-
Notifications
You must be signed in to change notification settings - Fork 461
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
afwall leaks Wi-Fi traffic for an blocked application for a short time[kingroot issue] #501
Comments
This is what the log shows when a wifi connection is established.
I guess it's not very helpful. Anything I can do to make the log more verbose? (if needed) |
Can you give me more details. How did you check the traffic? |
It's from an android system programm which looks like this: |
I now did check this with wireshark and compared it with the afwall log. I would give you the wireshark dump but I cannot, will not post it here.
|
Wow after I tried to send a message with whatsapp it managed to bypass afwall after a few seconds. |
Here is the afwall log. https://gist.github.com/towlie/222e6247da4476879bb8 |
Hmmm. can you paste firewall logs -> export here. Along with uid for whatsapp ? |
You mean I shall post everything I posted on gist in this post/issue? |
I'm sorry, not the logs, Firewall Rules ! I would like to see how the iptables rules has been set. |
do you have some other firewall installed or tried ? I see some more chains like firewall |
There are xprivacy (which recommended your app), Adaway and a rootapp called "king root" Don't know if these can be called firewall. ...And wifi privacy Afwall+ is completly unlocked by me in xprivacy. |
Some other process is bypassing afwall OUTPUT chain with it's own. |
Any idea how to detect what is doing this? |
execute these command in shell. iptables -F and apply the rules in AFWall+ . You should not see any chain's other than "afwall-" chains. Now open program that you suspect (kingroot., etc) and observe the iptables rules wit the following command iptables -L | grep mark if you see the change, then the other program is bypassing. Only root program's can modify the iptables rules. |
What is the last command supposed to print? It atleast shows something different when something changed but looks like dump. mark all -- anywhere anywhere |
So what would this mean? Does this programm help programms to break out? And has this something to do with the original issue? |
This is how it looks like when i do a reboot I disabled king roots root access in this case. |
last gist looks good me. in your case kingroot is doing suspicious activity. I will see if I can detect these behavior without sacrifice the battery. |
The original Problem still occurs with this rule file. Btw do you have an advice how to replace kingroot? Using supersu seems to be impossible... |
I'm aware of that problem when switching between interfaces. I use supersu or CM built-in root. |
Shall I create a new issue with the necesary information? This is kind of a mess here. |
not required. Thanks. Please close this issue. |
Since I've referenced this on my changelog, here is the reason why kingroot support is dropped in the latest version. AFWall+ uses su to update iptables rules. Based on this report, I came to know that kingroot (su) itself updates iptables rules to bypass the OUTPUT chain set by afwall to connect to internet. Atleast for now I don't have any workaround or solution. If I ever found a way to fix this without major change, then I'll enable it back. Please feel free to open up a new issue if anyone wants to discuss further. |
Well I managed to remove king root and use supersu now but it was not getting better. |
@ukanth Can you think of any legitimate reason why KingRoot should be modifying iptables? |
@Gitoffthelawn , To be frank, no idea. May be If i get some time this week, i will try rooting with kingroot to find out more. |
@ukanth I have heard plenty of speculation that KingRoot might contain a malware payload, but I've never read any hard evidence to substantiate this claim. Maybe you'll be the one to break the story. |
I see that you are confident that this is caused by king root. Did you find an evidence for this? |
we are talking about two issue. One with kingroot, one when switching between interfaces. Second one in still not resolved. Thanks. |
I believe I have the same issue. |
@towlie can you please share how you managed to replace King Root with SuperSU? the main reason that I've installed afwall was to block kingroot web access. |
I don't know the exact steps. I used an old version of kingroot "KingRoot-4.0.0.233-release-201505071219_105001" installed supersu and made it a system app with /system/app mover. You can also block internet access for kingroot with xprivacy. I think newer versions of kingroot are harder to remove. |
thanks I will try to downgrade KingRoot, with my Android version I can only root with KingRoot 4.5+. They've deliberately started blocking SuperSu installs with the justification that it was removing KingRoot in an incorrect way http://forum.xda-developers.com/showpost.php?p=61899071&postcount=1277 I would rather not use an app that has strange behavior, I've analysed a few packets and they send too many requests with an encrypted payload. |
@danielfpferreira I would agree. Anything that has root access must be open-source, with the ability to compile it on your own. Encrypted payloads could be transmitting anything. |
When I decompiled the kingroot apk, I found out it's modifying the iptables to bypass firewall and the above iptables rules were present in multiple user reports. That's the reason I dropped support for kingroot. AFWall+ itself depends on superuser/su to execute iptables commands and kingroot can easily bypass and defence mechanism put by AFWall. |
Kingroot is a spyware, anyone using this app is out of their minds. This app makes constant connections to bunch of chinese ips. |
Why not check the iptable rules on a predefined timeing and inform the user about any changes that AFWall didn't make? |
I blocked Whatsapp for Wi-Fi and LAN and allowed it for mobile connections.
But when I reenable Wi-Fi the android connection manager shows me that some kbytes slip through the Wi-Fi device. (Enable Wi-Fi, disable Wi-Fi enable Wi-Fi)
Note: This only seems to happen for a short time when the connection was established. Because all traffic is blocked after that.
Android 4.4.4
The text was updated successfully, but these errors were encountered: