http://wiki.webos-internals.org/api.php?action=feedcontributions&user=Oc80z&feedformat=atomWebOS Internals - User contributions [en]2024-03-28T16:19:52ZUser contributionsMediaWiki 1.35.1http://wiki.webos-internals.org/index.php?title=Talk:OpenVPN_for_Palm_Pre&diff=15861Talk:OpenVPN for Palm Pre2011-05-08T04:57:00Z<p>Oc80z: </p>
<hr />
<div>I think we should start working on this. Users can copy a single openvpn.conf file that also has the certificates public/private and dh within the .conf text file. the file could be sent over dropbox, or over WOQI.. then we can just patch up the homescreen->VPN with our stuff. re: DNS, that has been fixed if not in the nslug2 repos, i will patch it.<br />
<br />
This works (cool!), but DNS from server DHCP options doesn't get set. And WebOS has a dizzying array of resolv.conf files (/etc, /tmp, /var/run, /var/run/ppp) which it swaps around or modifies depending on which network connection(s) are active. Also it uses dnsmasq. In short, I couldn't even figure out how to manually set DNS to my internal, over-the-VPN servers. --[[User:T3rmin|T3rmin]] 03:39, 9 August 2009 (UTC)<br />
<br />
who created the binary and where can I get the sources for it? --[[User:hertzi|hertzi]] 13:14, 28.03.2010</div>Oc80zhttp://wiki.webos-internals.org/index.php?title=Talk:Adding_flash_support&diff=15859Talk:Adding flash support2011-05-08T04:06:49Z<p>Oc80z: </p>
<hr />
<div>How can you (script) extract the rootfs.tgz from the verizondoctor.jar? If you could add this to below, users can just<br />
[http://pastebin.ca/2055154 run this script.]</div>Oc80zhttp://wiki.webos-internals.org/index.php?title=Talk:Adding_flash_support&diff=15857Talk:Adding flash support2011-05-08T04:06:00Z<p>Oc80z: moin moin ;</p>
<hr />
<div>How can you (script) extract the rootfs.tgz from the verizondoctor.jar? If you could add this to below, users can just run this script. <br />
[http://pastebin.ca/2055154]</div>Oc80zhttp://wiki.webos-internals.org/index.php?title=Talk:Adding_flash_support&diff=15855Talk:Adding flash support2011-05-08T03:58:00Z<p>Oc80z: * after extracting etc & usr from rootfs.tgz;verizon_webosdr.jar ; run this script to make your "rom"</p>
<hr />
<div>How can you (script) extract the rootfs.tgz from the verizondoctor.jar? If you could add this to below, users can just run this script. <br />
<br />
#!/bin/sh<br />
func_list() {<br />
cat>$list_text<<EOF<br />
etc/adobe/ mms.cfg<br />
etc/adobe/ oem.cfg<br />
usr/lib/BrowserServerPlugins/ libflashplayer.so<br />
usr/lib/BrowserServerPlugins/resource/ plugin-icon-noplay.png<br />
usr/lib/BrowserServerPlugins/resource/ plugin-icon-play-down.png<br />
usr/lib/BrowserServerPlugins/resource/ plugin-icon-play.png<br />
usr/lib/BrowserServerPlugins/resource/ plugin-icon-unknown.png<br />
usr/lib/BrowserServerPlugins/resource/ plugin-scrim.png<br />
usr/lib/ libFlashGraphics.so<br />
usr/lib/BrowserServerPlugins/FlashMiniAdapterData/ plugin-icon-noplay.png<br />
usr/lib/BrowserServerPlugins/FlashMiniAdapterData/ plugin-icon-play.png<br />
usr/lib/BrowserServerPlugins/FlashMiniAdapterData/ plugin-icon-unknown.png<br />
usr/lib/BrowserServerPlugins/FlashMiniAdapterData/ plugin-scrim.png<br />
usr/lib/BrowserServerPlugins/ FlashMiniPlugin.so<br />
EOF<br />
}<br />
######<br />
# oc80z<br />
local list_text="list.txt"<br />
local list_fldr="files" #do not modify<br />
func_list<br />
mkdir $list_fldr >&- 2>&-<br />
for x in $(cat $list_text) ; do<br />
touch dirs.sh copy.sh ; chmod +x *.sh<br />
echo $(awk '{print "mkdir -p","files/"$1,";"}' "$list_text") > dirs.sh<br />
echo $(awk '{print "cp",$1$2,"files/"$1,";"}' "$list_text") > copy.sh<br />
done<br />
./dirs.sh<br />
./copy.sh<br />
echo "Copied $(wc -l "$list_text" | awk '{print $1}') files to `pwd`/"$list_fldr" \<br />
($(du -sh "$list_fldr" | sed -e "s/$list_fldr/total/" | awk '{print $1,$2}'))"</div>Oc80zhttp://wiki.webos-internals.org/index.php?title=OpenVPN_for_Palm_Pre&diff=3251OpenVPN for Palm Pre2009-07-31T13:56:37Z<p>Oc80z: fixed pre tag</p>
<hr />
<div>The OpenVPN ipkg is a clean installation as the clipboard below proves. The Palm Pre's Linux OS is compiled with the /dev/tun driver built in, so you can ignore the module dependency warning.<br />
<br />
The OpenVPN IRC channel ##OpenVPN exists on the same Freenode server #WebOS-Internals is located on. Please stop either channel with questions after visiting [http://openvpn.net]<br />
<br />
OpenVPN is deployed quickly and easily. The OpenVPN.net website and source installations contain scripts that can make OpenVPN connect to your home or work when WiFi is activated. oc80z<br />
<br />
note: oinstall is alias oinstall="sudo ipkg-opt install"<br />
<pre><br />
┌─(box@castle)-(09:28:44)-><br />
└─(~)--> $ oinstall openvpn<br />
Installing openvpn (2.1_rc15-1) to root...<br />
Downloading http://ipkg.nslu2-linux.org/feeds/optware/cs08q1armel/cross/unstable/openvpn_2.1_rc15-1_arm.ipk<br />
openvpn: unsatisfied recommendation for kernel-module-tun<br />
Installing lzo (1.08-2) to root...<br />
Downloading http://ipkg.nslu2-linux.org/feeds/optware/cs08q1armel/cross/unstable/lzo_1.08-2_arm.ipk<br />
Configuring lzo<br />
Configuring openvpn<br />
Successfully terminated.<br />
<br />
<nowiki><br />
┌─(root@castle)-(10:17:05)-><br />
└─(/opt/etc/openvpn)--> # unzip palmpre.zip<br />
Archive: palmpre.zip<br />
creating: palmpre/<br />
inflating: palmpre/ca.crt<br />
inflating: palmpre/palmpre.key<br />
inflating: palmpre/palmpre.crt<br />
inflating: palmpre/palmpre.conf<br />
inflating: palmpre/dh2048.pem<br />
inflating: palmpre/palmpre.ovpn<br />
<br />
┌─(root@castle)-(10:19:33)-><br />
└─(/opt/etc/openvpn)--> # openvpn --config /opt/etc/openvpn/palmpre/palmpre.ovpn >>/dev/null&<br />
<br />
(...While pinging google, dropped wifi and monitored via SSH over Bluetooth PAN)<br />
<br />
64 bytes from 74.125.67.100: seq=5 ttl=52 time=46.505 ms<br />
64 bytes from 74.125.67.100: seq=6 ttl=52 time=45.603 ms<br />
64 bytes from 74.125.67.100: seq=7 ttl=52 time=49.132 ms<br />
64 bytes from 74.125.67.100: seq=8 ttl=52 time=101.013 ms <br />
64 bytes from 74.125.67.100: seq=9 ttl=52 time=1556.213 ms <-- cutover wifi to evdo<br />
64 bytes from 74.125.67.100: seq=10 ttl=52 time=561.371 ms<br />
64 bytes from 74.125.67.100: seq=11 ttl=52 time=54.932 ms<br />
64 bytes from 74.125.67.100: seq=12 ttl=50 time=109.436 ms<br />
64 bytes from 74.125.67.100: seq=13 ttl=50 time=105.896 ms<br />
64 bytes from 74.125.67.100: seq=14 ttl=50 time=104.523 ms<br />
<br />
┌─(root@castle)-(10:33:54)-><br />
└─(/opt/etc/openvpn/palmpre)--> # ping 192.218.1.10<br />
PING 192.218.1.10 (192.218.1.10): 56 data bytes<br />
64 bytes from 192.218.1.10: seq=0 ttl=42 time=456.665 ms<br />
64 bytes from 192.218.1.10: seq=1 ttl=42 time=260.773 ms<br />
64 bytes from 192.218.1.10: seq=2 ttl=42 time=268.189 ms<br />
<br />
┌─(root@castle)-(10:35:13)-><br />
└─(/opt/etc/openvpn/palmpre)--> # ping 192.218.0.1<br />
PING 192.218.0.1 (192.218.0.1): 56 data bytes<br />
64 bytes from 192.218.0.1: seq=0 ttl=64 time=259.552 ms<br />
64 bytes from 192.218.0.1: seq=1 ttl=64 time=114.898 ms<br />
64 bytes from 192.218.0.1: seq=2 ttl=64 time=118.958 ms<br />
<br />
┌─(root@castle)-(10:35:40)-><br />
└─(/opt/etc/openvpn/palmpre)--> # ping 192.218.0.218<br />
PING 192.218.0.218 (192.218.0.218): 56 data bytes<br />
64 bytes from 192.218.0.218: seq=0 ttl=64 time=502.137 ms<br />
64 bytes from 192.218.0.218: seq=1 ttl=64 time=182.556 ms<br />
64 bytes from 192.218.0.218: seq=2 ttl=64 time=123.016 ms<br />
<br />
</nowiki></pre></div>Oc80zhttp://wiki.webos-internals.org/index.php?title=OpenVPN_for_Palm_Pre&diff=3250OpenVPN for Palm Pre2009-07-31T13:56:00Z<p>Oc80z: typo & summary & links & irc links</p>
<hr />
<div>The OpenVPN ipkg is a clean installation as the clipboard below proves. The Palm Pre's Linux OS is compiled with the /dev/tun driver built in, so you can ignore the module dependency warning.<br />
<br />
The OpenVPN IRC channel ##OpenVPN exists on the same Freenode server #WebOS-Internals is located on. Please stop either channel with questions after visiting [http://openvpn.net]<br />
<br />
OpenVPN is deployed quickly and easily. The OpenVPN.net website and source installations contain scripts that can make OpenVPN connect to your home or work when WiFi is activated. oc80z<br />
<br />
note: oinstall is alias oinstall="sudo ipkg-opt install"<br />
<br />
┌─(box@castle)-(09:28:44)-><br />
└─(~)--> $ oinstall openvpn<br />
Installing openvpn (2.1_rc15-1) to root...<br />
Downloading http://ipkg.nslu2-linux.org/feeds/optware/cs08q1armel/cross/unstable/openvpn_2.1_rc15-1_arm.ipk<br />
openvpn: unsatisfied recommendation for kernel-module-tun<br />
Installing lzo (1.08-2) to root...<br />
Downloading http://ipkg.nslu2-linux.org/feeds/optware/cs08q1armel/cross/unstable/lzo_1.08-2_arm.ipk<br />
Configuring lzo<br />
Configuring openvpn<br />
Successfully terminated.<br />
<br />
<pre><nowiki><br />
┌─(root@castle)-(10:17:05)-><br />
└─(/opt/etc/openvpn)--> # unzip palmpre.zip<br />
Archive: palmpre.zip<br />
creating: palmpre/<br />
inflating: palmpre/ca.crt<br />
inflating: palmpre/palmpre.key<br />
inflating: palmpre/palmpre.crt<br />
inflating: palmpre/palmpre.conf<br />
inflating: palmpre/dh2048.pem<br />
inflating: palmpre/palmpre.ovpn<br />
<br />
┌─(root@castle)-(10:19:33)-><br />
└─(/opt/etc/openvpn)--> # openvpn --config /opt/etc/openvpn/palmpre/palmpre.ovpn >>/dev/null&<br />
<br />
(...While pinging google, dropped wifi and monitored via SSH over Bluetooth PAN)<br />
<br />
64 bytes from 74.125.67.100: seq=5 ttl=52 time=46.505 ms<br />
64 bytes from 74.125.67.100: seq=6 ttl=52 time=45.603 ms<br />
64 bytes from 74.125.67.100: seq=7 ttl=52 time=49.132 ms<br />
64 bytes from 74.125.67.100: seq=8 ttl=52 time=101.013 ms <br />
64 bytes from 74.125.67.100: seq=9 ttl=52 time=1556.213 ms <-- cutover wifi to evdo<br />
64 bytes from 74.125.67.100: seq=10 ttl=52 time=561.371 ms<br />
64 bytes from 74.125.67.100: seq=11 ttl=52 time=54.932 ms<br />
64 bytes from 74.125.67.100: seq=12 ttl=50 time=109.436 ms<br />
64 bytes from 74.125.67.100: seq=13 ttl=50 time=105.896 ms<br />
64 bytes from 74.125.67.100: seq=14 ttl=50 time=104.523 ms<br />
<br />
┌─(root@castle)-(10:33:54)-><br />
└─(/opt/etc/openvpn/palmpre)--> # ping 192.218.1.10<br />
PING 192.218.1.10 (192.218.1.10): 56 data bytes<br />
64 bytes from 192.218.1.10: seq=0 ttl=42 time=456.665 ms<br />
64 bytes from 192.218.1.10: seq=1 ttl=42 time=260.773 ms<br />
64 bytes from 192.218.1.10: seq=2 ttl=42 time=268.189 ms<br />
<br />
┌─(root@castle)-(10:35:13)-><br />
└─(/opt/etc/openvpn/palmpre)--> # ping 192.218.0.1<br />
PING 192.218.0.1 (192.218.0.1): 56 data bytes<br />
64 bytes from 192.218.0.1: seq=0 ttl=64 time=259.552 ms<br />
64 bytes from 192.218.0.1: seq=1 ttl=64 time=114.898 ms<br />
64 bytes from 192.218.0.1: seq=2 ttl=64 time=118.958 ms<br />
<br />
┌─(root@castle)-(10:35:40)-><br />
└─(/opt/etc/openvpn/palmpre)--> # ping 192.218.0.218<br />
PING 192.218.0.218 (192.218.0.218): 56 data bytes<br />
64 bytes from 192.218.0.218: seq=0 ttl=64 time=502.137 ms<br />
64 bytes from 192.218.0.218: seq=1 ttl=64 time=182.556 ms<br />
64 bytes from 192.218.0.218: seq=2 ttl=64 time=123.016 ms<br />
<br />
</nowiki></pre></div>Oc80zhttp://wiki.webos-internals.org/index.php?title=Portal:Patches_to_webOS&diff=1301Portal:Patches to webOS2009-07-21T09:40:24Z<p>Oc80z: typo</p>
<hr />
<div>__notoc__<br />
{{portal-header<br />
|This page lists patches to webOS existing apps which modify the behavior as shipped. '''Note''' that these patches may be version specific and may be broken by future webOS updates. Proceed with caution.<br />
}}<br />
<br />
* [[Add/Delete_Pages_In_The_Launcher|Add/Delete Pages in the Launcher]]<br />
* [[Add_Ability_To_Choose_Snooze_Length|Add Ability to Choose Snooze Length]]<br />
* [[Add_Words_to_AutoCorrect_Dictionary|Add Words to the AutoCorrect Dictionary]]<br />
* [[Always_Show_Details_of_New_Tasks|Always Show Details of New Tasks]]<br />
* [[Application_Mods:_PDF_Viewer|Application Mods: PDF Viewer]]<br />
* [[Background_Editing|Background Editing]]<br />
* [[Application_Framework|Application Framework]]<br />
* [[Bookmarking_MediaPlayer|Bookmarking MediaPlayer]]<br />
* [[Boot_Themes|Boot Themes]]<br />
* [[Brightness]]<br />
* [[Browser_Plugins|Browser Plugins]]<br />
* [[Bypassing_Activation|Bypassing Activation]]<br />
* [[Camera_Modifications_%26_Additions|Camera Modifications & Additions]]<br />
* [[Camera_Remote_View|Camera Remote View]]<br />
* [[Change_Enter_To_Create_Newline_Instead_of_Send_Message|Change Enter to Create Newline Instead of Send Message]]<br />
* [[Change_the_default_notification.wav_Sound|Change the Default notification.wav Sound]]<br />
* [[Changes_Alert/Notification_Sounds|Changes Alert/Notification Sounds]]<br />
* [[Changing_clipboard_data_from_the_shell|Changing Clipboard Data from the Shell]]<br />
* [[Changing_the_%22Turn_off_after_X%22_time|Changing the "Turn off after X" Time]]<br />
* [[Change_Carrier_String|Change Carrier String]]<br />
* [[Change_default_font_for_replies/forwards_from_navy_to_black|Change Default Font for Replies/Forwards from Navy to Black]]<br />
* [[Messaging_Mods|Messaging Modifications]]<br />
* [[Radio_Power_Switch|Phone On/Off Switch]]</div>Oc80zhttp://wiki.webos-internals.org/index.php?title=Tutorials_Linux_DDNS_for_EVDO&diff=1300Tutorials Linux DDNS for EVDO2009-07-21T09:36:30Z<p>Oc80z: typo</p>
<hr />
<div>== Guides ==<br />
'''[[Tutorials_Linux_DDNS_Update_Client_ez-ipupdate|Dynamic DNS Update Client: ez-ipupdate]]'''<br />
* This client has support for several Dynamic DNS services, and only updates when your IP address changes. Requires optware.<br />
<br />
<br />
'''[[Tutorials_Linux_DDNS_Update_Client_INADYN|Dynamic DNS Update Client: INADYN]]'''<br />
*This client is a daemon that occasionally checks to see if your IP address needs to be updated. Requires optware.<br />
<br />
<br />
'''[[Tutorials_Linux_DDNS_Update_Client_wget|Dynamic DNS Update Client: wget]]''' (URL based updates)<br />
* This document describes a URL based update method that requires no extra software installation.<br />
<br />
<br />
All these methods assume you have [[Portal:Accessing_Linux|Accessed Linux]] on your device.</div>Oc80z