Android VPN issues access local lan only on android. - Android Q&A, Help & Troubleshooting

I have a vpn provider PIA.
But that don't care much. The problem only occur on my android phones (4.4.4 and 5.0)
Problem: I am at home, when android phone connected to vpn, i can't access other computers on my local network (no chromecast, samba share and the rest)
It's not a problem of the VPN provider, because i also have my own hosted VPS with a openvpn server on it, same issue.
At home with vpn on
Windows 8 pc with PIA vpn client. I can still access my LAN (192.168.1.1 for example).
Apple iPad with Openvpn client: I can still access my LAN
Nexus 5 - android 5.0 (with root access) - PIA vpn client / OPENvpn / PPTP vpn: cannot access my LAN.
No firewall or any other protection app on my nexus 5.
Router: ASUS RT-AC68U
192.168.1.x network.
255.255.255.0 submask
My ow suggestion is that i need to add a static route on my android device or just the opposite -> don't push LAN traffic over the vpn. But how to accomplish this?
This is maybe the same problem?
Another link with maybe some information?

Related

Openvpn connected but not tunneling over VPN

Hi,
I followed several guides on connecting my Galaxy Ace with an Openvpn Server.
I finally managed to connect to a Openvpn server using Certificates with the latest Cyanogen Mod for the Galaxy Ace.
For the Connection I used OpenVPN Settings App from the Market.
The thing is that the connection is established and I see in the config, that VPN is connected. It displays the message:" Connected to 134.x.x.x as 192.168.200.100"
But unfortunately nothing is tunneled over this VPN connection. If I for example check my external IP on the Galaxy device, it still shows me my G3 Provider IP. But I expect to see the IP of my Home Internet Provider. Furthermore no connections to devices on the local Network of the VPN Server can be made.
That means, that despite the VPN Dialog showing me that I am connected to the Open VPN server, no connection is tunneled over that device.
The Guides I used to setup the VPN Connection are from here:
freetz.org/wiki/packages/openvpn
and
riseup.net/en/openvpn-android
If I connect with the same settings from an windows PC to the Server, The connection is established and tunneling just fine.
Anyone knows what I am doing wrong?

[Q] PPTP VPN Routing Issue

I am having some problems with connecting my devices to my server through PPTP VPN. My setup is a DD-WRT router running PPTPd. I can connect to it with my Android over LTE just fine, can surf the internet and can ping devices within my LAN. My subnet is 192.168.0.x, with 192.168.0.1 being the router, 192.168.0.2-99 reserved for static internal IPs, 192.168.0.100-150 reserved for dynamic internal IPs (the DHCP range), and 192.168.0.201-253 reserved for PPTP VPN. My PPTP VPN server is set up as 192.168.0.200, which is the same physical device as 192.168.0.1.
The problem is that devices physically connected my router cannot ping Android nodes connected over VPN. This seems to be an Android issue. When I took my windows 7 laptop to a cafe, connected it to the cafe's network and connected to my home network over VPN, the ping worked both ways. Devices that were physically in my house could ping my windows laptop and my windows laptop could ping them.
I tried the same thing with my Nexus 5 and Nexus 10, both could not be pinged from inside the house (although my Nexus devices could ping devices inside the house).
I am using 4.4.2 KitKat on both my nexus devices and connecting using the built-in PPTP settings menus. Can anyone throw a suggestion my way?
Thanks!

[Q] CM11/OpenVPN Not Routing Connections Over VPN Correctly

I just noticed that my moto E (running CM11) is not correctly routing my traffic to my openvpn server. I noticed when I was looking at the current connections on my OpenWRT router that I could see the VPN's local IP address, and the remote connection:
IPV4 TCP 10.9.0.20:56657 157.166.xx.xx:80
Where 10.9.0.20 is my local VPN address, the other represents any remote address I connect to.
I could see all this in Luci's connection graphs, which means that OpenVPN is not sending my traffic over the tunnel at all, despite the reports from sites like ipleak.net and similar sites that tell me I have no leak . But if I can see the connections from my router, that means that when I connect over mobile data, my carrier can likely see all of my traffic. This is not what I want, I am having a hard time fixing it. Also, how is it even possible that my router is detecting the IP of my tun interface??
I tried two different OpenVPN frontends, tweaking the firewall on the phone (afwall+) and also playing around with the 'redirect-gateway' directives. I am not sure if this a DNS leak or total disobiedience on Android's part of my routing rules. The fact that I can see these connections from the router makes me think that the traffic is not even being encrypted before it's sent over the internet. My firewall rules are set so that every app is supposed to route over the VPN. These are my configurations:
Server Config:
mode server
tls-server
local x.x.x.x
port 35777
proto udp
dev tun0
ca /etc/openvpnca.crt
cert /etc/openvpn/randomcn.crt
key /etc/openvpn/randomcn.key
dh /etc/openvpn/dh.pem
topology p2p
server 10.8.0.0 255.255.255.0
;topology subnet
ifconfig-pool-persist ipp.txt
client-config-dir clients
;client-to-client
keepalive 7 80
tls-auth /etc/openvpn/ta.key 0
cipher AES-128-CBC
comp-lzo
max-clients 3
user nobody
group nogroup
persist-key
persist-tun
status openvpn-status.log
log openvpn.log
In my client directory, I have these settings. On my PC I do not have this IP leak problem despite the settings being the same:
push "redirect-gateway def1 bypass-dhcp"
push "dhcp-option DNS 10.8.0.1"
I have dnscrypt running with unbound on the server, serving the clients. This configuration works on my PC, but it seems no matter what I do I still can see the vpn local IP and all of my remote connections with Luci on openwrt.
I have tried using both OpenVPN connect, Openvpn for Android, and I am currently trying to use the ICS binary as well. Can anyone help me solve this problem? My goal is to tunnel all my phones traffic over the VPN and prevent IP or DNS leaks.

[Q] How can I direct ALL traffic (including wifi tether) over the VPN?

Edit: forgot to add: Android 4.4.4, stock, rooted. Probably not relevant, but it's a Nexus 4.
Hi,
My phone is connected to a VPN via Openvpn for Android (the stock android vpn didn't seem to work).
My laptop is tethered to my phone.
My phone is definitely connected to the VPN: checking my external IP address confirms this.
However, my laptop's external IP shows up as if I were not connected to the VPN.
In OpenVPN for Android, I checked the following option:
use default route
Redirects all traffic over the VPN.
However, this did not make any difference.
How can I make sure all tethered devices are using the vpn connection?

Android 5.0 Lollipop - Redirect traffic of a specific app through a VPN with proxy

How can I setup the next situation in Android 5.0?
1. All network communication of app A should be made through an VPN connection with a proxy;
2. The other apps should continue to communicate directly through the wireless connection, without any proxy.
I was partly able to do this in Android 4.4 KitKat. I configured the VPN, turned it on and configured the proxy ip and port in the wireless network details. Android started to redirect the traffic of all apps through VPN and proxy.
When I do the same in Android 5.0, the result is worst! The apps simply continue to use the wireless connection directly, without any consideration of the VPN and proxy.
Thanks guys.

Categories

Resources