-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tun interface is broken, ChromeOS issue #2215
Comments
Maybe this wiki article can help if you haven't seen it - Using Cisco AnyConnect VPN with openconnect |
Thanks for the link. I've followed the wiki in the past and it worked perfectly. On Fri, Oct 30, 2015 at 8:38 AM, DennisL < [email protected] [[email protected]] > wrote: — |
This is affecting me as well. crouton: version 1-20151104200003~master:2a1fc9da EDIT TO ADD: Testing on a different chromebook running on stable shows this working: |
I encountered this as well. I'm not sure exactly how to tell Chrome OS to create a persistent tun0 interface, but I did notice that if I setup a fake openvpn connection through the network settings and try to connect to that, it will create a tun0 until reboot that my openvpn command in the shell can take advantage of. |
@jasoncook do you have the chromium bug report id? I would like to subscripe to the bug as i'm facing the same issue right now. |
@henkjan I just officially reported it. Here you go. |
using: acer C201P armv7 Hi, thought it might be worth mentioning that I see the same effect with any network interface. First they must be loaded/started in ChromeOS via the network applet, then the chroot can use it. Not tested with VPN, see the same effect with wlan0. To clarify, even with wlan0 up but not associated, I cannot from within the chroot associate with another base station. It connects then disconnects. If I change stations, I have to switch to ChromeOS to associate. |
HI, The solution is to enter the following commands before openvpn:
the BLACKLISTED_DEVICES tells shill to ignore the "tun0" device. I put in a script /usr/local/bin/openvpn2 all this, adding also a trick to change the DNS on the flight (to cure another problem with openvpn on chromebooks): chronos@localhost /usr/local/bin $ cat openvpn2
to open openvpn connection with a configuration file vpn.conf I give the command:
hit ctrl-c to close the VPN |
@pippo0312 - Great sleuthing and nice remedy. Maybe you could update the wiki with your new info. and solution... |
wiki updated |
@pippo0312 - Great! Thanx. |
This works! However it now breaks android apps. I found you need to use: sudo start shill BLACKLISTED_DEVICES="br0,tun0" to make it work with them. |
Version 48.0.2546.0 dev (64-bit)
Platform 7583.0.0 (Official Build) dev-channel leon
Firmware Google_Leon.4389.61.46
When creating a tun interface for VPN connections the tun device is immediately destroyed. This means that VPN connections will fail. Example output below.
From ChromeOS:
From inside the chroot:
This is problem does not effect tap interfaces.
The text was updated successfully, but these errors were encountered: