Status Update
Comments
js...@android.com <js...@android.com> #2
Which hardware is this on? (Is it missing kernel option for IPv6?)
mi...@gmail.com <mi...@gmail.com> #3
These logs are generated by original ASUS Google Nexus 7 WiFi [2012]: it has been just upgraded via OTA with official firmware 4.4 (KRT16S).
I don't know if the kernel option for IPv6 is installed because I've not compiled the kernel but I'm using the official Google version.
Anyway this issue is common for many users as I can see from the lot of feedbacks I receive from users of my VPN applications.
I don't know if the kernel option for IPv6 is installed because I've not compiled the kernel but I'm using the official Google version.
Anyway this issue is common for many users as I can see from the lot of feedbacks I receive from users of my VPN applications.
di...@gmail.com <di...@gmail.com> #4
I've the same issue. Nexus 7, Android 4.4 KitKat.Please fix it soon.
li...@gmail.com <li...@gmail.com> #5
Same problem Nexus 7(2013) android 4.4
ji...@gmail.com <ji...@gmail.com> #6
Same problem on Nexus 7 with 4.4. I rely on this functionality for connectivity while on the road. With travel plans just a week away, I'm seriously considering a Windows 8 tablet. There's no way I'll be getting the new Nexus 10 now - not when something as important as this can be broken so easily.
rg...@gmail.com <rg...@gmail.com> #7
Can you send a full bugreport of the failure to me at rgreenwalt@google.com?
jp...@google.com <jp...@google.com> #8
That specific error copypasted in the report is supposed to be innocuous, but there is most likely an underlying problem.
The requested bugreport will help identify the issue.
https://android.googlesource.com/platform/system/netd/+/master/SecondaryTableController.cpp
around line 474
//try and set up for ipv6. ipv6 nat came in the kernel only in 3.7, so this can fail
ret = execIptables(V6,
"-t",
"nat",
add ? "-A" : "-D",
LOCAL_NAT_POSTROUTING,
"-o",
iface,
"-m",
"mark",
"--mark",
mark_str,
"-j",
"MASQUERADE",
NULL);
The requested bugreport will help identify the issue.
around line 474
//try and set up for ipv6. ipv6 nat came in the kernel only in 3.7, so this can fail
ret = execIptables(V6,
"-t",
"nat",
add ? "-A" : "-D",
LOCAL_NAT_POSTROUTING,
"-o",
iface,
"-m",
"mark",
"--mark",
mark_str,
"-j",
"MASQUERADE",
NULL);
to...@gmail.com <to...@gmail.com> #9
I've also got this problem on a Nexus 7 (2012, WLAN only) after the update to Android 4.4 last weekend. This breaks my connectivity while on the road, as I am no longer able to use tethering via Bluetooth to my Samsung smartphone, making the tablet nearly useless away from my home network (open WLAN hotspots are not that common in Germany due to legal difficulties).
I'd really appreciate a fast fix for this problem.
I'd really appreciate a fast fix for this problem.
xe...@gmail.com <xe...@gmail.com> #10
Same here on 4.4 kitkat now nexus useless when out! & lack of adhoc wifi adds insult to injury!
mi...@gmail.com <mi...@gmail.com> #11
Same problem here too , my nexus 7 2012 is no useless due to that error or thatbproblem with the vpn
mi...@gmail.com <mi...@gmail.com> #12
I wiah u fix it soon :)
21...@gmail.com <21...@gmail.com> #13
[Comment deleted]
ka...@gmail.com <ka...@gmail.com> #14
I've just updated my ASUS Google Nexus 7 WiFi [2012] to android 4.4 KitKat via OTA, and i have the same issue.
pr...@gmail.com <pr...@gmail.com> #15
I have same problem on Nexus10 after I received official update to 4.4
an...@gmail.com <an...@gmail.com> #16
I have a Nexus tablet 10. After installing Android 4.4 Bluevpn stopped working. Tried to use the TunKo did not help. Help please
sh...@gmail.com <sh...@gmail.com> #17
I have the same problem too. After upgrading to 4.4 my nexus 7 is now less useful than before.
mi...@gmail.com <mi...@gmail.com> #18
[Comment deleted]
mi...@gmail.com <mi...@gmail.com> #19
[Comment deleted]
mi...@gmail.com <mi...@gmail.com> #20
The VpnService class cannot register the "tun0" interface into the routing table; I've tested the same code for Android 4.4 and 4.3:
Android 4.4
shell@android:/ $ cat /proc/net/route
cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT
wlan0 00000000 0100A8C0 0003 0 0 0 00000000 0 0 0
wlan0 00000000 0100A8C0 0003 0 0 305 00000000 0 0 0
wlan0 0000A8C0 00000000 0001 0 0 305 00FFFFFF 0 0 0
wlan0 0100A8C0 00000000 0005 0 0 0 FFFFFFFF 0 0 0
Android 4.3
shell@android:/ $ cat /proc/net/route
cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT
tun0 00000000 00000000 0001 0 0 0 00000080 0 0 0
wlan0 00000000 0100A8C0 0003 0 0 0 00000000 0 0 0
wlan0 00000000 0100A8C0 0003 0 0 308 00000000 0 0 0
tun0 00000080 00000000 0001 0 0 0 00000080 0 0 0
wlan0 0000A8C0 00000000 0001 0 0 308 00FFFFFF 0 0 0
wlan0 0100A8C0 00000000 0005 0 0 0 FFFFFFFF 0 0 0
Android 4.4
shell@android:/ $ cat /proc/net/route
cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT
wlan0 00000000 0100A8C0 0003 0 0 0 00000000 0 0 0
wlan0 00000000 0100A8C0 0003 0 0 305 00000000 0 0 0
wlan0 0000A8C0 00000000 0001 0 0 305 00FFFFFF 0 0 0
wlan0 0100A8C0 00000000 0005 0 0 0 FFFFFFFF 0 0 0
Android 4.3
shell@android:/ $ cat /proc/net/route
cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT
tun0 00000000 00000000 0001 0 0 0 00000080 0 0 0
wlan0 00000000 0100A8C0 0003 0 0 0 00000000 0 0 0
wlan0 00000000 0100A8C0 0003 0 0 308 00000000 0 0 0
tun0 00000080 00000000 0001 0 0 0 00000080 0 0 0
wlan0 0000A8C0 00000000 0001 0 0 308 00FFFFFF 0 0 0
wlan0 0100A8C0 00000000 0005 0 0 0 FFFFFFFF 0 0 0
to...@gmail.com <to...@gmail.com> #21
I have this same issue with my Google nexus 5. This is a huge feature for me and I'm sure many others. Please fix as soon as possible.
mi...@gmail.com <mi...@gmail.com> #22
[Comment deleted]
mi...@gmail.com <mi...@gmail.com> #23
The Linux kernel 3.4.0 was introduced since Android version 4.2 (Jelly Bean); now I've in my Nexus 7 (2012) [firmware KRT16S] the old kernel version 3.1.10-gee1a0b2. Maybe the issue is due to the kernel regression?
mi...@gmail.com <mi...@gmail.com> #25
#22
VPN on Android 4.4 seems to depend on, or at least assume it is run on, a kernel with support for IPv6 NAT, available in Linux kernel 3.7 and later.
VPN on Android 4.4 seems to depend on, or at least assume it is run on, a kernel with support for IPv6 NAT, available in Linux kernel 3.7 and later.
mi...@gmail.com <mi...@gmail.com> #26
Another difference for the same code:
VpnService.Builder builder = new VpnService.Builder();
builder.setMtu(1500);
builder.addAddress("10.0.0.1",24);
builder.addDnsServer("8.8.8.8");
builder.addDnsServer("8.8.4.4");
builder.addRoute("0.0.0.0", 0);
ParcelFileDescriptor parcel = builder.setSession("VPN Tether Connection").establish();
Android 4.3:
11-30 12:24:49.458: D/VpnJni(146): Address added on tun0:10.0.0.1/24
11-30 12:24:49.458: D/VpnJni(146): Route added on tun0:0.0.0.0/0
11-30 12:24:49.458: I/Vpn(146): Established by com.test_vpn on tun0
Android 4.4:
11-29 17:18:02.925: D/VpnJni(493): Address added on tun0:10.0.0.1/24
11-29 17:18:03.055: I/ip6tables(120): ip6tables v1.4.11.1: can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)
11-29 17:18:03.055: I/ip6tables(120): Perhaps ip6tables or your kernel needs to be upgraded.
11-29 17:18:03.055: I/ip6tables(120): ip6tables terminated by exit(3)
11-29 17:18:03.055: E/Netd(120): exec() res=0, status=768 for /system/bin/ip6tables -t nat -A st_nat_POSTROUTING -o tun0 -m mark --mark 60 -j MASQUERADE
11-29 17:18:03.155: I/Vpn(493): Established by com.test_vpn on tun0
The message "Route added on tun0:0.0.0.0/0 " is not in the log: means that builder.addRoute("0.0.0.0", 0); has no effect.
Method "addRoute" for class VpnService.Build changed:
version 4.3:
public Builder addRoute(String sAddress, int prefixLength) {
InetAddress address = InetAddress.parseNumericAddress(sAddress);
check(address, prefixLength);
int offset = prefixLength / 8;
byte[] bytes = address.getAddress();
if (offset < bytes.length) {
for (bytes[offset] <<= prefixLength % 8; offset < bytes.length; ++offset) {
if (bytes[offset] != 0) {
throw new IllegalArgumentException("Bad address");
}
}
}
mRoutes.append(String.format(" %s/%d", address.getHostAddress(), prefixLength));
return this;
}
version 4.4:
public Builder addRoute(String sAddress, int prefixLength) {
InetAddress address = InetAddress.parseNumericAddress(sAddress);
check(address, prefixLength);
int offset = prefixLength / 8;
byte[] bytes = address.getAddress();
if (offset < bytes.length) {
for (bytes[offset] <<= prefixLength % 8; offset < bytes.length; ++offset) {
if (bytes[offset] != 0) {
throw new IllegalArgumentException("Bad address");
}
}
}
mRoutes.add(new RouteInfo(new LinkAddress(address, prefixLength), null));
return this;
}
Where:
public RouteInfo(LinkAddress destination, InetAddress gateway) {
this(destination, gateway, null);
}
the "gateway" is null and the "iface" is null for the constructor method:
/**
* Constructs a RouteInfo object.
*
* If destination is null, then gateway must be specified and the
* constructed route is either the IPv4 default route <code>0.0.0.0</code>
* if @gateway is an instance of {@link Inet4Address}, or the IPv6 default
* route <code>::/0</code> if gateway is an instance of
* {@link Inet6Address}.
*
* destination and gateway may not both be null.
*
* @param destination the destination prefix
* @param gateway the IP address to route packets through
* @param iface the interface name to send packets on
*/
public RouteInfo(LinkAddress destination, InetAddress gateway, String iface) {
if (destination == null) {
if (gateway != null) {
if (gateway instanceof Inet4Address) {
destination = new LinkAddress(Inet4Address.ANY, 0);
} else {
destination = new LinkAddress(Inet6Address.ANY, 0);
}
} else {
// no destination, no gateway. invalid.
throw new IllegalArgumentException("Invalid arguments passed in: " + gateway + "," +
destination);
}
}
if (gateway == null) {
if (destination.getAddress() instanceof Inet4Address) {
gateway = Inet4Address.ANY;
} else {
gateway = Inet6Address.ANY;
}
}
mHasGateway = (!gateway.isAnyLocalAddress());
mDestination = new LinkAddress(NetworkUtils.getNetworkPart(destination.getAddress(),
destination.getNetworkPrefixLength()), destination.getNetworkPrefixLength());
mGateway = gateway;
mInterface = iface;
mIsDefault = isDefault();
mIsHost = isHost();
}
VpnService.Builder builder = new VpnService.Builder();
builder.setMtu(1500);
builder.addAddress("10.0.0.1",24);
builder.addDnsServer("8.8.8.8");
builder.addDnsServer("8.8.4.4");
builder.addRoute("0.0.0.0", 0);
ParcelFileDescriptor parcel = builder.setSession("VPN Tether Connection").establish();
Android 4.3:
11-30 12:24:49.458: D/VpnJni(146): Address added on tun0:
11-30 12:24:49.458: D/VpnJni(146): Route added on tun0:
11-30 12:24:49.458: I/Vpn(146): Established by com.test_vpn on tun0
Android 4.4:
11-29 17:18:02.925: D/VpnJni(493): Address added on tun0:
11-29 17:18:03.055: I/ip6tables(120): ip6tables v1.4.11.1: can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)
11-29 17:18:03.055: I/ip6tables(120): Perhaps ip6tables or your kernel needs to be upgraded.
11-29 17:18:03.055: I/ip6tables(120): ip6tables terminated by exit(3)
11-29 17:18:03.055: E/Netd(120): exec() res=0, status=768 for /system/bin/ip6tables -t nat -A st_nat_POSTROUTING -o tun0 -m mark --mark 60 -j MASQUERADE
11-29 17:18:03.155: I/Vpn(493): Established by com.test_vpn on tun0
The message "Route added on tun0:
Method "addRoute" for class VpnService.Build changed:
version 4.3:
public Builder addRoute(String sAddress, int prefixLength) {
InetAddress address = InetAddress.parseNumericAddress(sAddress);
check(address, prefixLength);
int offset = prefixLength / 8;
byte[] bytes = address.getAddress();
if (offset < bytes.length) {
for (bytes[offset] <<= prefixLength % 8; offset < bytes.length; ++offset) {
if (bytes[offset] != 0) {
throw new IllegalArgumentException("Bad address");
}
}
}
mRoutes.append(String.format(" %s/%d", address.getHostAddress(), prefixLength));
return this;
}
version 4.4:
public Builder addRoute(String sAddress, int prefixLength) {
InetAddress address = InetAddress.parseNumericAddress(sAddress);
check(address, prefixLength);
int offset = prefixLength / 8;
byte[] bytes = address.getAddress();
if (offset < bytes.length) {
for (bytes[offset] <<= prefixLength % 8; offset < bytes.length; ++offset) {
if (bytes[offset] != 0) {
throw new IllegalArgumentException("Bad address");
}
}
}
mRoutes.add(new RouteInfo(new LinkAddress(address, prefixLength), null));
return this;
}
Where:
public RouteInfo(LinkAddress destination, InetAddress gateway) {
this(destination, gateway, null);
}
the "gateway" is null and the "iface" is null for the constructor method:
/**
* Constructs a RouteInfo object.
*
* If destination is null, then gateway must be specified and the
* constructed route is either the IPv4 default route <code>0.0.0.0</code>
* if @gateway is an instance of {@link Inet4Address}, or the IPv6 default
* route <code>::/0</code> if gateway is an instance of
* {@link Inet6Address}.
*
* destination and gateway may not both be null.
*
* @param destination the destination prefix
* @param gateway the IP address to route packets through
* @param iface the interface name to send packets on
*/
public RouteInfo(LinkAddress destination, InetAddress gateway, String iface) {
if (destination == null) {
if (gateway != null) {
if (gateway instanceof Inet4Address) {
destination = new LinkAddress(Inet4Address.ANY, 0);
} else {
destination = new LinkAddress(Inet6Address.ANY, 0);
}
} else {
// no destination, no gateway. invalid.
throw new IllegalArgumentException("Invalid arguments passed in: " + gateway + "," +
destination);
}
}
if (gateway == null) {
if (destination.getAddress() instanceof Inet4Address) {
gateway = Inet4Address.ANY;
} else {
gateway = Inet6Address.ANY;
}
}
mHasGateway = (!gateway.isAnyLocalAddress());
mDestination = new LinkAddress(NetworkUtils.getNetworkPart(destination.getAddress(),
destination.getNetworkPrefixLength()), destination.getNetworkPrefixLength());
mGateway = gateway;
mInterface = iface;
mIsDefault = isDefault();
mIsHost = isHost();
}
hu...@gmail.com <hu...@gmail.com> #27
I have the same issue after my Nexus 10 was automatically upgraded to Kitkat. BlueVPN connection can be established with my Blackberry phone, but doesn’t have data flow.
sa...@gmail.com <sa...@gmail.com> #28
I have connected nexus 10 and my mobile phone using BlueVPN. Connection establised, but I cant browse using Chrome :-( ???
th...@gmail.com <th...@gmail.com> #29
For me (Nexus 10), BlueVPN connects but browsing doesn't work.
This has broken my routine and would appreciate a quick fix!
This has broken my routine and would appreciate a quick fix!
no...@gmail.com <no...@gmail.com> #30
i my n7 2012 and i got the very same issue i hope they got fixed as soon as possible
ar...@gmail.com <ar...@gmail.com> #31
Whats up with guys at google...scrapping one or the other connectivity options in Android with every major release. Last it was with bluetooth and this time around its with VPN. WTH!!
-N7 2012 user (BlueVPN app unable to process data flow)
-N7 2012 user (BlueVPN app unable to process data flow)
wa...@aol.com <wa...@aol.com> #32
I have a Nexus 10. I occasionally connected online with my Nokia N8. Now there's no browsing. It seems to be the same problem as everyone else has - the Adroid 4.4 updating - and very irritating. Please fix as soon as possible.
mi...@gmail.com <mi...@gmail.com> #33
The KitKat version introduces several bugs on VPN module and other functionalities.
You can perform the downgrade of your Nexus device to the previous Jelly Bean 4.3 version, waiting Google will fix all these issues. Here are the instructions:
http://productforums.google.com/forum/#!msg/nexus/9B1a9GvqbMs/2kJnY8eQCRAJ
You can perform the downgrade of your Nexus device to the previous Jelly Bean 4.3 version, waiting Google will fix all these issues. Here are the instructions:
x....@gmail.com <x....@gmail.com> #34
BlueVPN connection not work in my Nexus 4 after update Android to 4.4. I am upset
vl...@gmail.com <vl...@gmail.com> #35
BlueVPN connection not work in my Nexus 7 after update Android to 4.4. I am upset
mi...@gmail.com <mi...@gmail.com> #36
There is something wrong in one of these steps:
VpnService.java ( row 471 )
public ParcelFileDescriptor establish() {
mConfig.addresses = mAddresses;
mConfig.routes = mRoutes;
try {
->> return getService().establishVpn(mConfig); // ConnectivityService.establishVpn
} catch (RemoteException e) {
throw new IllegalStateException(e);
}
}
ConnectivityService.java ( row 3637 )
public ParcelFileDescriptor establishVpn(VpnConfig config) {
throwIfLockdownEnabled();
int user = UserHandle.getUserId(Binder.getCallingUid());
synchronized(mVpns) {
->> return mVpns.get(user).establish(config); // Vpn.establish
}
}
Vpn.java ( rows 393 / 394 )
public synchronized ParcelFileDescriptor establish(VpnConfig config) {
........
mInterface = interfaze;
// Fill more values.
config.user = mPackage;
config.interfaze = mInterface;
config.startTime = SystemClock.elapsedRealtime();
mConfig = config;
// Set up forwarding and DNS rules.
mVpnUsers = new SparseBooleanArray();
token = Binder.clearCallingIdentity();
try {
->> mCallback.setMarkedForwarding(mInterface);
->> mCallback.setRoutes(interfaze, config.routes); // ConnectivityService.VpnCallback.setRoutes
mCallback.override(mInterface, config.dnsServers, config.searchDomains);
addVpnUserLocked(mUserId);
} finally {
Binder.restoreCallingIdentity(token);
}
} catch (RuntimeException e) {
updateState(DetailedState.FAILED, "establish");
IoUtils.closeQuietly(tun);
// make sure marked forwarding is cleared if it was set
try {
mCallback.clearMarkedForwarding(mInterface);
} catch (Exception ingored) {
// ignored
}
throw e;
}
Log.i(TAG, "Established by " + config.user + " on " + mInterface);
.............
}
ConnectivityService.java ( rows 3771 / 3779 )
public void setRoutes(String interfaze, List<RouteInfo> routes) {
for (RouteInfo route : routes) {
try {
->> mNetd.setMarkedForwardingRoute(interfaze, route); // NetworkManagementService.setMarkedForwardingRoute
} catch (RemoteException e) {
}
}
}
public void setMarkedForwarding(String interfaze) {
try {
->> mNetd.setMarkedForwarding(interfaze); // NetworkManagementService.setMarkedForwarding
} catch (RemoteException e) {
}
}
NetworkManagementService.java ( rows 1473 / 1520 )
public void setMarkedForwarding(String iface) {
mContext.enforceCallingOrSelfPermission(CONNECTIVITY_INTERNAL, TAG);
try {
->> mConnector.execute("interface", "fwmark", "rule", "add", iface); // NativeDaemonConnector.execute
} catch (NativeDaemonConnectorException e) {
throw e.rethrowAsParcelableException();
}
}
public void setMarkedForwardingRoute(String iface, RouteInfo route) {
mContext.enforceCallingOrSelfPermission(CONNECTIVITY_INTERNAL, TAG);
try {
LinkAddress dest = route.getDestination();
->> mConnector.execute("interface", "fwmark", "route", "add", iface,
dest.getAddress().getHostAddress(), dest.getNetworkPrefixLength()); // NativeDaemonConnector.execute
} catch (NativeDaemonConnectorException e) {
throw e.rethrowAsParcelableException();
}
}
NativeDaemonConnector.java ( row 292 )
public NativeDaemonEvent execute(String cmd, Object... args)
throws NativeDaemonConnectorException {
->> final NativeDaemonEvent[] events = executeForList(cmd, args); // --->> the native class CommandListener manages the command socket
if (events.length != 1) {
throw new NativeDaemonConnectorException(
"Expected exactly one response, but received " + events.length);
}
return events[0];
}
CommandListener.cpp ( rows 283 / 309 )
https://android.googlesource.com/platform/system/netd/+/refs/heads/kitkat-release/CommandListener.cpp
int CommandListener::InterfaceCmd::runCommand(SocketClient *cli, int argc, char **argv) {
...............
// 0 1 2 3 4 5 6 7
// interface route add/remove iface default/secondary dest prefix gateway
// interface fwmark rule add/remove iface
// interface fwmark route add/remove iface dest prefix
if (!strcmp(argv[1], "fwmark")) {
if (!strcmp(argv[2], "rule")) {
.........
if (!strcmp(argv[3], "add")) {
->> if (!sSecondaryTableCtrl->addFwmarkRule(argv[4])) { // SecondaryTableController.setFwmarkRule(iface, true)
cli->sendMsg(ResponseCode::CommandOkay,"Fwmark rule successfully added", false);
} else {
cli->sendMsg(ResponseCode::OperationFailed, "Failed to add fwmark rule", true);
}
}
........
return 0;
} else if (!strcmp(argv[2], "route")) {
.........
if (!strcmp(argv[3], "add")) {
->> if (!sSecondaryTableCtrl->addFwmarkRoute(argv[4], argv[5], atoi(argv[6]))) { // SecondaryTableController.addFwmarkRoute
cli->sendMsg(ResponseCode::CommandOkay, "Fwmark route successfully added", false);
} else {
cli->sendMsg(ResponseCode::OperationFailed, "Failed to add fwmark route", true);
}
}
.......
return 0;
}
......
}
.........
}
SecondaryTableController.cpp ( rows 475 / 516+534 )
https://android.googlesource.com/platform/system/netd/+/refs/heads/kitkat-release/SecondaryTableController.cpp
int SecondaryTableController::setFwmarkRule(const char *iface, bool add) {
.........
->> ret = execIptables(V6, // NetdConstants.execIptables
"-t",
"nat",
add ? "-A" : "-D",
LOCAL_NAT_POSTROUTING,
"-o",
iface,
"-m",
"mark",
"--mark",
mark_str,
"-j",
"MASQUERADE",
NULL);
.......
}
int SecondaryTableController::addFwmarkRoute(const char* iface, const char *dest, int prefix) {
->> return setFwmarkRoute(iface, dest, prefix, true);
}
int SecondaryTableController::setFwmarkRoute(const char* iface, const char *dest, int prefix,
bool add) {
int tableIndex = findTableNumber(iface);
if (tableIndex == -1) {
errno = EINVAL;
return -1;
}
int mark = tableIndex + BASE_TABLE_NUMBER;
char mark_str[11] = {0};
char chain_str[IFNAMSIZ + 18];
char dest_str[44]; // enough to store an IPv6 address + 3 character bitmask
snprintf(mark_str, sizeof(mark_str), "%d", mark);
snprintf(chain_str, sizeof(chain_str), LOCAL_MANGLE_IFACE_FORMAT, iface);
snprintf(dest_str, sizeof(dest_str), "%s/%d", dest, prefix);
->> return execIptables(getIptablesTarget(dest), // NetdConstants.execIptables
"-t",
"mangle",
add ? "-A" : "-D",
chain_str,
"-d",
dest_str,
"-j",
"MARK",
"--set-mark",
mark_str,
NULL);
}
NetdConstants.cpp
https://android.googlesource.com/platform/system/netd/+/refs/heads/kitkat-release/NetdConstants.cpp
VpnService.java ( row 471 )
public ParcelFileDescriptor establish() {
mConfig.addresses = mAddresses;
mConfig.routes = mRoutes;
try {
->> return getService().establishVpn(mConfig); // ConnectivityService.establishVpn
} catch (RemoteException e) {
throw new IllegalStateException(e);
}
}
ConnectivityService.java ( row 3637 )
public ParcelFileDescriptor establishVpn(VpnConfig config) {
throwIfLockdownEnabled();
int user = UserHandle.getUserId(Binder.getCallingUid());
synchronized(mVpns) {
->> return mVpns.get(user).establish(config); // Vpn.establish
}
}
Vpn.java ( rows 393 / 394 )
public synchronized ParcelFileDescriptor establish(VpnConfig config) {
........
mInterface = interfaze;
// Fill more values.
config.user = mPackage;
config.interfaze = mInterface;
config.startTime = SystemClock.elapsedRealtime();
mConfig = config;
// Set up forwarding and DNS rules.
mVpnUsers = new SparseBooleanArray();
token = Binder.clearCallingIdentity();
try {
->> mCallback.setMarkedForwarding(mInterface);
->> mCallback.setRoutes(interfaze, config.routes); // ConnectivityService.VpnCallback.setRoutes
mCallback.override(mInterface, config.dnsServers, config.searchDomains);
addVpnUserLocked(mUserId);
} finally {
Binder.restoreCallingIdentity(token);
}
} catch (RuntimeException e) {
updateState(DetailedState.FAILED, "establish");
IoUtils.closeQuietly(tun);
// make sure marked forwarding is cleared if it was set
try {
mCallback.clearMarkedForwarding(mInterface);
} catch (Exception ingored) {
// ignored
}
throw e;
}
Log.i(TAG, "Established by " + config.user + " on " + mInterface);
.............
}
ConnectivityService.java ( rows 3771 / 3779 )
public void setRoutes(String interfaze, List<RouteInfo> routes) {
for (RouteInfo route : routes) {
try {
->> mNetd.setMarkedForwardingRoute(interfaze, route); // NetworkManagementService.setMarkedForwardingRoute
} catch (RemoteException e) {
}
}
}
public void setMarkedForwarding(String interfaze) {
try {
->> mNetd.setMarkedForwarding(interfaze); // NetworkManagementService.setMarkedForwarding
} catch (RemoteException e) {
}
}
NetworkManagementService.java ( rows 1473 / 1520 )
public void setMarkedForwarding(String iface) {
mContext.enforceCallingOrSelfPermission(CONNECTIVITY_INTERNAL, TAG);
try {
->> mConnector.execute("interface", "fwmark", "rule", "add", iface); // NativeDaemonConnector.execute
} catch (NativeDaemonConnectorException e) {
throw e.rethrowAsParcelableException();
}
}
public void setMarkedForwardingRoute(String iface, RouteInfo route) {
mContext.enforceCallingOrSelfPermission(CONNECTIVITY_INTERNAL, TAG);
try {
LinkAddress dest = route.getDestination();
->> mConnector.execute("interface", "fwmark", "route", "add", iface,
dest.getAddress().getHostAddress(), dest.getNetworkPrefixLength()); // NativeDaemonConnector.execute
} catch (NativeDaemonConnectorException e) {
throw e.rethrowAsParcelableException();
}
}
NativeDaemonConnector.java ( row 292 )
public NativeDaemonEvent execute(String cmd, Object... args)
throws NativeDaemonConnectorException {
->> final NativeDaemonEvent[] events = executeForList(cmd, args); // --->> the native class CommandListener manages the command socket
if (events.length != 1) {
throw new NativeDaemonConnectorException(
"Expected exactly one response, but received " + events.length);
}
return events[0];
}
CommandListener.cpp ( rows 283 / 309 )
int CommandListener::InterfaceCmd::runCommand(SocketClient *cli, int argc, char **argv) {
...............
// 0 1 2 3 4 5 6 7
// interface route add/remove iface default/secondary dest prefix gateway
// interface fwmark rule add/remove iface
// interface fwmark route add/remove iface dest prefix
if (!strcmp(argv[1], "fwmark")) {
if (!strcmp(argv[2], "rule")) {
.........
if (!strcmp(argv[3], "add")) {
->> if (!sSecondaryTableCtrl->addFwmarkRule(argv[4])) { // SecondaryTableController.setFwmarkRule(iface, true)
cli->sendMsg(ResponseCode::CommandOkay,"Fwmark rule successfully added", false);
} else {
cli->sendMsg(ResponseCode::OperationFailed, "Failed to add fwmark rule", true);
}
}
........
return 0;
} else if (!strcmp(argv[2], "route")) {
.........
if (!strcmp(argv[3], "add")) {
->> if (!sSecondaryTableCtrl->addFwmarkRoute(argv[4], argv[5], atoi(argv[6]))) { // SecondaryTableController.addFwmarkRoute
cli->sendMsg(ResponseCode::CommandOkay, "Fwmark route successfully added", false);
} else {
cli->sendMsg(ResponseCode::OperationFailed, "Failed to add fwmark route", true);
}
}
.......
return 0;
}
......
}
.........
}
SecondaryTableController.cpp ( rows 475 / 516+534 )
int SecondaryTableController::setFwmarkRule(const char *iface, bool add) {
.........
->> ret = execIptables(V6, // NetdConstants.execIptables
"-t",
"nat",
add ? "-A" : "-D",
LOCAL_NAT_POSTROUTING,
"-o",
iface,
"-m",
"mark",
"--mark",
mark_str,
"-j",
"MASQUERADE",
NULL);
.......
}
int SecondaryTableController::addFwmarkRoute(const char* iface, const char *dest, int prefix) {
->> return setFwmarkRoute(iface, dest, prefix, true);
}
int SecondaryTableController::setFwmarkRoute(const char* iface, const char *dest, int prefix,
bool add) {
int tableIndex = findTableNumber(iface);
if (tableIndex == -1) {
errno = EINVAL;
return -1;
}
int mark = tableIndex + BASE_TABLE_NUMBER;
char mark_str[11] = {0};
char chain_str[IFNAMSIZ + 18];
char dest_str[44]; // enough to store an IPv6 address + 3 character bitmask
snprintf(mark_str, sizeof(mark_str), "%d", mark);
snprintf(chain_str, sizeof(chain_str), LOCAL_MANGLE_IFACE_FORMAT, iface);
snprintf(dest_str, sizeof(dest_str), "%s/%d", dest, prefix);
->> return execIptables(getIptablesTarget(dest), // NetdConstants.execIptables
"-t",
"mangle",
add ? "-A" : "-D",
chain_str,
"-d",
dest_str,
"-j",
"MARK",
"--set-mark",
mark_str,
NULL);
}
NetdConstants.cpp
rs...@gmail.com <rs...@gmail.com> #37
I just updates to 4.4.1 and it appears to be fixed. Woohoo!!!
se...@gmail.com <se...@gmail.com> #38
I am also facing the same issue after upgrade to 4.4 in my nexus 7.blue VPN is not working.notify me when resolved
ja...@gmail.com <ja...@gmail.com> #39
So is this fixed in the latest update?
ma...@gmail.com <ma...@gmail.com> #40
On my nexus 7 (2013) rooted with 4.4.1, it doesn't work.
mi...@gmail.com <mi...@gmail.com> #41
I'm not confident that the upgrade 4.4.1 will fix the VPN issue, probably we need to wait the new minor updates ( 4.4.2 or 4.4.3 )
to...@gmail.com <to...@gmail.com> #42
I received the OTA update to 4.4.2 tonight. Sadly the VPN problems still persist on my Nexus 7 (2012, 32 GB, WLAN only, unrooted). Guess I'll have to wait for 4.4.3+x then.
da...@gmail.com <da...@gmail.com> #43
[Comment deleted]
pr...@gmail.com <pr...@gmail.com> #44
I also received 4.4.2 to Nexus10 and no improvement :(
jo...@gmail.com <jo...@gmail.com> #45
I just upgraded to 4.4.2 (nexus 7 2012) and sadly blue VPN app is still not working properly. This is a very good app hopefully Google or the app developer will be able to correct this problem soon.
hu...@gmail.com <hu...@gmail.com> #46
4.4.2 update doesn't provide the fix on BlueVPN issue still!
mi...@gmail.com <mi...@gmail.com> #47
[Comment deleted]
mi...@gmail.com <mi...@gmail.com> #48
I've updated my Nexus 7 to version 4.4.2 and I can confirm that the issue is still present.
ka...@gmail.com <ka...@gmail.com> #49
I received the OTA update to 4.4.2(build KOT49H) tonight.
The VPN problem still persist on my Nexus 7(2012, 16 GB, WLAN only, unrooted).
Fix it faster please.
The VPN problem still persist on my Nexus 7(2012, 16 GB, WLAN only, unrooted).
Fix it faster please.
go...@gmail.com <go...@gmail.com> #50
I also received the OTA 4.4.2 and still have the VPN problem on my 2012 Nexus 7 16GB WLAN only.
Please get off the pot and address this, unless it is by design.
Please get off the pot and address this, unless it is by design.
dm...@gmail.com <dm...@gmail.com> #51
Same comment for me of course.
Why the problem is still present after two new versions???
Is Google listening?
Why the problem is still present after two new versions???
Is Google listening?
pe...@gmail.com <pe...@gmail.com> #52
I'm terribly unhappy!!! this is terrible!! Quickly correct errors!!
dm...@gmail.com <dm...@gmail.com> #53
I thought having a Google tablet was an advantage, but with this problème of vpn, it's really a disadvantage!
ey...@gmail.com <ey...@gmail.com> #54
Same problem here. VPN is the only way for me to use this phone while at work and it's broken in 4.4.2. Was working fine before KitKat. WTF Google ?
li...@gmail.com <li...@gmail.com> #55
One more unhappy user :(
va...@gmail.com <va...@gmail.com> #56
Last night i upgraded to 4.4.2 , still the vpn issue persists.
Any plan of fixing it ??
Atleast provide us the work around
Any plan of fixing it ??
Atleast provide us the work around
gu...@gmail.com <gu...@gmail.com> #57
For me connecting to openVPN server both IPv4 and IPv6 go through the tunnel on Android 4.3 using OpenVPN for Android.
But on KitKat (4.4 and 4.4.2, exact same app+settings) IPv6 does not work anymore, looking with Wireshark shows: no IPv6 in the tunnel...
Is this the same bug mentioned here?
But on KitKat (4.4 and 4.4.2, exact same app+settings) IPv6 does not work anymore, looking with Wireshark shows: no IPv6 in the tunnel...
Is this the same bug mentioned here?
mi...@gmail.com <mi...@gmail.com> #58
#56 Guido1, your description sounds very similar to bug 36949180 (VPNService can only provide connectivity for routes that are reachable without VPN), unless you have IPv6 access without the VPN.
ws...@gmail.com <ws...@gmail.com> #59
I have a nexus 7 2013 version upgraded to kit kat 4.4.2 and i have teh same problems with VPN, when google will fix it?
hu...@gmail.com <hu...@gmail.com> #60
Google is so incapable of solving this issue!
wa...@gmail.com <wa...@gmail.com> #61
#59, if you believe that, perhaps you would like to offer your solution? It is an Open Source project after all.
dm...@gmail.com <dm...@gmail.com> #62
It worked with 4.3!...
It's hard to believe it's so hard to know why it doen't work anymore.
And why the priority is qualified as "small"?
The Nexus 7 is a Google tablet, so, OK Android is an open source project, but the Nexus 7 costs something for buyers. And I bought it to use it. Not only at home.
I hope the people at Google don't try to prevent bluetooth tethering in order to sell more 3G models.
Sorry to have such thoughts...
It's hard to believe it's so hard to know why it doen't work anymore.
And why the priority is qualified as "small"?
The Nexus 7 is a Google tablet, so, OK Android is an open source project, but the Nexus 7 costs something for buyers. And I bought it to use it. Not only at home.
I hope the people at Google don't try to prevent bluetooth tethering in order to sell more 3G models.
Sorry to have such thoughts...
mi...@gmail.com <mi...@gmail.com> #63
#60, yes Android is an open source project and infact I gave to the Google team all suggestions for addressing the solution for this issue. They are taking too much time! We need the official firmware 4.4.x (not a custom ROM) able to work like the previous 4.3
no...@gmail.com <no...@gmail.com> #64
Hurry up Google I want VPN back...
ka...@gmail.com <ka...@gmail.com> #65
This is the only workaround I've found for this issue (which I'll admit upfront will be of no use to anyone without access to a WiFi network):
I've found that if you are able to connect to a WiFi network (even if that WiFi network doesn't have an outward internet connection) then connect to your phone using BlueVPN, you will be able to use your phone as the internet connection. I use my Nexus 7 (2012) at home, and my Nokia E71 phone is my only internet connection. To connect to the internet, I first connect to a WiFi network I've setup using an old WiFi router I had lying around (the WiFi router does not have an internet connection), then I use BlueVPN to connect to my phone. This essentially tricks my Nexus 7 into thinking that it is connected to the internet through the WiFi connection even though it's routing the data through the VPN (I'm sure there is a better technical explanation for this).
I hope this helps some of you!
I've found that if you are able to connect to a WiFi network (even if that WiFi network doesn't have an outward internet connection) then connect to your phone using BlueVPN, you will be able to use your phone as the internet connection. I use my Nexus 7 (2012) at home, and my Nokia E71 phone is my only internet connection. To connect to the internet, I first connect to a WiFi network I've setup using an old WiFi router I had lying around (the WiFi router does not have an internet connection), then I use BlueVPN to connect to my phone. This essentially tricks my Nexus 7 into thinking that it is connected to the internet through the WiFi connection even though it's routing the data through the VPN (I'm sure there is a better technical explanation for this).
I hope this helps some of you!
wa...@lps.u-psud.fr <wa...@lps.u-psud.fr> #66
#64, I tried your workaround, it works, thanx!
ja...@gmail.com <ja...@gmail.com> #67
So, if you have an inverter in your car, to powerer a wireless router, connect the tablet to the router, then tether the tablet to your phone via BlueVPN it works?
ja...@gmail.com <ja...@gmail.com> #68
Also, do you have to maintain the Wifi connection the whole time?
ka...@gmail.com <ka...@gmail.com> #69
[Comment deleted]
ka...@gmail.com <ka...@gmail.com> #70
#66 Yes, you need to maintain the wireless connection otherwise Android thinks you've disconnected.
You can either use an inverter or a really long extension cable from your house to power that router;)
You can either use an inverter or a really long extension cable from your house to power that router;)
mi...@gmail.com <mi...@gmail.com> #71
#64 if you have the wifi enabled and CONNECTED you will be able to use all applications with BlueVPN overcoming the limitations of Android NetworkInfo class:
https://code.google.com/p/android/issues/detail?id=33666
But if you are connected to a WiFi network you don't need BlueVPN!! So it is not a workaround
But if you are connected to a WiFi network you don't need BlueVPN!! So it is not a workaround
wa...@lps.u-psud.fr <wa...@lps.u-psud.fr> #72
#70, it is a workaround in the sense that you just need to connect to a wifi, even to a fake wifi
ja...@gmail.com <ja...@gmail.com> #73
I just tried this and it does not seem to work for me. I turned on my wireless router, connected to it with my Nexus 10, then connected to my LG Dare dumb phone with BlueVPN. I then tried to access a couple of web sites with chrome, and the google mail app, niether of which worked.
ja...@gmail.com <ja...@gmail.com> #74
Correction, it does work. I just did a factory reset on the old wireless modem, which seemed to correct the problem. It had been sitting on the shelf for about 3 years and I don't remember why I replaced it, but apparently I had something configured incorrectly. So now google chrome and gmail worked over VPN as long as the wifi is connected, even though there is no path to the internet over the wifi. Cool! Watch for this spoof to be corrected in then next Android update rollout.
bl...@gmail.com <bl...@gmail.com> #75
I'm going back to 4.3 this totally sucks. I knew I should not have updated to 4.4. I use BT VPN all the time.
dm...@gmail.com <dm...@gmail.com> #76
I think I'll do the same thing soon.
dm...@gmail.com <dm...@gmail.com> #77
Merry Christmas everybody! I put Android 4.4.3 on my list for Santa Claus. With the VPN issues solved. I hope to have it... :-)
dm...@gmail.com <dm...@gmail.com> #78
No new Kitkat for Christmas. I love Snickers bar so much... ;-)
jo...@googlemail.com <jo...@googlemail.com> #79
Please fix this! A lot of people had this bug
dm...@gmail.com <dm...@gmail.com> #80
I can use my Nexus 7 2013 at work using WiFi thanks to Foxfi installed on my new Motorola Moto G. So now, I can wait quietly for the fixing in order to use BlueVPN again.
ea...@gmail.com <ea...@gmail.com> #81
Same problem, tried 3 VPN Android Apps (different Providers) using OpenVPN protocol; the connection is established, seems like IP is also assigned after handshake, but no in/out packets, i.e. no traffic at all.
Running HTC One Android 4.4 KitKat, kernel 3.4.x Temporarily I am using L2TP/IPSec PSK but then if it disconnects (during call, etc) there is no Kill-Switch, and Android's Always ON option for PPTP/L2TP required Static IP.
Really do not want to revert back to 4.3 ........... please solve this issue by issuing a patch! This is simply ridiculous Google.
Running HTC One Android 4.4 KitKat, kernel 3.4.x Temporarily I am using L2TP/IPSec PSK but then if it disconnects (during call, etc) there is no Kill-Switch, and Android's Always ON option for PPTP/L2TP required Static IP.
Really do not want to revert back to 4.3 ........... please solve this issue by issuing a patch! This is simply ridiculous Google.
dm...@gmail.com <dm...@gmail.com> #82
Have you tried to use Foxfi with wifi connection?
It works.
It works.
mi...@gmail.com <mi...@gmail.com> #83
#81 This issue is not related to the WiFi tethering but to the VPN connections.
dm...@gmail.com <dm...@gmail.com> #84
Sorry. I forgot it.
But as I used BlueVPN just to connect the Nexus 7 to the Internet, I thought some of the people here could be interested.
But as I used BlueVPN just to connect the Nexus 7 to the Internet, I thought some of the people here could be interested.
em...@gmail.com <em...@gmail.com> #85
Recently bought a Nexus 10, "what a mistaka du maka" after update, No Vpn, no delete on quickoffice, no sync for my Outlook notebook. having been a Windows devotee all my computing life, don't like the layout of email or skype. Unless I see a working update soon, it's headed for the skip, it does not do what I bought it for, despite the sales blurb, so it will be no loss. Perhaps I should have bought the windows tablet!
or...@gmail.com <or...@gmail.com> #86
if it ain't broke, don't mess with it. looking forward to use my bluevpn soon, hurry up google please..
ja...@gmail.com <ja...@gmail.com> #87
Just got back from a road trip. I had to drag along my spare wireless router to enable my VPN connection. Kind of a PITA. I do enjoy that all the apps work, like maps, and email, instead of only being able to use chrome when using blueVPN w/o a WiFi connected. So Google was rolling out updates every other day before Christmas. Are they back at work yet?
gh...@gmail.com <gh...@gmail.com> #88
This is bad! Open Garden is affected too. The VPN in KitKat doesn't get packets if there is no other interface up.
The multiuser VPN feature isn't worth breaking all these users of existing apps!
The multiuser VPN feature isn't worth breaking all these users of existing apps!
wa...@gmail.com <wa...@gmail.com> #89
#87, I would argue this is a different bug that deserves it's own report. It is another manifestation of the underlying design decisions, but it appears the design change had some rather severe unintended consequences.
In the new design, local sockets are being bound to the active interface and then the code is using the iptables MASQUERADE target to remap the source address to the VPN's IP address. If there's no active interface then there will be nothing to which to bind.
In the new design, local sockets are being bound to the active interface and then the code is using the iptables MASQUERADE target to remap the source address to the VPN's IP address. If there's no active interface then there will be nothing to which to bind.
gh...@gmail.com <gh...@gmail.com> #90
Filed #64609
mi...@gmail.com <mi...@gmail.com> #91
#88 / #89
This is already discussed in #63660
The new behaviour introduces issues because if the phone is connected to the 3G mobile interface with VPN and it switches to the wifi network, the VPN connection will be lost!!
This is already discussed in #63660
The new behaviour introduces issues because if the phone is connected to the 3G mobile interface with VPN and it switches to the wifi network, the VPN connection will be lost!!
sk...@gmail.com <sk...@gmail.com> #92
Is this problem fixed now?
ct...@gmail.com <ct...@gmail.com> #93
No the problem is not fixed. I am having the same issues using 4.4.2 and EasyTether Tablet 0.9.3. The workaround is the same as mentioned above for BlueVPN by connecting to a wifi network without Internet connectivity. I can manage to generate one on my phone that won't share my Internet connection but then it kills my battery even faster.
xs...@gmail.com <xs...@gmail.com> #94
BlueVPN very good programm and it didnt work on 4.4.2 (((
ma...@gmail.com <ma...@gmail.com> #95
Okay Google, fix this problem so my Bluevpn app will work again.
m....@gmail.com <m....@gmail.com> #96
Google really have got it wrong with this latest update, I don't think there are any users which aren't affected negatively in some way!
se...@gmail.com <se...@gmail.com> #97
We are waiting for you.... Please accelerate....
ct...@gmail.com <ct...@gmail.com> #98
Downgraded to 4.3 in the meantime, still not perfect, some individual apps seem to have followed Google's lead: Of those that I tried, Facebook, Twitter, and WUnderground all seem to now not accept a network connection via bluetooth, annoyingly. Please fix this and suggest to app developers to continue allowing internet connections via BT.
li...@gmail.com <li...@gmail.com> #99
HTC fixed this issue on android 4.4.2 in official sense build on my HTC ONE :)
mi...@gmail.com <mi...@gmail.com> #100
Google developers seem not care about this problem.
I hope HTC, Samsung, Asus and other tablet manufacturers will take into consideration these VPN issues in their new customized KitKat versions so that users can choose alternative devices to purchase in place of the official Nexus devices
I hope HTC, Samsung, Asus and other tablet manufacturers will take into consideration these VPN issues in their new customized KitKat versions so that users can choose alternative devices to purchase in place of the official Nexus devices
mi...@gmail.com <mi...@gmail.com> #101
#98 in 4.3 version you can use alternative apps (like Aqua mail instead of GMail) or access via web pages; while in 4.4.x versions there is no chance to access the internet
go...@nooblet.org <go...@nooblet.org> #102
#99 -- Samsung have not fixed this issue in Kitkat 4.4 for Samsung Note 3
di...@gmail.com <di...@gmail.com> #103
[Comment deleted]
di...@gmail.com <di...@gmail.com> #104
#101 -- If you are on 4.4.2, please try to shut down your Note 3, take out your battery for a minute, set it back and turn your device on. It works for both my VPN services I'm using, a manually configured L2TP/IPsec VPN setting and an app based VPN (tunnelbear).
go...@nooblet.org <go...@nooblet.org> #105
Yes, rebooting the phone does allow VPN to work .... once.
If I change connection (wifi -> mobile) it will stop working again.
If I change connection (wifi -> mobile) it will stop working again.
mi...@gmail.com <mi...@gmail.com> #106
The VPN connection is strictly related to the network type (since the last updates Android 4.4.* ); if the phones switches from wifi to mobile or the contrary, the connection will be dropped.
See the issue: VPN TCP connections do not survive interface roams on KitKat:
https://code.google.com/p/android/issues/detail?id=63660
This is an important issue, but Google seems not care about it!
See the issue: VPN TCP connections do not survive interface roams on KitKat:
This is an important issue, but Google seems not care about it!
go...@nooblet.org <go...@nooblet.org> #107
Is that by design now?
It reconnects okay, but it no longer adds the routes required for connectivity over the VPN.
It reconnects okay, but it no longer adds the routes required for connectivity over the VPN.
re...@gmail.com <re...@gmail.com> #108
Same problem here stock Samsung note 3 KitKat
al...@gmail.com <al...@gmail.com> #109
Well it's sad I'm having the same problem and can't get the fix..
We all need help..
I live in China since need my vpn..
Old get a fix soon
We all need help..
I live in China since need my vpn..
Old get a fix soon
yd...@gmail.com <yd...@gmail.com> #110
fix it please. !!
Note 3 4.4.2 kitkat
Note 3 4.4.2 kitkat
[Deleted User] <[Deleted User]> #111
Same problem on Nexus 7 2013
Please, fix it! =(
Please, fix it! =(
sk...@gmail.com <sk...@gmail.com> #112
Hi all,
there are three route items for ppp0 when the VPN of phone works well as following,
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 ppp0
0.0.0.0 10.40.208.38 0.0.0.0 UG 0 0 0 rmnet_usb0
10.40.208.36 0.0.0.0 255.255.255.252 U 0 0 0 rmnet_usb0
10.40.208.38 0.0.0.0 255.255.255.255 UH 0 0 0 rmnet_usb0
128.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 ppp0
172.16.38.1 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
210.22.70.3 10.40.208.38 255.255.255.255 UGH 0 0 0 rmnet_usb0
210.22.84.3 10.40.208.38 255.255.255.255 UGH 0 0 0 rmnet_usb0
but there are less two for the phone with problem,
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
172.16.38.1 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0
192.168.1.0 0.0.0.0 255.255.255.0 U 322 0 0 wlan0
192.168.1.1 0.0.0.0 255.255.255.255 UH 0 0 0 wlan0
Anyone know why there are less two for ppp0?
there are three route items for ppp0 when the VPN of phone works well as following,
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 ppp0
0.0.0.0 10.40.208.38 0.0.0.0 UG 0 0 0 rmnet_usb0
10.40.208.36 0.0.0.0 255.255.255.252 U 0 0 0 rmnet_usb0
10.40.208.38 0.0.0.0 255.255.255.255 UH 0 0 0 rmnet_usb0
128.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 ppp0
172.16.38.1 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
210.22.70.3 10.40.208.38 255.255.255.255 UGH 0 0 0 rmnet_usb0
210.22.84.3 10.40.208.38 255.255.255.255 UGH 0 0 0 rmnet_usb0
but there are less two for the phone with problem,
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
172.16.38.1 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0
192.168.1.0 0.0.0.0 255.255.255.0 U 322 0 0 wlan0
192.168.1.1 0.0.0.0 255.255.255.255 UH 0 0 0 wlan0
Anyone know why there are less two for ppp0?
rg...@google.com <rg...@google.com> #113
In #111 you are comparing JB phone with K phone. If you look at ip rules you can see that packets with a certain mark are sent to a different routing table (often 60 or 61) which contains the default route for the ppp0 interface. This part is working as intended.
mi...@gmail.com <mi...@gmail.com> #114
The mark for a specific interface is correct when you have a single network type; but what happen if the device automatically switches from the wifi network to the 3G/4G or the contrary?
The VPN packets (tun0 interface) are not more routed to the proper channel.
If this part is working as intended then this behaviour is NOT FLEXIBLE and it is a regression respect to the previous versions.
When you introduce a main change in the system operator you should keep the compatibility for the high level applications or give a workaround to allow them to work in the new environment. This is a basic principle! The development of a complex application requires lot of time, money and resources. With the new VPN module you stop the functionalities of many applications and it is very unfair respect to the work of developers.
The advantage of Android compared to the iOS or Window 8 systems was the high implementation flexibility but, version after version, you are reducing these freedom margins for the developers. This policy will encourage the developers to reconsider their choices and to move toward other open source system operators.
The VPN packets (tun0 interface) are not more routed to the proper channel.
If this part is working as intended then this behaviour is NOT FLEXIBLE and it is a regression respect to the previous versions.
When you introduce a main change in the system operator you should keep the compatibility for the high level applications or give a workaround to allow them to work in the new environment. This is a basic principle! The development of a complex application requires lot of time, money and resources. With the new VPN module you stop the functionalities of many applications and it is very unfair respect to the work of developers.
The advantage of Android compared to the iOS or Window 8 systems was the high implementation flexibility but, version after version, you are reducing these freedom margins for the developers. This policy will encourage the developers to reconsider their choices and to move toward other open source system operators.
mi...@gmail.com <mi...@gmail.com> #115
In com.android.server.connectivity.Vpn.java you have replaced inside the method
public synchronized ParcelFileDescriptor establish(VpnConfig config)
the native call
4.3:
jniSetRoutes(interfaze, config.routes);
with
4.4:
mCallback.setRoutes(interfaze, config.routes);
[ com.android.server.ConnectivityService.VpnCallback mCallback ]
This is method "setRoutes" of ConnectivityService.VpnCallback class
public void setRoutes(String interfaze, List<RouteInfo> routes) {
for (RouteInfo route : routes) {
try {
// android.os.INetworkManagementService mNetd
mNetd.setMarkedForwardingRoute(interfaze, route);
} catch (RemoteException e) {
}
}
}
This is WRONG!! It should call
mNetd.addRoute(interfaze, route);
in place of
mNetd.setMarkedForwardingRoute(interfaze, route);
HOW MANY TIME DO YOU TAKE TO MAKE THIS SIMPLE CHANGE??
public synchronized ParcelFileDescriptor establish(VpnConfig config)
the native call
4.3:
jniSetRoutes(interfaze, config.routes);
with
4.4:
mCallback.setRoutes(interfaze, config.routes);
[ com.android.server.ConnectivityService.VpnCallback mCallback ]
This is method "setRoutes" of ConnectivityService.VpnCallback class
public void setRoutes(String interfaze, List<RouteInfo> routes) {
for (RouteInfo route : routes) {
try {
// android.os.INetworkManagementService mNetd
mNetd.setMarkedForwardingRoute(interfaze, route);
} catch (RemoteException e) {
}
}
}
This is WRONG!! It should call
mNetd.addRoute(interfaze, route);
in place of
mNetd.setMarkedForwardingRoute(interfaze, route);
HOW MANY TIME DO YOU TAKE TO MAKE THIS SIMPLE CHANGE??
go...@nooblet.org <go...@nooblet.org> #116
#114 .. Mirko you are barking up the wrong tree.
KitKit 4.4 no longer adds routes to the main table. Instead they get added to a seperate table, packets get marked, and a rule is placed to send marked packets to the new table. That is why the function is different, but doesn't explain why it isn't working.
KitKit 4.4 no longer adds routes to the main table. Instead they get added to a seperate table, packets get marked, and a rule is placed to send marked packets to the new table. That is why the function is different, but doesn't explain why it isn't working.
mi...@gmail.com <mi...@gmail.com> #117
#115: Why it is not possible to give the developers the freedom of choosing if use the main routing table or separate tables for VPN packets? How can we keep the compatibility with previous versions (JB, ICS)?
mi...@gmail.com <mi...@gmail.com> #118
#115
I think using policy routing based on marks may cause problems, unless the Linux kernel has been modified. Because in a vanilla kernel the routing decisions for locally generated traffic are made before it is possible to mark the packets in iptables, AFAIK. As a consequence the routing decisions will be based on the main routing table, which will cause problems in some scenarios, for example when there is no default route in the main table. (Think ipv6 tunneled in ipv4.)
I think using policy routing based on marks may cause problems, unless the Linux kernel has been modified. Because in a vanilla kernel the routing decisions for locally generated traffic are made before it is possible to mark the packets in iptables, AFAIK. As a consequence the routing decisions will be based on the main routing table, which will cause problems in some scenarios, for example when there is no default route in the main table. (Think ipv6 tunneled in ipv4.)
go...@nooblet.org <go...@nooblet.org> #119
#117
The mangle table has an OUTGOING chain for locally generated traffic. Packets marked here will be matched with "ip rule" the same an vanilla linux (or at least Debian in my experience). The source address however would of already been determined and an extra SNAT/MASQUERADE rule would be required to complete the setup.
Unfortunately the only phone I have with KitKat is a Note 3 and with the KNOX-WARRANTY-VOID flag being triggered by rooting I am unable to check the particulars of how KitKat sets up iptables.
The mangle table has an OUTGOING chain for locally generated traffic. Packets marked here will be matched with "ip rule" the same an vanilla linux (or at least Debian in my experience). The source address however would of already been determined and an extra SNAT/MASQUERADE rule would be required to complete the setup.
Unfortunately the only phone I have with KitKat is a Note 3 and with the KNOX-WARRANTY-VOID flag being triggered by rooting I am unable to check the particulars of how KitKat sets up iptables.
mi...@gmail.com <mi...@gmail.com> #120
#118
Yes, MASQUERADE is used in the way you describe in the POSTROUTING chain in the IPv4 nat table. But it doesn't work for all scenarios. For example it doesn't allow the VPN app to tunnel IPv6 over an IPv4 network, unless the device already have IPv6 access. (It works on android 4.3 without local IPv6 access.) Without IPv6 access the main routing table won't contain any usable route, it only contains a host route to the device itself. And without a usable route it obviously can't select a source address:
# ping6www.kame.net
connect: Network is unreachable
After adding a default route, things improve:
# ip -6 r a ::/0 dev tun0
# ping6www.kame.net
PINGwww.kame.net (2001:200:dff:fff1:216:3eff:feb1:44d7) 56 data bytes
From 2001::XXXX icmp_seq=1 Destination unreachable: Port unreachable
But there still is a blocking filter in st_filter_OUTPUT:
# ip6tables -L st_filter_OUTPUT
Chain st_filter_OUTPUT (1 references)
target prot opt source destination
REJECT all anywhere anywhere mark match 0x3d reject-with icmp6-port-unreachable
After flushing the st_filter_OUTPUT chain, I am start seeing packets at the remote side of the VPN tunnel. Unfortunately the packets are truncated:
IP6 truncated-ip6 - 40 bytes missing!2001::XXXX > 2001:200:dff:fff1:216:3eff:feb1:44d7: ICMP6, echo request, seq 2, length 64
Tested with Strongswan version 1.3.3 from Google Play Store. Remote end uses Strongswan version 5.0.4 with Linux kernel 3.8.12.
Yes, MASQUERADE is used in the way you describe in the POSTROUTING chain in the IPv4 nat table. But it doesn't work for all scenarios. For example it doesn't allow the VPN app to tunnel IPv6 over an IPv4 network, unless the device already have IPv6 access. (It works on android 4.3 without local IPv6 access.) Without IPv6 access the main routing table won't contain any usable route, it only contains a host route to the device itself. And without a usable route it obviously can't select a source address:
# ping6
connect: Network is unreachable
After adding a default route, things improve:
# ip -6 r a ::/0 dev tun0
# ping6
PING
From 2001::XXXX icmp_seq=1 Destination unreachable: Port unreachable
But there still is a blocking filter in st_filter_OUTPUT:
# ip6tables -L st_filter_OUTPUT
Chain st_filter_OUTPUT (1 references)
target prot opt source destination
REJECT all anywhere anywhere mark match 0x3d reject-with icmp6-port-unreachable
After flushing the st_filter_OUTPUT chain, I am start seeing packets at the remote side of the VPN tunnel. Unfortunately the packets are truncated:
IP6 truncated-ip6 - 40 bytes missing!2001::XXXX > 2001:200:dff:fff1:216:3eff:feb1:44d7: ICMP6, echo request, seq 2, length 64
Tested with Strongswan version 1.3.3 from Google Play Store. Remote end uses Strongswan version 5.0.4 with Linux kernel 3.8.12.
sh...@gmail.com <sh...@gmail.com> #121
google, fix it!
sm...@google.com <sm...@google.com> #122
Add me to the list of those for whom this still doesn't work after the 4.4.2 upgrade (on my Verizon Moto X). That's a shame; I'd really been hoping this functionality would come back, as I use it all the time. That is, I *used* to. :-(
I hope this gets fixed, and rolled out, soon.
I hope this gets fixed, and rolled out, soon.
go...@nooblet.org <go...@nooblet.org> #123
I've had to swap my Note 3 for my wifes iPhone in order to get mobile access to the work VPN. This is stupid. 3 months later and Google continue to ignore such an important issue. My patience has been depleted, I no longer trust Google as a brand simply because of this issue.
iz...@gmail.com <iz...@gmail.com> #124
Any fix for this issue yet?
Still not working even with the latest firmware update on Note 3.
Still not working even with the latest firmware update on Note 3.
sk...@gmail.com <sk...@gmail.com> #125
hi all,
My bug is fixed.
Only vendor code is changed for fixing this issue. Google change the policy of the AP code, so vender code need change correspondingly.
My bug is fixed.
Only vendor code is changed for fixing this issue. Google change the policy of the AP code, so vender code need change correspondingly.
or...@gmail.com <or...@gmail.com> #126
#124
How do we change the vender code ?
How do we change the vender code ?
ma...@gmail.com <ma...@gmail.com> #127
I too have this issue in my nexus 4, I can't connect by vpn :(
je...@gmail.com <je...@gmail.com> #128
is google even listening to this? It has been a long time for such a critical feature.
hu...@gmail.com <hu...@gmail.com> #129
Come on Google, do something!
cc...@gmail.com <cc...@gmail.com> #130
Google! No ad hoc wifi, no BT tethering...
Company that dosnt listem to customers is going down!
My Nexus 7 2013 is not mobile at all!
IF you are not going to solve those problems,my next tablet will have iOS onboard!
Company that dosnt listem to customers is going down!
My Nexus 7 2013 is not mobile at all!
IF you are not going to solve those problems,my next tablet will have iOS onboard!
st...@gmail.com <st...@gmail.com> #131
it's fucking shit! reduced my galaxy note 3 investment to a pile of wank. now i have to figure out how to downgrade. living in china my door to the outside world is now shut. thanks a bunnch google.
st...@gmail.com <st...@gmail.com> #132
back to the old version. i thought 4.4 was very cool - much faster. now i know why. basically its because it does fuck all. the network functionality and connectivity is non-existent - that's a battery saver for sure. might try a future upgrade but for now my hardware functionality is worth far more than your shitty update.
vd...@gmail.com <vd...@gmail.com> #133
At first I had no idee that the last system_update issues my VPN connection. Normally I acces my VPN through 3G or WIFI. At the moment I found out that KitKAt upgrade causes out of control MTU. So my packetloss are allmost 100%
Now I can`t acces through 3G or WIFI my VPN connection.
SO GOOGLE -> FIX this!
Now I can`t acces through 3G or WIFI my VPN connection.
SO GOOGLE -> FIX this!
or...@gmail.com <or...@gmail.com> #134
This thread reminds me, one of the Michael Jackson's song "they don't care about us"
mi...@gmail.com <mi...@gmail.com> #135
I've removed my application BlueVPN from the Google Play Store to avoid negative comments from users.
THANK YOU SO MUCH GOOGLE!!
THANK YOU SO MUCH GOOGLE!!
or...@gmail.com <or...@gmail.com> #136
mirko,
where can we track any of your updates from now on ?
where can we track any of your updates from now on ?
go...@nooblet.org <go...@nooblet.org> #137
mirko, why not just restrict the app to 4.3 or below?
mi...@gmail.com <mi...@gmail.com> #138
#136 I had explicitely indicated the limitations of the BlueVPN app with Android 4.4 on the Google Play store and I had asked users to avoid negative comments about this fact. Despite this alert, the evaluation of the app was continuosly decreasing due to unfair and spam comments. If Google will solve the issue with Android 4.4 I'll be happy to republish BlueVPN on the market, including the updates.
st...@gmail.com <st...@gmail.com> #139
Another bump to motivate Google to fix this issue.
sw...@gmail.com <sw...@gmail.com> #140
Google... "is there anybody even in there?...
rg...@google.com <rg...@google.com> #141
A number of bugs introduced in K are fixed and should be available in the next release.
Mirko is obviously not doing anything wrong and I'm sorry for the unfair comments he's received. Unfortunately this issue was reported too late to get fixed in 4.4.2 (release Dec 9th) and the next release hasn't come yet. We're trying to fix the whole in our VPN testing so this doesn't happen again.
Mirko is obviously not doing anything wrong and I'm sorry for the unfair comments he's received. Unfortunately this issue was reported too late to get fixed in 4.4.2 (release Dec 9th) and the next release hasn't come yet. We're trying to fix the whole in our VPN testing so this doesn't happen again.
mi...@gmail.com <mi...@gmail.com> #142
Thank you Robert for the update: we are looking forward for the new Kit Kat version and we hope it will fix the VPN issue so that the app BlueVPN can be available again for the many users who need it for internet connection through the bluetooth tethering
vo...@gmail.com <vo...@gmail.com> #143
and another month goes by
ti...@gmail.com <ti...@gmail.com> #144
Some delays in the new Kitkat 4.4.3? I have been waiting for several months now. Where is it?
sw...@gmail.com <sw...@gmail.com> #145
[Comment deleted]
mi...@gmail.com <mi...@gmail.com> #146
This issue is painful for those of us that frequently use VPN on Android. Please fix! Galaxy Note 3 on Tmobile no longer works with VPN.
ka...@gmail.com <ka...@gmail.com> #147
Google please FIX IT !
ar...@gmail.com <ar...@gmail.com> #148
Note Pro SM-P905 KitKat 4.4.2 none VPN apps wokrs - please FIX IT.
mi...@gmail.com <mi...@gmail.com> #149
Is it possible to test the 4.4.3 version before it is released officially? I'm afraid that if the VPN issue hasn't been fixed we need to wait long time for the next release.
ju...@gmail.com <ju...@gmail.com> #150
I'm also having this issue with VpnService. I have an app that uses it and works fine in devices < 4.4. Another thing I noticed was that the VpnService works fine in WIFI and my app sees traffic, but on cellular, my app sees nothing. Routing table doesn't show the tun in >=4.4 devices, but it does in < 4.4.
ni...@gmail.com <ni...@gmail.com> #151
I'm facing the same issue with my Note 3 N9005. I hope that Google can fix it
am...@gmail.com <am...@gmail.com> #152
Would love to have this fixed so I can run a Kit Kat Rom
ro...@gmail.com <ro...@gmail.com> #153
I'm having the same issue on my AT&T note 3 on kit kat 4.2.2. When is the next release coming out?
ro...@gmail.com <ro...@gmail.com> #154
Oops I meant 4.4.2
ju...@gmail.com <ju...@gmail.com> #155
Does 4.4.3 address the issue? Anybody with 4.4.3 installed around?
sh...@gmail.com <sh...@gmail.com> #157
[Comment deleted]
sh...@gmail.com <sh...@gmail.com> #158
dont work on 4.4.3
te...@gmail.com <te...@gmail.com> #159
The problem persists, it wasn't fixed on 4.4.3...Long time for nothing, we need the fix, when I'm connect to vpn, My nexus 4 lose Data connection.
go...@gmail.com <go...@gmail.com> #160
4.4.3 on my Nexus 10, and I've confirmed this is still broken. Who is running the QA department at Google? I'd like to hear directly from they why they think it is a good idea to have a security feature that worked perfectly in 4.3 be 100% broken in 4.4.0, 4.4.1, 4.4.2, and 4.4.3. I'm extremely unimpressed, and IMHO, this is inexcusable. 4.4.0 == Fail. 4.4.1 == Fail. 4.4.2 == Fail. 4.4.3 == Fail. KitKat == Fail. Can we realistically expect this to be fixed in the future? Give us something tangible: release versions and release dates.
te...@gmail.com <te...@gmail.com> #161
I want a fix soon because it's important for some people use VPN networks, You promised that in 4.4.3 it will fix and now 4.4.3 is release and it's is still broken... What happen google?
sv...@gmail.com <sv...@gmail.com> #162
[Comment deleted]
sv...@gmail.com <sv...@gmail.com> #163
Mirko, the creator of the app BlueVNP: What do you say, do you have to update the app before it can run 4.4.3?
kr...@gmail.com <kr...@gmail.com> #164
4.4.3 hasn't fixed OpenVPN + Wifi tethering for me, either. I made sure to reset my iptables to defaults.
Using Astrill VPN app, Omnirom 4.4, and a Nexus 5
Using Astrill VPN app, Omnirom 4.4, and a Nexus 5
mi...@gmail.com <mi...@gmail.com> #165
The VPN behaviour with Android 4.4.3 seems the same of previous Kit Kat versions.
I'll take a look to the new Android source code to understand if Google developers have performed any change on the VPN module or simply they changed the version number!
I'll take a look to the new Android source code to understand if Google developers have performed any change on the VPN module or simply they changed the version number!
da...@gmail.com <da...@gmail.com> #166
Nexus 7, 1st gen. VPN not connected.
Until the release ver. 4.4.3 - no that issue.
It seems starts for me, only _after_ install 4.4.3
Until the release ver. 4.4.3 - no that issue.
It seems starts for me, only _after_ install 4.4.3
sa...@gmail.com <sa...@gmail.com> #167
Connecting internet through bluevpn on N7 2012 with the help of an inactive WiFi instance..please let me know whether this connectivity too is broken by 4.4.3
al...@gmail.com <al...@gmail.com> #168
UFB. Still broken on both my N5 and N7. Extremely disappointed and a little worried about the general level of competence.
de...@gmail.com <de...@gmail.com> #169
Can't believe they did not fix this issue with the 4.4.3 update
What's wrong with google? Do they even read this?
How is it possible that they don't know that vpn doesn't work since kitkat release??!
What's wrong with google? Do they even read this?
How is it possible that they don't know that vpn doesn't work since kitkat release??!
ka...@gmail.com <ka...@gmail.com> #170
Nexus 7 updated...
And it doesn't work.
Mirko wrote a great, useful application I'd like to run properly again.
G O O G L E ? D O Y O U R E A D U S ?
P L E A S E F I X I T !
And it doesn't work.
Mirko wrote a great, useful application I'd like to run properly again.
G O O G L E ? D O Y O U R E A D U S ?
P L E A S E F I X I T !
sv...@gmail.com <sv...@gmail.com> #171
We have waited so long for the update to come, since december 2013, for bluetooth/vnp issues. And when it finally came: same problem despite promise from the Google-projektmember Robert above.
Robert, what went wrong ? Please answer the question.
Robert, what went wrong ? Please answer the question.
cb...@gmail.com <cb...@gmail.com> #172
VPN not connected in my Nexus 5. Release version 4.4.3
But it works on 4.4.2
Any solutions......
But it works on 4.4.2
Any solutions......
ja...@greyman.us <ja...@greyman.us> #173
Glad I bought this Nexus 7 (2013) just now so that I can't use ad hoc networks or VPN... so all of us in Iraq and other places can't download any decent apps :/ should have bought an iPhone? Not impressive at all to those of us that are giving Android another chance after many years of iOS.
ba...@gmail.com <ba...@gmail.com> #174
I just want to be another squeaking wheel about this issue.
Now more than ever VPN from our phones is neccessary to secure personal data and resist espionage. Please patcth this.
HTC One M8 on ATT
Android 4.4.3
OpenVPN client connects but nothing loads.
Now more than ever VPN from our phones is neccessary to secure personal data and resist espionage. Please patcth this.
HTC One M8 on ATT
Android 4.4.3
OpenVPN client connects but nothing loads.
sh...@gmail.com <sh...@gmail.com> #175
4.4.4 not fixed.
One people from rus portal 4pda say me, that bluevpn work in LATEST nightly cynanogen mod for FLO based on 4.4.3 (nexus 7 2013 wifi). Not tested yet.
One people from rus portal 4pda say me, that bluevpn work in LATEST nightly cynanogen mod for FLO based on 4.4.3 (nexus 7 2013 wifi). Not tested yet.
re...@live.com <re...@live.com> #176
Nexus 4 Always on VPN feature is broken from 4.4 to 4.4.3.
Although there is icon and message shows Always on VPN is connected but usable VPN connection can only establish by disable always on vpn feature then connect vpn manually.
About few hours ago my Nexus 4 running on 4.3, Always on VPN feature never had problem.
Although there is icon and message shows Always on VPN is connected but usable VPN connection can only establish by disable always on vpn feature then connect vpn manually.
About few hours ago my Nexus 4 running on 4.3, Always on VPN feature never had problem.
my...@gmail.com <my...@gmail.com> #177
Please fix VPN issue in kit Kat, vpn is essential for work. Damn this, I should have never upgraded to kit Kat. Now I need to switch to iPhone. At least provide a way for people to downgrade back to 4.2
ch...@gmail.com <ch...@gmail.com> #178
Damn ... update to KK ... wrong decision. But I don't know why the people get exalted, this is nothing new. Google forgot their users, how many post to suggest Google make changes in android and nothing happen, like the USSD API ... take it easy and develop to another platform ...
am...@gmail.com <am...@gmail.com> #179
I downgraded Nexus7 from 4.4.3 to 4.3. Good by KitKat.
te...@gmail.com <te...@gmail.com> #180
I am come back to 4.3. I would like to have 4.4.4 but Google did not fix this issue on my Nexus 4/ Nexus7
my...@gmail.com <my...@gmail.com> #181
Please fix vpn issue or give us a roll back.
ig...@gmail.com <ig...@gmail.com> #182
Well this issue has been around since November and despite different updates to KitKat, Google hasn't fixed it. What is this supposed to mean? Can't they see this or they did it on purpose? Probably working with the NSA...Screw them
in...@gmail.com <in...@gmail.com> #183
The issue persist on android 4.4.4?, I returned to 4.3 on my nexus 10, I want to know if I can update to 4.4.4
da...@gmail.com <da...@gmail.com> #184
4.4.4 n7 (2012) same issue:VPN not connected
my...@gmail.com <my...@gmail.com> #185
Is this issue fix yet?
HTC DNA Verizon.
HTC DNA Verizon.
re...@live.com <re...@live.com> #186
Nexus 4 OTA 4.4.4 Always on VPN feature still broken as 4.4\4.4.2\4.4.3
VPN feature only works when set Always on VPN feature as None and connect manually.
When set Always on VPN on,there are icons and message shows up and tell Always on VPN is connected but I cant browse any blocked site.
VPN feature only works when set Always on VPN feature as None and connect manually.
When set Always on VPN on,there are icons and message shows up and tell Always on VPN is connected but I cant browse any blocked site.
mi...@gmail.com <mi...@gmail.com> #187
The 4.4.4 still doesn't solve this VPN issue!!!!!
Google presented yesterday the new Android L with new features but if they don't fix the basic functions like the VPN I think lot of developers, manufacturers and also customers will move to different system operators.
Google are doing the same errors of Apple: version after version, Android is becoming a closed system operator without the possibility for the developers to improve the standard functionalities.
Google presented yesterday the new Android L with new features but if they don't fix the basic functions like the VPN I think lot of developers, manufacturers and also customers will move to different system operators.
Google are doing the same errors of Apple: version after version, Android is becoming a closed system operator without the possibility for the developers to improve the standard functionalities.
mi...@gmail.com <mi...@gmail.com> #188
This bug affects at least these popular applications:
Open Garden ( >1.000.000 installations ):
https://play.google.com/store/apps/details?id=com.opengarden.android.MeshClient
PDANET Tablet ( >500.000 installations ):
https://play.google.com/store/apps/details?id=com.pdanet.tablet2
BlueVPN / BlueVPN+ ( >150.000 installations ):
https://play.google.com/store/apps/details?id=com.blue_vpn
I suggest Robert to contact the authors of these application to find a solution for this issue as soon as possible.
Open Garden ( >1.000.000 installations ):
PDANET Tablet ( >500.000 installations ):
BlueVPN / BlueVPN+ ( >150.000 installations ):
I suggest Robert to contact the authors of these application to find a solution for this issue as soon as possible.
ka...@gmail.com <ka...@gmail.com> #189
4.4.4 installed... and it doesn't work.
Sorry Mirko...
Google ? WTF ? Qu'est-ce que vous branlez ?
Sorry Mirko...
Google ? WTF ? Qu'est-ce que vous branlez ?
my...@gmail.com <my...@gmail.com> #190
Are we there yet? Is this fix? HTC DNA
sw...@gmail.com <sw...@gmail.com> #191
Google, this is a racket. You have intentionally bugged the upgrades in effort to sell more nexus 4 and 5s. Apple like tactics,really?? Its trully sad that you all have blatantly ignored your supporters.
go...@gmail.com <go...@gmail.com> #192
Android L on my Nexus 7 (build LPV79), and it is still not fixed. Manually connecting to a VPN works. The "Always-on VPN" setting looks like it connects, but Wi-Fi is colored orange and none of the apps have internet connectivity. Google==Fail, again. Did Google get a NSL to intentionally break this? Is it illegal for Google to even comment on this?
ad...@gmail.com <ad...@gmail.com> #193
[Comment deleted]
ad...@gmail.com <ad...@gmail.com> #194
[Comment deleted]
ad...@gmail.com <ad...@gmail.com> #195
Hi I'm a developer of an app with >150.000 installations and I have this problem, Robert can help us, please??
li...@gmail.com <li...@gmail.com> #196
Please solve the BT problem! I need the BT Vpn urgently on my Nexus 7 2012.
ja...@gmail.com <ja...@gmail.com> #197
Mirko, I just got your new version automatically installed this morning, and now the WiFi router work around no longer works. I'm camping and was successfully using it until last night to connect to the internet, until the new version of blueVPN got installed. Now it won't even let me try to run it. It just gives a warning that its incompatible with 4.4.4. Really? It was working until last night.
da...@gmail.com <da...@gmail.com> #198
Still broken in 4.4.4, this is ridiculous. I was going to buy a new android tablet but at this point, I might go with Microsoft.Please fix this Google.
c1...@gmail.com <c1...@gmail.com> #199
Hi,
bug still exists in Android L Build LPV79.
07-03 10:37:56.665: I/LegacyVpnRunner(620): Aborting
07-03 10:37:56.665: I/LegacyVpnRunner(620): java.lang.IllegalStateException: command '126 interface fwmark rule add ppp0' failed with '400 126 Failed to add fwmark rule (Success)'
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NetworkManagementService.setMarkedForwarding(NetworkManagementService.java:1656)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.ConnectivityService$VpnCallback.setMarkedForwarding(ConnectivityService.java:4164)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:1131)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:970)
07-03 10:37:56.665: I/LegacyVpnRunner(620): Caused by: com.android.server.NativeDaemonConnector$NativeDaemonFailureException: command '126 interface fwmark rule add ppp0' failed with '400 126 Failed to add fwmark rule (Success)'
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NativeDaemonConnector.execute(NativeDaemonConnector.java:427)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NativeDaemonConnector.executeForList(NativeDaemonConnector.java:363)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NativeDaemonConnector.execute(NativeDaemonConnector.java:328)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NetworkManagementService.setMarkedForwarding(NetworkManagementService.java:1654)
bug still exists in Android L Build LPV79.
07-03 10:37:56.665: I/LegacyVpnRunner(620): Aborting
07-03 10:37:56.665: I/LegacyVpnRunner(620): java.lang.IllegalStateException: command '126 interface fwmark rule add ppp0' failed with '400 126 Failed to add fwmark rule (Success)'
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NetworkManagementService.setMarkedForwarding(NetworkManagementService.java:1656)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.ConnectivityService$VpnCallback.setMarkedForwarding(ConnectivityService.java:4164)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:1131)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:970)
07-03 10:37:56.665: I/LegacyVpnRunner(620): Caused by: com.android.server.NativeDaemonConnector$NativeDaemonFailureException: command '126 interface fwmark rule add ppp0' failed with '400 126 Failed to add fwmark rule (Success)'
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NativeDaemonConnector.execute(NativeDaemonConnector.java:427)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NativeDaemonConnector.executeForList(NativeDaemonConnector.java:363)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NativeDaemonConnector.execute(NativeDaemonConnector.java:328)
07-03 10:37:56.665: I/LegacyVpnRunner(620): at com.android.server.NetworkManagementService.setMarkedForwarding(NetworkManagementService.java:1654)
mi...@gmail.com <mi...@gmail.com> #200
#196: you can continue to use the workaround with the new version I've just committed. Please wait automatic the upgrade from Google Play
zh...@gmail.com <zh...@gmail.com> #201
PLIZZZZZZZZZ!!!!!!!!!!!!VPN!!!!!!!!!!!!!!!
ya...@laguna.ua <ya...@laguna.ua> #202
I need to VPN!
dr...@gmail.com <dr...@gmail.com> #203
[Comment deleted]
dr...@gmail.com <dr...@gmail.com> #204
Is there any VPN app that uses its own stack/subsystem rather than relying on the buggy built-in one? Is this even possible to do?
ja...@gmail.com <ja...@gmail.com> #205
Mirko, got the update and now back in business. Thanks! This is such Bravo Sierra. Obviously google doesn't want this capability to exist.
ji...@gmail.com <ji...@gmail.com> #206
The upgrade to 4.4 should not be done. Everything works fine before but for me the most important bluevpn+ application does not work any more!!!!!! Do someone know how to get back the previous version of andrlid? Otherwise I will return my Asus back to the shop and thin about other device. Definitely not with green roboter.
br...@gmail.com <br...@gmail.com> #208
I just bought an iPad Mini which can connect through VPN and Adhoc which Android 4.4.4 can't and that's why I am not buying anymore Android OS devices. Bye, Bye Google!
dm...@gmail.com <dm...@gmail.com> #209
I am also considering to chenge my nexus 7 to ipad mini, will be happy to say good buy to google and android, as it is just the waste of time. Sucs! No ad hoc, no vpn! Shame on U
wa...@gmail.com <wa...@gmail.com> #210
Is there any progress on this issue?
sa...@swissunique.ch <sa...@swissunique.ch> #211
Please fix soon, thanks!
rv...@gmail.com <rv...@gmail.com> #212
Please fix!!!! Internet connections everywhere is a very basic feature!!! And this bug + the missing ad hoc support tells me android is a bad for tablets!!!
pr...@gmail.com <pr...@gmail.com> #213
What is workaround Mirko wrote in 196? I have 2.6 installed and Google Play don't have upgrade for my Nexus10.
mi...@gmail.com <mi...@gmail.com> #214
These are the consequences of the "slow" Google support:
- many customers are changing the device ( with different operating system )
- many users are doing the downgrade to version 4.3
- the 90% of Apple devices have passed to the latest release iOS7 while only 19% of Android devices are updated to 4.4.*
After 230 days and 4 minor revisions (4.4.1, 4.4.2, 4.4.3, 4.4.4) they have not yet solved the VPN issue. I think it was sufficient going back to the 4.3 code, but simple solutions are not considered by Google's developers!
- many customers are changing the device ( with different operating system )
- many users are doing the downgrade to version 4.3
- the 90% of Apple devices have passed to the latest release iOS7 while only 19% of Android devices are updated to 4.4.*
After 230 days and 4 minor revisions (4.4.1, 4.4.2, 4.4.3, 4.4.4) they have not yet solved the VPN issue. I think it was sufficient going back to the 4.3 code, but simple solutions are not considered by Google's developers!
wi...@gmail.com <wi...@gmail.com> #215
Why is this defect marked as "Closed"? I suspect that this is not showing up for Google anymore despite the status of "FutureRelease". Or maybe "Closed" doesn't mean closed? Please help me understand...
my...@gmail.com <my...@gmail.com> #216
Fix yet?... are we there yet? Come on people.... get this going!!!!
my...@gmail.com <my...@gmail.com> #217
There yet?!.. Fixed?
th...@gmail.com <th...@gmail.com> #218
I changed to cyanogenmod, and bought bluevpn+ to get it working again. but it seems the issue is not fixed yet. even if the tun.ko module exists in cyanogen, the connection did not work.
Before that it was just embarassing, that a vpn did not work without a wifi detected concurrently, but now it's just sad. how difficult is it to make this work?
Before that it was just embarassing, that a vpn did not work without a wifi detected concurrently, but now it's just sad. how difficult is it to make this work?
gr...@gmail.com <gr...@gmail.com> #220
Google, please. Please fix this instead of pushing me to iPhone (where this works just fine).
[Deleted User] <[Deleted User]> #221
[Comment deleted]
[Deleted User] <[Deleted User]> #222
Please fix ASAP
gt...@gmail.com <gt...@gmail.com> #223
Please solve the VPN issue in Kit Kat
bo...@gmail.com <bo...@gmail.com> #224
Google & Mirko, please solve the issue of VPN connection regarding the 4.4 Android OS. I have a Nexus 7 2013 that is used by my son and this is why I can't reset it. With this app I will be able to connect a USB modem, without the need for tethering my phone that will lead the phone to fast discharge.
Best regards,
Bogdan.
Best regards,
Bogdan.
do...@gmail.com <do...@gmail.com> #225
Usally used app BlueVPN to establish a second Bluetooth connection for Internet, while my Samsung Galaxy Note 2 was logged into my VW Passat's hands-free equipment (Remote SIM).
Now switched to a Note 3 with 4.4.2. But though second BT (e.g. GPRS) connection is established, no data flow :-(
Now switched to a Note 3 with 4.4.2. But though second BT (e.g. GPRS) connection is established, no data flow :-(
yu...@pochta.ru <yu...@pochta.ru> #226
Удивительно, но похоже Google абсолютно не интересна эта проблема. А ведь это абсолютное не уважение к своим клиентам!
s....@gmail.com <s....@gmail.com> #227
Please solve the VPN issue in Kit Kat
ar...@gmail.com <ar...@gmail.com> #228
Pls does any one have a link for bluevpn version 2.5? It was working fine on mahdi ROM 4.4.3 until I updated to version 2.6
ch...@gmail.com <ch...@gmail.com> #229
Nine months and counting... It's very disappointing that after so much time Google still has not addressed this problem. Come on guys, please?
wa...@gmail.com <wa...@gmail.com> #230
I have a Motorola (Google) Droid with 4.4.4 . Is there any way to get Open garden to work on my phone so that I can use it to generate a hotspot?
an...@gmail.com <an...@gmail.com> #231
Help please,
I have nokia x2-02 and only this program can share internet to my asus tf700!
I have nokia x2-02 and only this program can share internet to my asus tf700!
[Deleted User] <[Deleted User]> #232
Same Problem with Kit kat on Xperiaz tablet SGP311. Please fix. Regards.
on...@gmail.com <on...@gmail.com> #233
...and me. Stock HTC One m8 v4.4.3
ke...@gmail.com <ke...@gmail.com> #234
Google fix this ASAP, I'll love to upgrade my galaxy tab 3 7.0" to KitKat but for this issue, as I don't have any other means of accessing internet
jw...@gmail.com <jw...@gmail.com> #235
[Comment deleted]
ru...@gmail.com <ru...@gmail.com> #236
Same problem with VPN in my Sony Xperia Tablet Z. Please solve It. Thanks.
va...@siol.net <va...@siol.net> #237
Fake WiFi app could solve this problem if it makes android think that is connected to wifi. Don`t new why Google dont offer a solution that already exist but only for "rooted" users.
as...@gmail.com <as...@gmail.com> #238
just upgraded my n7100 4.4.2 and connected to vpn but no data flow :-(. Any fix yet ?
la...@gmail.com <la...@gmail.com> #239
It is soon october 2014, and this vpn problem on 4.4 kitkat still not solved. My samsung tab3 wifi only is now useless. Shall I get rid of android?? Will this problem be fixed in the future?
ar...@gmail.com <ar...@gmail.com> #240
Since I upgraded My GT N 5110 To Android 4.4.2 blue vpn doesn't workshop anymore!
ab...@gmail.com <ab...@gmail.com> #241
Me too have the same problem note 3 android 4.4.3
ta...@gmail.com <ta...@gmail.com> #242
Note 3 also facing this problem plz solve it
ec...@gmail.com <ec...@gmail.com> #243
Why is this closed if it is not fixed? I also have VPN problems
hi...@gmail.com <hi...@gmail.com> #244
same problem here on my KitKat 4.4.4
am...@gmail.com <am...@gmail.com> #245
I am facing the same issue on my Moto E 4.4.4
.
.
ma...@gmail.com <ma...@gmail.com> #246
same here with different sony xperia devices on Android 4.4.3 and 4.4.4
ok...@gmail.com <ok...@gmail.com> #247
I've tried LPT2/IpSec PSK with a LG G3 running 4.4.2. I get the connection but no data is transfered.
When I type static ip address in browser, it works! Looks like a dhcp or dns issue. I've tried to set manually the dns (8.8.8.8), no luck. My windows laptop can connect the same VPN server (softether) without issue.
When I type static ip address in browser, it works! Looks like a dhcp or dns issue. I've tried to set manually the dns (8.8.8.8), no luck. My windows laptop can connect the same VPN server (softether) without issue.
ch...@gmail.com <ch...@gmail.com> #248
The solution is to buy an iPhone, as I have. This isn't one of those sarcastic responses either. VPN is a critical tool for many users, especially business users, and to still have it completely broken since 4.4 release is unacceptable.
Without VPN, I can't work. I'm not going to stick with Android if it fails to meet my basic needs.
Without VPN, I can't work. I'm not going to stick with Android if it fails to meet my basic needs.
ec...@gmail.com <ec...@gmail.com> #249
Why
In
The
World
Is
This
Not
Fixed
In
The
World
Is
This
Not
Fixed
ar...@gmail.com <ar...@gmail.com> #250
Mirko pls send me a link of blue VPN version 2.5. Thank you
ci...@gmail.com <ci...@gmail.com> #251
I...? ¿ And i think...? ¿ What?...
an...@gmail.com <an...@gmail.com> #252
[Comment deleted]
an...@gmail.com <an...@gmail.com> #253
On ANDROID 5.0 SDK BlueVPN works
mi...@gmail.com <mi...@gmail.com> #254
If some other guy likes to test the BlueVPN app on Android 5.0 it is possible to update the Nexus devices to the Lollipop version:
http://android-developers.blogspot.it/2014/10/android-50-lollipop-sdk-and-nexus.html
th...@gmail.com <th...@gmail.com> #255
[Comment deleted]
su...@gmail.com <su...@gmail.com> #256
Can anyone pls check if bluevpn works with android lollipop 5.0 ..
mi...@gmail.com <mi...@gmail.com> #257
[Comment deleted]
mi...@gmail.com <mi...@gmail.com> #258
YES!! On Android 5.0 LOLLIPOP, BlueVPN WORKS !!
Finally this issue seems resolved
Finally this issue seems resolved
su...@gmail.com <su...@gmail.com> #259
Gr8..Thanks
wi...@gmail.com <wi...@gmail.com> #260
Mirko, congrats on BlueVpn working on Lollipop. My VPN app only works on Lollipop for IPv6 traffic, not IPv4 (Nexus 5 and 7 Wifi and 4g). Interestingly, the app works fine for v4 and v6 on the 5.0 emulator.
Would you mind answering a few questions (don't worry, I won't ask for your code)? You can email me at this address.
Would you mind answering a few questions (don't worry, I won't ask for your code)? You can email me at this address.
al...@gmail.com <al...@gmail.com> #261
Confirmed, Nexus 4, AOSP 5.0 works for PPTP VPN.
ri...@gmail.com <ri...@gmail.com> #262
Just updated my AT&T Samsung Note 3 to 4.4.4 from 4.2 in hopes that the vpn issue was resolved. Still not working. There is no excuse to not have something as critical as this not working.
pa...@gmail.com <pa...@gmail.com> #263
This is ridiculous. Never expected such a callous approach from Google. For months Nexus 7 users and brand is loosing out on VPN connectivity. Wish someone at Google pay heed to the warning signals, else they will loose the public support about their endeavors.
ec...@gmail.com <ec...@gmail.com> #264
Why has this not been fixed. This has been broken over a year
ec...@gmail.com <ec...@gmail.com> #265
Why has this not been fixed. This has been broken over a year
wi...@gmail.com <wi...@gmail.com> #266
Can someone who has a VPN working on 5.0 please answer these questions (if possible):
1. What device (I know someone has a Nexus 4 running)?
2. Did you flash factory image or build your own rom?
3. Do you happen to know if VPN is tunneling over IPv6 or IPv4?
I may try flashing a Nexus 4 to see if that works.
I built my own images from scratch and am still seeing the IPv4 problem. Also seeing it on Nexus 7 2012/2013 and multiple Nexus 5s. The Nexus 7 2013 received 5.0 via OTA, so I didn't install it. Same problem.
1. What device (I know someone has a Nexus 4 running)?
2. Did you flash factory image or build your own rom?
3. Do you happen to know if VPN is tunneling over IPv6 or IPv4?
I may try flashing a Nexus 4 to see if that works.
I built my own images from scratch and am still seeing the IPv4 problem. Also seeing it on Nexus 7 2012/2013 and multiple Nexus 5s. The Nexus 7 2013 received 5.0 via OTA, so I didn't install it. Same problem.
ce...@gmail.com <ce...@gmail.com> #267
Come on Google. This is getting pathetic
np...@gmail.com <np...@gmail.com> #268
Please support blueVPN
re...@live.com <re...@live.com> #269
Nexus 4 stock never modified anything
OTA 5.0 now
[Always on VPN] feature is working!
When [always on vpn] connected, two key icon appear on top of the screen,left one is old thin version(as in kitkat and jellybean looks like) and right one is bold new version, minor problem, no bother to me.
OTA 5.0 now
[Always on VPN] feature is working!
When [always on vpn] connected, two key icon appear on top of the screen,left one is old thin version(as in kitkat and jellybean looks like) and right one is bold new version, minor problem, no bother to me.
ha...@laposte.net <ha...@laposte.net> #270
I just upgraded to CM11 (KK 4.4.4) from CM10.2 (JB 4.2.2).
I use my old Nokia N70 to tether via bluetooth DUN.
Fortunately, in my case there is a simple workaround :
After blueVPN has enabled the tunnel, I add the route manually :
# ip route add default dev tun0 scope link
I'm planning to script it with sl4a.
I use my old Nokia N70 to tether via bluetooth DUN.
Fortunately, in my case there is a simple workaround :
After blueVPN has enabled the tunnel, I add the route manually :
# ip route add default dev tun0 scope link
I'm planning to script it with sl4a.
sa...@gmail.com <sa...@gmail.com> #271
Having similar issue on Samsung Galaxy S5 running 4.4.4. Using stock VPN software on the phone.
Hardware version: G900V.05
Model number: SM-G900V
Kernel version: 3.4.0
Build: KTU84P.G900VVRU1ANI2
When I am connected to the VPN, I can access all of my company network and intranet resources, but can't access any other internet addresses (google.com , etc.)
Hardware version: G900V.05
Model number: SM-G900V
Kernel version: 3.4.0
Build: KTU84P.G900VVRU1ANI2
When I am connected to the VPN, I can access all of my company network and intranet resources, but can't access any other internet addresses (
ok...@gmail.com <ok...@gmail.com> #272
After Lollipop update on my LG G3 (V20e-EUR-XX) it works automagically!
al...@gmail.com <al...@gmail.com> #273
Vpn issue with kitkat4.4.4
mo...@gmail.com <mo...@gmail.com> #274
hey. my yoga tablet 10 lenovo also have that kind of problem. it connects then after few secs. it says "trying to establish a blah blah blah". pls make a fix
h4...@gmail.com <h4...@gmail.com> #275
I just have no idea how this can be 'closed', after one year and 4 released, damn!
google is totally ignoring people, nothing good can happen after that
google is totally ignoring people, nothing good can happen after that
[Deleted User] <[Deleted User]> #276
same issue on acer tab 8, anyone no of any work around's that will allow openvpn for andriod add routes
am...@gmail.com <am...@gmail.com> #277
Can anyone confirm if this problem is completely solved in Android 5 ( lollipop ) or not ?
da...@gmail.com <da...@gmail.com> #278
VPN issue here too, on my Asus MemoPad 8 ME181C and Motorola Moto G phone both running Android 4.4.4. Cannot connect via OpenVPN, or through traditional Android menu methods of L2TP etc. Serious issue for me. Please fix.
ma...@gmail.com <ma...@gmail.com> #279
I have LG L70 4.4.2 kitekat and bluetooth VPN is not working. Shame for google in year 2015!
[Deleted User] <[Deleted User]> #280
Asus TF701T 4.4.2 is not working!
pa...@gmail.com <pa...@gmail.com> #281
No always-on VPN connections on any of the last 3 phones Ive had. My connection would be fine, unless i turned "always-on" vpn on. They it would say "connected", but nothing would load or ping.
In addition normal l2tp connections are even acting up now.
This is a really big safety problem, and a problem that affects a lot of us very severely!
In addition normal l2tp connections are even acting up now.
This is a really big safety problem, and a problem that affects a lot of us very severely!
ba...@gmail.com <ba...@gmail.com> #282
My galaxy grand 2 with android 4.4.2 does not work with blue vpn to connect internet by my nokia gprs modem.what is the problem.
wd...@doerflers.us <wd...@doerflers.us> #283
Geez. Can't we just get a patch or something to fix the VPN code??
st...@gmail.com <st...@gmail.com> #284
On kitkat 4.4.2 Vpn Disconnection dialog got hanged after disconnection also.
Notification did'nt removed ,Its need reboot for resolve this error.
Notification did'nt removed ,Its need reboot for resolve this error.
da...@gmail.com <da...@gmail.com> #285
Still nothing?! This is a deal breaker issue for me right now. I love Android and am willing to find work arounds for small issues but the vpn problems are MAJOR ISSUES that need to be addressed. PLEASE GOOGLE?!
Still unable to get reliable connection on OpenVPN or standard vpn running Android 4.4.4 on Asus MemoPad 8 (ME181C) and my Motorola phone.
Still unable to get reliable connection on OpenVPN or standard vpn running Android 4.4.4 on Asus MemoPad 8 (ME181C) and my Motorola phone.
[Deleted User] <[Deleted User]> #286
3+
al...@gmail.com <al...@gmail.com> #287
Solved on Lollipop.
di...@gmail.com <di...@gmail.com> #288
kitkat 4.4.4 is stupid not working in my meizu m1 note. This is so frustrating.
zi...@gmail.com <zi...@gmail.com> #289
I use droidvpn on asus zen5 4.4.2..always disconnect.when i connect,it just take 5minute.after that vpn disconnect.i also try in my alcatel one touch 4.1.2...it work find...any solution to solve this problem?
aa...@gmail.com <aa...@gmail.com> #290
its more than a year and still the same... openvpn not working on note 4 with kitkat 4.4.4
sa...@gmail.com <sa...@gmail.com> #291
Some VPN providers works on all KitKat version..tested on KitKat 4.4.2 with slowdns VPN...slowdns uses different routing method during dns tunneling...if any programmer is reading this post plz find out the routing config and upload it here
dj...@gmail.com <dj...@gmail.com> #292
Problem & limitations @ VPN
I have the same problem & I can't use Blue VPN+ on my Kitkat 4.42
I have the same problem & I can't use Blue VPN+ on my Kitkat 4.42
dj...@gmail.com <dj...@gmail.com> #293
Problems & limitations @ VPN.
I have the same problem & I can't
use BlueVPN+ app on my Android Kitkat 4.4.2
I have the same problem & I can't
use BlueVPN+ app on my Android Kitkat 4.4.2
rl...@gmail.com <rl...@gmail.com> #294
We are also having the same problem with android 4.4.2, the VPN connection just stopped working. We need this fixed ASAP!
is...@gmail.com <is...@gmail.com> #295
By ASAP, I assume you mean something less than the 18 months this bug has been open? In any case, count me in, I'm on a Droid Turbo which Verizon has forced to only run 4.4.4, and my VPN won't work longer than ten seconds. On the server side, it's seen as a DPD failure and drop. Same VPN server, same client, same config, same carrier on an Android 5.0 phone works fine.
This kind of garbage is exactly why Apple dictated to carriers that the phones would not run a carrier specific iOS version, because they know the end users would be the ones who get screwed, like we are now, with Verizon locking my phone, forcing me to use 4.4.4 and Google refusing to fix 4.4.x bugs.
This kind of garbage is exactly why Apple dictated to carriers that the phones would not run a carrier specific iOS version, because they know the end users would be the ones who get screwed, like we are now, with Verizon locking my phone, forcing me to use 4.4.4 and Google refusing to fix 4.4.x bugs.
ja...@gmail.com <ja...@gmail.com> #296
I think they have an agreement on this.
pu...@gmail.com <pu...@gmail.com> #297
Besaq maesalah ni
er...@gmail.com <er...@gmail.com> #298
There is an app that fixes the Android kit kat firewall that allows always on VPN to work. You need root access.
Always on vpn fix
Always on vpn fix
si...@gmail.com <si...@gmail.com> #299
Same issue
si...@gmail.com <si...@gmail.com> #300
Same issue
al...@gmail.com <al...@gmail.com> #301
[Comment deleted]
he...@gmail.com <he...@gmail.com> #302
Upgraded my Samsung Android to kitkat and can't use anymore blueVPN+ for tethering (apparantly a kitkat problem with VPN).Please fix
ma...@gmail.com <ma...@gmail.com> #303
#298 can you tell us the app name? I have a rooted note 2 and I need VPN to work.
re...@gmail.com <re...@gmail.com> #304
Plz VPN issues on KitKat (version 4.4.2)
sh...@gmail.com <sh...@gmail.com> #305
Can you send a full bugreport of the failure to me at rgreenwalt@google.com?
rg...@google.com <rg...@google.com>
is...@gmail.com <is...@gmail.com> #306
It's easy to reproduce. Set up a VPN from 4.4.4 to any type of vpn server (I've reproduced with Fortinet hardware and OpenVPN software), connect from behind NAT, typically soon after connecting, dead peer detection will drop you believing the connection is down.
hu...@gmail.com <hu...@gmail.com> #307
Same issue. When is there a fix?
se...@gmail.com <se...@gmail.com> #308
Thanks to this post (above)!!!
******
#269 ham...@laposte.net
I just upgraded to CM11 (KK 4.4.4) from CM10.2 (JB 4.2.2).
I use my old Nokia N70 to tether via bluetooth DUN.
Fortunately, in my case there is a simple workaround :
After blueVPN has enabled the tunnel, I add the route manually :
# ip route add default dev tun0 scope link
I'm planning also to script it with sl4a.
******
This works for me with cm11 (KitKat 4.4.4) installed. Fortunately, this version of cyanogenmod works with ad hoc wireless as well.
******
#269 ham...@laposte.net
I just upgraded to CM11 (KK 4.4.4) from CM10.2 (JB 4.2.2).
I use my old Nokia N70 to tether via bluetooth DUN.
Fortunately, in my case there is a simple workaround :
After blueVPN has enabled the tunnel, I add the route manually :
# ip route add default dev tun0 scope link
I'm planning also to script it with sl4a.
******
This works for me with cm11 (KitKat 4.4.4) installed. Fortunately, this version of cyanogenmod works with ad hoc wireless as well.
pe...@gmail.com <pe...@gmail.com> #309
Please send help to peetansie@gmail.com
Kitkat 4.4 . . . not supported
Kitkat 4.4 . . . not supported
ke...@gmail.com <ke...@gmail.com> #310
As the poster said, I rooted my tablet installed terminal emulator, did
# ip route add default dev tun0 scope link
Bam! My BlueVPN is working again.
Do same if you encounter the problem of connecting to vpn.
# ip route add default dev tun0 scope link
Bam! My BlueVPN is working again.
Do same if you encounter the problem of connecting to vpn.
mr...@gmail.com <mr...@gmail.com> #311
Please send help to Rifat0172@gmail.com
Kitkat 4.4.0 . . . not supported and %
Kitkat 4.4.0 . . . not supported and %
[Deleted User] <[Deleted User]> #312
[Deleted User] <[Deleted User]> #313
kitkat version for android 4.4.2
tr...@gmail.com <tr...@gmail.com> #314
KitKat version 4.4.4.
en...@gmail.com <en...@gmail.com> #315
KitKat version 4.4.2
Description
Here is what happens when VPN is opened:
..... define the builder parameters ......
ParcelFileDescriptor parcel = builder.setSession("VPN Connection").establish();
D/Vpn(502): setting state=CONNECTING, reason=establish
D/VpnJni(502): Address added on tun0:
I/ip6tables(120): ip6tables v1.4.11.1: can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)
I/ip6tables(120): Perhaps ip6tables or your kernel needs to be upgraded.
I/ip6tables(120): ip6tables terminated by exit(3)
E/Netd(120): exec() res=0, status=768 for /system/bin/ip6tables -t nat -A st_nat_POSTROUTING -o tun0 -m mark --mark 60 -j MASQUERADE
I/Vpn(502): Established by com.blue_vpn on tun0
D/Vpn(502): setting state=AUTHENTICATING, reason=establish
and when closed [ parcel.close(); ] :
I/ip6tables(120): ip6tables v1.4.11.1: can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)
I/ip6tables(120): Perhaps ip6tables or your kernel needs to be upgraded.
I/ip6tables(120): ip6tables terminated by exit(3)
E/Netd(120): exec() res=0, status=768 for /system/bin/ip6tables -t nat -D st_nat_POSTROUTING -o tun0 -m mark --mark 60 -j MASQUERADE
D/Vpn(502): setting state=DISCONNECTED, reason=interfaceRemoved