binfalse
#android: No Internet Access Detected, won't automatically reconnect -aka- Connected, no Internet.
February 7th, 2017Hands up: who knows what an android device does when it sees a WiFi network coming up?
Exactly, since Lollipo (Android 5) your phone or tablet leaks a quick HTTP request to check if it has internet access.
This check is, for example, done with clients3.google.com/generate_204
, a “webpage” that always returns an HTTP status code 204 No Content
.
Thus, if the phone receives a 204
it is connected to the internet, otherwise it assumes that this network does not provide proper internet access or is just a captive portal.
However, that way Google of course always knows when you connect from where. And how often. And which device you’re using. etc… :(
How to prevent the leak
Even if people may like that feature, that is of course a privacy issue – so how can we counter that?
I briefly mentioned that a few years ago.
You could use AdAway (available from F-Droid, source from GitHub) to redirect all traffic for clients3.google.com
and clients.l.google.com
to nirvana.
I already maintain a convenient configuration for AdAway at stuff.lesscomplex.org/adaway.txt, which blocks Google’s captive portal detection.
However, blocking that “feature” also comes with some drawbacks…
The downside of blocking captive portal detection
The consequences of blocking all request of the captive portal detection are obvious: your phone assumes that no network hat internet access. And therefore, it wouldn’t connect automatically, saying
No Internet Access Detected, won’t automatically reconnect. see image on top
That will probably increase your mobile data usage, as you always need (to remember) to do connect manually. And even if you manually connect to a network “without internet” the WiFi icon will get an exclamation mark and the phone says
Connected, no Internet. see second image
Annoying…
What can we do about it?
Disable captive portal detection
With a rooted phone you can simply disable captive portal detection. Just get a root-shell through adb (or SSH etc) to run the following command:
settings put global captive_portal_detection_enabled 0
Changed as of Android 7, see update below!
One small drawback of that approach: you need to execute that again after flashing a new image… However, I guess you’ll anyway have a small workflow for re-flashing your phone – just add that tiny bit to it ;-)
Another drawback is that you loose the captive portal detection… Of course, that’s what you intended, but sometimes it may be useful to have that feature in hotels etc..
Change the server for captive portal detection with the Android API
You can also change the URL to the captive portal server to a server under your control.
Let’s say you have a site running at scratch.binfalse.de/generate_204
that simulates a captive portal detection server backend(!?) and always returns 204
, no matter what request.
Then you can use that URL for captive portal detection!
Override the captive portal server on a root-shell (adb or SSH etc) by calling:
settings put global captive_portal_server scratch.binfalse.de
Changed as of Android 7, see update below!
This way you retain the captive portal detection without leaking data to Google. However, you will again loose the setting when flashing the phone again..
Change the server for captive portal detection using AdAway
Another option for changing the captive portal detection server is to change its IP address to one that’s under your control.
You can do that with AdAway, for example.
Let’s say your captive portal detection server has the IP address 5.189.140.231
, then you may add the following to your AdAway configuration:
5.189.140.231 clients3.google.com
5.189.140.231 clients.l.google.com
The webserver at 5.189.140.231
should then of course accept requests for the foreign domains.
This way, you also don’t leak the data to Google and you will also keep the settings after flashing the phone (as long as you leave AdAway installed).
However, there are also some things to keep in mind:
First, I could imagine that Google may be a bit upset if you redirect their domains to a different server?
And second, you don’t know if those are the only servers used for captive portal detection.
If Google at some point comes up with another domain for captive portal detection, such as captive.google.com
, you’re screwed.
Supplementary material
See also the CaptivePortal description at the android reference.
Create captive portal detection server with Nginx
Just add the following to your Nginx configuration:
location /generate_204 { return 204; }
Create captive portal detection server with Apache
If you’re running an Apache web server you need to enable mod_rewrite
, then create a .htaccess
in the DocumentRoot containing:
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteCond %{REQUEST_URI} /generate_204$
RewriteRule $ / [R=204]
</IfModule>
Create captive portal detection server with PHP
A simple PHP script will also do the trick:
<?php http_response_code (204); ?>
UPDATE
As of Android 7 the settings have changes.
To enable/disable captive portal detection you need to set captive_portal_mode
to either
0
Don’t attempt to detect captive portals, see CAPTIVE_PORTAL_MODE_IGNORE.1
When detecting a captive portal, display a notification that prompts the user to sign in, see CAPTIVE_PORTAL_MODE_PROMPT.2
When detecting a captive portal, immediately disconnect from the network and do not reconnect to that network in the future, see CAPTIVE_PORTAL_MODE_AVOID.
To define the captive portal server you actually have three settings:
captive_portal_use_https
should the phone use HTTPS for captive portal detection? (0
= HTTP,1
= HTTPS)captive_portal_http_url
URL to the captive portal w/o HTTPS.captive_portal_https_url
URL to the captive portal when using HTTPS.
Docker MySQL Backup
February 6th, 2017Even with Docker you need to care about backups.. ;-)
As you usually mount all the persistent data into the container the files will actually be on your host. Thus, you can simply do the backup of these files. However, for MySQL/MariaDB I prefer having an actual SQL-dump. Therefore I just developed the Docker MySQL-Backup tool. You will find the sources at the corresponding GitHub repository.
How does Docker MySQL-Backup work?
The tool basically consists of two scripts:
- a config file in
/etc/default/docker-mysql-backup
to setup the path for the backup location and the path to gzip, - the script
/etc/cron.daily/docker-mysql-backup
which does the actual job.
The script /etc/cron.daily/docker-mysql-backup
parses the output of the docker ps
command to find running containers of the MySQL image.
More precisely, it looks for containers of images that start with either \smysql
or \smariadb
.
The actual filter command is
docker ps --format '{{.Names}}\t{{.Image}}' | /bin/grep '\s\(mysql\|mariadb\)' | awk '{print $1}'
That of course only matches the original MySQL/MariaDB image names (if you have a good reason to derive an own version of that image please tell me!).
For every matching $container
the script will exec the following command:
docker exec "$container" \
sh -c 'exec mysqldump --all-databases -uroot -p"$MYSQL_ROOT_PASSWORD"' \
| ${GZIP} -9 > "${BACKUP_DIR}/${NOW}_complete.sql.gz"
With the following variables:
$BACKUP_DIR
is a concatenation of$BACKUP_BASE
(configured in/etc/default/docker-mysql-backup
) and the container name,$NOW
is the current time stamp asdate +"%Y-%m-%d_%H-%M"
.
Thus, the backups are compressed, organised in subdirectories of $BACKUP_BASE
, and the SQL-dumps have a time stamp in their names.
$BACKUP_BASE
defaults to /srv/backup/mysql/
, but can be configured in /etc/default/docker-mysql-backup
.
Last but not least, the script also cleans the backups itself.
It will keep the backups of the last 30 days and all backups of days that end with a 2
.
So you will keep the backups from the 2nd, the 12th, and the 22nd of every month.
As the script is stored in /etc/cron.daily/
the cron tool will execute the backup script on a daily basis.
Restore a dump
Restoring the dump is quite easy.
Let’s assume your container’s name is $container
and the dump to restore carries the time stamp $date
.
Then you just need to run:
docker exec "$container" -v "${BACKUP_BASE}/docker_${container}":/srv sh -c \
'exec gunzip < /srv/${date}_complete.sql.gz | mysql -uroot -p"$MYSQL_ROOT_PASSWORD"'
This will mount the backup directory in /srv
of the running container and then decompress and import the SQL-dump on the fly.
Installation
Manual installation through GitHub
Clone the Docker MySQL-Backup repository:
git clone https://github.com/binfalse/docker-mysql-backup.git
Copy the backup script to the cron.daily
(most likely /etc/cron.daily/
) directory on your system:
cp docker-mysql-backup/etc/cron.daily/docker-mysql-backup /etc/cron.daily/
Copy the configuration to /etc/default/
:
cp docker-mysql-backup/etc/default/docker-mysql-backup /etc/default/
Installation from my Apt repository
If you’re running a Debian-based system you may want to use my apt-repository to install the Docker MySQL-Backup tool. In that case you just need to run
aptitude install bf-docker-mysql-backup
Afterwards, look into /etc/default/docker-mysql-backup
for configuration options.
This way, you’ll always stay up-to-date with bug fixes and new features :)
Automatically update Docker images
January 24th, 2017Docker is cool. Jails tools into containers. That of course sounds clean and safe and beautiful etc. However, the tools are still buggy and subject to usual attacks, just as they were running on your main host! Thus, you still need to make sure your containers are up to date.
But how would you do that?
Approaches so far
docker-compose pull
On the one hand, let’s assume you’re using Docker Compose, then you can go to the directory containing the docker-compose.yml
and call
docker-compose pull
docker-compose up -d --remove-orphans
However, this will just update the images used in that Docker Compose setup – all the other images on your system wouldn’t be updated. And you need to do that for all Docker Compose environments. And if you’re running 30 containers of the same image it would check 30 times for an update of that image – quite a waste or power and time..
dupdate
On the other hand, you may use the dupdate tool, introduced earlier:
dupdate -s
It is able to go through all your images and update them, one after the other.
That way, all the images on your system will be updated.
However, dupdate
doesn’t know about running containers.
Thus, currently running tools and services won’t be restarted..
Better: Docker Auto-Update
Therefore, I just developed a tool called Docker Auto-Update that combines the benefits of both approaches.
It first calls dupdate -s
to update all your images and then iterates over a pre-defined list of Docker Compose environments to call a docker-compose up -d --remove-orphans
.
The tool consists of three files:
/etc/cron.daily/docker-updater
reads the configuration in/etc/default/docker-updater
and does the regular update/etc/default/docker-updater
stores the configuration. You need to set theENABLED
variable to1
, otherwise the update tool won’t run./etc/docker-compose-auto-update.conf
carries a list of Docker Compose environments. Add the paths to thedocker-compose.yml
files on your system, one per line
As it’s installed in /etc/cron.daily/
, cron will take care of the job and update your images and containers on a daily basis.
If your system is configured properly, cron will send an email to the systems administrator when it updates an image or restarts a container.
You see, no magic, but a very convenient workflow! :)
Installation
Manual
To install the Docker Auto-Update tool, you may clone the git repository at GitHub. Then,
- move the
./etc/cron.daily/docker-updater
script to/etc/cron.daily/docker-updater
- move the
./etc/default/docker-updater
config file to/etc/default/docker-updater
- update the setup in
/etc/default/docker-updater
– at least setENABLED=1
- create a list of Docker Compose config files in
/etc/docker-compose-auto-update.conf
- one path to adocker-compose.yml
per line.
Debian Package
If you’re using a Debian based system you may install the Docker-Tools through my apt-repository:
aptitude install bf-docker-tools
Afterwards, configure /etc/default/docker-updater
and at least set ENABLED=1
.
This way, you’ll stay up-to-date with bug fixes etc.
Disclaimer
The tool will update your images and containers automatically – very convenient but also dangerous! The new version of an image may break your tool or may require an updated configuration.
Therefore, I recommend to monitor your tools through Nagios/Icinga/check_mk or whatever. And study the mails generated by cron!
Rsync of ZFS data with a FreeBSD live system
January 21st, 2017Let’s assume you rendered your FreeBSD system unbootable.. Yeah, happens to the best, but how can you still copy the data stored on a ZFS to another machine? You probably just shouted RSYNC - but it’s not that easy.
You would need a FreeBSD live os (either on a USB pen drive or on a CD/DVD) and boot into that system. However, by default you do not have network, the ZPool is not mounted, there is no rsync and SSH is not running, and the live os is not writable, which brings another few issues…
This is a step-by-step how-to through all the obstacles. Just boot into your live os (get it from freebsd.org) and go on with the following…
Get Networking
By default your live system does not have networking setup correctly.
Call ifconfig
to see if the network interface is up. If it’s not you can bring it up using:
ifconfig em0 up
(assuming your inteface is called em0)
If it is up, you need to configure it. When you’re using a DHCP server you can just ask for an IP address using:
dhclient em0
Otherwise you need to configure the addresses manually:
ifconfig em0 inet 1.2.3.4 netmask 255.255.255.0
Afterwards you should be able to ping other machines, such as
ping 8.8.8.8
Mount the ZPool
Your ZPool won’t be mounted by default; you need to do it manually. To list all pools available on that machine just call:
zpool import
This searches through the devices in /dev
to discover ZPools. You may specify a different directory with -d
(see man page for zpool).
To actually import and mount your ZPool you need to provide its name, for example:
zpool import -f -o altroot=/mnt zroot
This will import the ZPool zroot
. Moreover, the argument -o altroot=/mnt
will mount it to /mnt
instead of /
and the -f
will mount it even if it may be in use by another system (here we’re sure it isn’t, aren’t we?).
Create some Writeable Directories
The next problem is, that you do not have permissions to write to /etc
, which you need to e.g. create SSH host keys etc.
However, that’s also not a big issue as we have the unionfs
filesystem! :)
UnionFS will mount a directory as an overlay over another directory.
Let’s assume you have some space in $SPACE
(maybe in the ZPool that you just mounted or on another USB drive), then you can just create a few directories:
mkdir $SPACE/{etc,var,usr,tmp}
and mount it as unionfs
to the root’s equivalents:
mount_unionfs $SPACE/etc /etc
mount_unionfs $SPACE/var /var
mount_unionfs $SPACE/usr /usr
mount_unionfs $SPACE/tmp /tmp
Now we can write to /etc
, while the actual changes will be written to $SPACE/etc
! Isn’t that a great invention?
Start the SSH service
Now that /etc
is writable we can start caring about the SSH daemon.
First, we need to configure it to allow root to login.
Add the follwing line to the /etc/ssh/sshd_config
:
PermitRootLogin yes
Then, we can start the ssh daemon using:
service sshd onestart
It will automatically create host keys and all the necessary things for a first start of SSH.
If that was successful, port 22
should now be open:
# sockstat -4 -l
USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS
root sshd 938 4 tcp4 *:22 *:*
root syslogd 542 7 udp4 *:514 *:*
Set root Password
To be able to login you of course need to set a root password:
passwd root
Aftwerwards, you should be able to login through SSH from any other machine. Go ahaed and give it a try!
Install and Run rsync
Almost there, but the freeBSD live image doesn’t come with rsync
installed.
So we need to do it manually:
pkg install rsync
This will first tell us that not even pkg
is installed, but answering the question with y
it will automatically install itself.
And as everything is mounted as UnionFS, the stuff will actually be installed to $SPACE/...
instead of /
.
However, you should now be able to do the rsync job from where ever you want :)
Sector 32 is already in use by the program `FlexNet'
December 8th, 2016Just tried to install Grub on a debootstrap‘ed hard drive, but Grub complained:
Installing for i386-pc platform.
grub-install: warning: Sector 32 is already in use by the program 'FlexNet'; avoiding it. This software may cause boot or other problems in future. Please ask its authors not to store data in the boot track.
Never heard of that FlexNet thing, but according to Wikipedia it’s a software license manager. And we all know how this whole DRM thing just bugs us.. So it bugged me because the new system wouldn’t boot properly.. Other people having similar problems.
However, it seems impossible to force grub overriding this sector, but you may wipe it manually. In my case sector 32 was infected by DRM, so I did the following:
dd if=/dev/zero of=/dev/sda bs=512 count=1 seek=32
If that’s done Grub installs like a charm, the system booted again, and the admin was happy that another DRM thing died :)
The figure I used in this article was made by Brendan Mruk and Matt Lee. They share it as CC BY-SA 3.0.