connection tracking tools, e.g. Packet Capture app, and even via Android's LOGCAT.