• OpenSSL installed in Ubuntu
  • Following details for your SSL certificate
    • Country (2 digit ex, IN)=MY,
    • State or =Malaysia,
    • Locality or City=Kuala Lumpur,
    • Organization Name=Marutham Infra Services Sdn Bhd,
    • Organizational Unit Name=Cloud and Advance Services,
    • Common Name (e.g. server FQDN)=maruthuminfra.com.my

Generate CSR:

  • Now Generate Certificate Signing Request (CSR), It also generates Private Key file(Make sure it is protected and no one has access to this file). We use RSA 2048 bit Encryption with SHA256 Hashing algorithm as shown below.
  • openssl req -new -newkey rsa:2048 -nodes -sha256 -out test.csr -keyout test.key -subj “/C=MY/ST=Malaysia/L=Kuala Lumpur/O=Marutham Infra Services Sdn Bhd/OU=Cloud and Advance Services/CN=maruthaminfra.com.my”

  • CSR generation done. Now you may send you CSR file to CA Issuer.
  • Next Install SSL at Load balancer or WebServer or Proxy Server or Application Server where you SSL is getting terminated.

Any Questions, Please comment below

யாதும் ஊரே யாவரும் கேளிர் – புறநானூறு

1. Install Sun Java JDK 1.8.x

sudo apt install python-software-properties
sudo add-apt-repository ppa:webupd8team/java
sudo apt update
sudo apt install oracle-java8-installer

2. Download NetExtender.Linux.x.x.yyy.x86_64.tgz

அ) go to https://sslvpn.demo.sonicwall.com/cgi-bin/welcome
ஆ) log in with “demo/password”
இ) click on NetExtender icon, this will download a tar.gz with the client, save it

ஈ) Launch the Terminal and Run following commands

sudo ln -s /lib/x86_64-linux-gnu/libssl.so.1.0.0 /usr/lib/libssl.so.6
sudo ln -s /lib/x86_64-linux-gnu/libcrypto.so.1.0.0 /usr/lib/libcrypto.so.6

3) un-tar the client, make install script executable

tar -zxvf ~arunx/Downloads/NetExtender.Linux.8.5.793.x86_64.tgz -C /opt/

4. Install NetExtender

cd /opt/netExtenderClient


— Dell SonicWALL NetExtender 8.5.793 Installer —
Checking library dependencies…
Checking pppd…
Do you want non-root users to be able to run NetExtender?
If so, I can set pppd to run as root, but this could be
considered a security risk.

Set pppd to run as root [y/N]? y
mode of ‘/usr/sbin/pppd’ retained as 4754 (rwsr-xr–)
mode of ‘/usr/sbin/pppd’ changed from 4754 (rwsr-xr–) to 4755 (rwsr-xr-x)
mode of ‘/etc/ppp’ retained as 0755 (rwxr-xr-x)
mode of ‘/etc/ppp/peers’ changed from 2750 (rwxr-s—) to 2754 (rwxr-sr–)
mode of ‘/etc/ppp/peers/provider’ changed from 0640 (rw-r—–) to 0644 (rw-r–r–)
mode of ‘/etc/ppp/peers’ changed from 2754 (rwxr-sr–) to 2755 (rwxr-sr-x)
Copying files…


To launch NetExtender, do one of the following:

1. Click the NetExtender icon under the Applications menu
(look under the ‘Internet’ or ‘Network’ category)
2. Type ‘netExtenderGui’

5. Launch NetExtenderGUI

Input your Username/Password and Domain name to connect to VPN server


sudo netExtender -u <username> -p <password> -d <domain-name> <Server-IP>:<port-no>

NetExtender for Linux – Version 8.5.793
Dell SonicWALL
Copyright (c) 2016 Dell

Connecting to <Server-IP>:<port-no>
There is a problem with the site’s security certificate.
Warning: self signed certificate
Do you want to proceed? (Y:Yes, N:No, V:View Certificate)Y

Logging in…
Login successful.
failed to retrieve epc agent version
SSL Connection is ready
Using SSL Encryption Cipher ‘DES-CBC3-SHA’
Using new PPP frame encoding mechanism
Using PPP async mode (chosen by server)
Connecting tunnel…
Client IP Address:
You now have access to the following 5 remote networks:
NetExtender connected successfully. Type “Ctrl-c” to disconnect…

If any errors, please post here.

கற்றது கையளவு கல்லாதது உலகளவு – ஒளவையார்

What is FitPC2i ?

fit-PC2 is a miniature fanless PC based on Atom CPU. It is extremely small and extremely energy efficient, but still packs the full set of PC features. fit-PC2 is made of an embedded grade motherboard in a die-cast aluminum shell. Here is FitPC2i Spec.

Step0: Install Ubuntu 12.04.5 Linux(32-bit)
Install Ubuntu 12.04-5 Server OS into FitPC2i from here

Step1: AP Mode supported?
Verify your wireless adapter supports Access Point mode. Install “iw” tool to verify the AP mode support. Execute following command to know the same

sudo apt-get -y install iw
iw list | grep -8 “Supported interface modes:”

max scan IEs length: 2257 bytes
Coverage class: 0 (up to 0m)
Supported Ciphers:
* WEP40 (00-0f-ac:1)
* WEP104 (00-0f-ac:5)
* TKIP (00-0f-ac:2)
* CCMP (00-0f-ac:4)
Available Antennas: TX 0 RX 0
Supported interface modes:
* managed
* AP
* monitor
* mesh point
software interface modes (can always be added):

If you are able to see “AP” in the supported modes, then your Wi-Fi interface(wlan0) can act as a Access Point using hostapd.

Step2:Install dependency packages
sudo apt-get install -y libnl-3-dev libssl-dev

Step3: Compiling Hostapd-2.3 from source code
wget http://w1.fi/releases/hostapd-2.3.tar.gz
tar zxvf hostapd-2.3.tar.gz
cd hostapd-2.3/hostapd

#copy the default config file like we used to copy the kernel configuration file before build.
cp defconfig .config

#Add this line to “.config” file CONFIG_LIBNL32=y
.. .. .. CC ../src/drivers/driver_common.c /usr/bin/ld: cannot find -lnl-genl-3 collect2: ld returned 1 exit status make: *** [hostapd] Error 1

sudo ln -s /lib/libnl-genl-3.so.200.3.0 /lib/libnl-genl-3.so
#Re-make again to complete the compilation

#Its Done!, Activate You Own Wi-Fi AP at your Home/Small Office.

Step4: hostapd.conf <– Your AP configurations

#set general/minimum configuration

Step5: Run hostapd along with hostapd.conf
sudo ./hostapd -d hostapd.conf

Step6: Connect from your Android mobile or laptop and check it.

We will discuss further with more AP configuration details soon.

வணக்கம், உங்களுடைய ஆண்ட்ராய்டு கைப்பேசி அல்லது கணினியில் பயர்பாக்ஸ் உலாவியை தமிழில் எப்படி நிறுவிப் பயன்படுத்துவது


சோதிக்கப்பட்ட கருவி – Samsung – Galaxy Nexus – Android OS – பதிப்பு 4.3


உங்களுடைய கைப்பேசியை யூஎஸ்பி(USB-Debugging) கம்பியின் மூலம் கணினியுடன் இணைக்கவும்.

பிறகு கைப்பேசியின் அமைவுகளில் அதாவது settings ல் (USB Debugging Enable) வழுநீக்க முறைமை செயற்பாட்டில் உள்ளதா என சரி பார்க்கவும்.

இல்லையன்றால் அதை செயற்படுத்தவும்(Enable).


௧) தேவையான மென்பொருட்கள்

அ) android-tools – provide “adb”

ஆ) ஆணட்ராய்டு இயங்குதள பதிப்பு – 4.1.x அதற்கும் கூடுதலாக


௨) டெபியன்/உபுண்டு/பெடோரா இயங்குதளங்களில் – நிறுவல்


sudo apt-get install android-tools             #உபுண்டு

su –                                                      #பெடாேராவில் நீங்கள் root  – பயனராக மாறுதல் அவசியம்.

yum install android-tools                         #பெடாேரா

௩) ஆண்ட்ராய்டு இயங்குதளத்திற்க்கான சோதனை ஓட்ட

பயர்பாக்ஸ்-தமிழ்: பதிவிறக்கும் முறை


இங்கே சொடுக்கவும்: http://ftp.mozilla.org/pub/mozilla.org/mobile/nightly/latest-mozilla-aurora-android-l10n/fennec-31.0a2.ta.android-arm.apk

#ta என்றால் -Tamil அதுப்போல


இந்திய நாட்டு மொழிகள்









பிற நாட்டு மொழிகள்




பல்வேறு மொழிகளில் பயர்பாக்ஸ் வெளியிடப்பட்டுள்ளதால் – கீழ்கண்ட இணையப்பக்கத்தில் இருந்து உங்கள் தாய்மொழிக்கான apk கோப்பை பதிவிறக்கி சோதனை செய்யவும்.


உதாரணமாக தமிழ் மொழிக்கான கோப்பின் பொயர்: fennec-31.0a2.ta.android-arm.apk


௪) ஆண்ட்ராய்டு கைப்பேசியில் எப்படி பயர்பாக்ஸ்-தமிழ் பதிப்பை நிறுவுவது


அ) sudo adb devices            #கைப்பேசி கருவி கணினியுடன் இணைக்கப்பட்டுள்ளதா என பார்க்கவும்.

List of devices attached
01498B300401C006    device


ஆ) நீங்கள் apk கோப்பு பதிவிறக்கப்பட்ட அடைவுக்கு செல்ல வேண்டும். கீழேயுள்ளவாறு

cd ~/Downloads            #பாதையை சரியாக உள்ளிடவும்


இ) ls *.apk



ஈ) sudo adb install fennec-30.0a2.ta.android-arm.apk

415 KB/s (30592328 bytes in 71.927s)
pkg: /data/local/tmp/fennec-31.0a2.ta.android-arm.apk


௫)ஆண்ட்ராய்டு – கைப்பேசியில் நேரடியாக

பதிவிறக்கி நிறுவலாம்


http://ftp.mozilla.org/pub/mozilla.org/mobile/nightly/latest-mozilla-aurora-android-l10n/ – இணைப்பை சொடுக்கி fennec-31.0a2.ta.android-arm.apk கோப்பை பதிவிறக்கி கீழ்காணுமாறு செய்தால் சுலபமே !















நிறுவியப்பிறகு பயன்பாடுகளில் “Auroa” எனத் தலைப்பிடப்பட்டதை தொட்டு பயர்பாக்ஸ் உலாவி துவங்க வேண்டும்.

பிறகு கீழ்கண்டவாறு உலாவியை தமிழில் காணலாம்.


௬) சோதனை: சோதனை மேல் சோதனை போதுமடா சாமி!


Screenshot_2014-05-05-02-39-10 Screenshot_2014-05-05-02-47-11 Screenshot_2014-05-05-02-47-19 Screenshot_2014-05-05-02-53-41 Screenshot_2014-05-05-02-39-32 Screenshot_2014-05-05-02-44-54 Screenshot_2014-05-05-02-40-40 Screenshot_2014-05-05-02-41-47 Screenshot_2014-05-05-02-42-00 Screenshot_2014-05-05-02-42-16 Screenshot_2014-05-05-02-40-49 Screenshot_2014-05-05-02-50-41





















































































வழு/பிழை ஏதேனும் காணப்பட்டால்

FaceBook – மொசில்லா தமிழ் – Mozilla Tamil தெரியப்படுத்தவும்

மிக்க நன்றி










How to Setup Wi-Fi Direct on Android/Ubuntu Terminal – Part3


Please read my previous posts for the basic knowledge about wi-fi direct and wpa_supplicant. Here my previous posts.

General wpa_supplicant.conf – P2P Configuration

# For Android Terminals un-comment below line & comment above Line
#ctrl_interface=DIR=/data/system/wpa_supplicant GROUP=wifi


# If you need to modify the group owner intent, 0-15, the higher
# number indicates preference to become the GO. You can also set
# this on p2p_connect commands.

# optional, can be useful for monitoring, forces
# wpa_supplicant to use only channel 1 rather than
# 1, 6 and 11:

 Note: Terminal1-1/Terminal1-1 means Personal Computer or Android Phones/Tablets(rooted).

Terminal-1: sudo vi /etc/wpa_supplicant-t1.conf



Terminal-2: sudo vi /etc/wpa_supplicant-t2.conf



Terminal-1: run wpa_supplicant as daemon

sudo ./wpa_supplicant -Dnl80211 -iwlan0 -c/etc/wpa_supplicant-t1.conf -Bd


Terminal-2: run wpa_supplicant as daemon

$ sudo ./wpa_supplicant -Dnl80211 -iwlan0 -c/etc/wpa_supplicant-t2.conf -Bd


Terminal-1: wpa_cli – client

$ sudo ./wpa_cli -i wlan0

 > #here you can use p2p commands as mentioned below



Terminal-2: wpa_cli – client

$ sudo ./wpa_cli -i wlan0

 > # here you can use p2p commands as mentioned below on each terminals



1. PBC Method


  > p2p_find




 <Terminal-1 Mac Address>


> p2p_peers

<Terminal-2 MAC Address>


 > p2p_find

 > p2p_peers

 <Terminal-1 MAC Address>


> p2p_connect pbc auth go_intent=7 freq=2412  #channel-1

  • Here GO_INTENT value is very important. Because it decides P2P-GO negotiation.
  • Who is having higher GO_INTENT will be come P2P-GO, the lowest one will become P2P-Client.
  • GO_INTENT values ranges from 0 to 15
  • You can choose any channel by changing the frequency to 2.4GHz/5GHz bands..


 > p2p_connect <Terminal-1 MAC Address> pbc freq=2412 go_intent=7

 > status # This will print the connection status

  • Here tie-breaker bit will be set, since the GO_INTENT values are same. Either Terminal-1 or Terminal-2 will become P2P-GO(SoftAP), other terminal will act as P2P-Client.
  • New P2P interface will be created, you can check using ifconfig. i.e. p2p-wlan0


$ sudo ifconfig p2p-wlan0 up #P2P-GO

$ sudo iw dev wlan0

$ sudo iw dev p2p-wlan0


$ sudo ifconfig p2p-wlan0 up #P2P-Client

$ sudo iw dev wlan0

$ sudo iw dev p2p-wlan0 link #p2p-wlan0 will keep changing.


Ping Test


$ ping


$ ping

Other methods connections, we will continue in my next article.



iw : http://wireless.kernel.org/en/users/Documentation/iw
p2p : http://wireless.kernel.org/en/developers/p2p
p2p-readme : http://hostap.epitest.fi/gitweb/gitweb.cgi?p=hostap-1.git;a=blob;f=wpa_supplicant/README-P2P;hb=HEAD

கற்க கசடற



wpa_supplicant is a daemon for wireless connection management on Andorid/Linux OS. You can check your laptop running will be using wpa_supplicant in background.

ps -aef | grep wpa_supplicant

Refer here: wpa_supplicant



mkdir -p ~/work; cd ~/work;
wget http://hostap.epitest.fi/releases/wpa_supplicant-2.1.tar.gz
tar  zxvf wpa_supplicant-2.1.tar.gz
cd wpa_supplicant-2.1/
cd wpa_supplicant/


Build Environment

Install compilations utilities such as gcc, make etc.

sudo apt-get update

sudo apt-get -y build-dep gcc-4.6 build-essential


P2P Configuration

cp defconfig .config
echo “” >> .config
echo “#Arun Kumar: Enabling Modules for Wi-Fi Direct aka P2P” >> .config
echo CONFIG_P2P=y >> .config
echo CONFIG_AP=y >> .config
echo CONFIG_WPS=y >> .config


Compilation & Installation


You may or may not get errors while compiling the source codes.I have faced following compilation errors and given corresponding solutions for the same as follows


CC  ../src/drivers/driver_wired.c
../src/drivers/driver_nl80211.c:25:31: fatal error: netlink/genl/genl.h: No such file or directory
compilation terminated.
make: *** [../src/drivers/driver_nl80211.o] Error 1

Solution #1
sudo apt-get -y install libssl-dev libnl-3-dev
echo CFLAGS +=-I/usr/include/libnl3/ >> .config


../src/drivers/driver_nl80211.c:95:9: warning: passing argument 1 of ‘genl_ctrl_alloc_cache’ from incompatible pointer type [enabled by default]
/usr/include/libnl3/netlink/genl/ctrl.h:25:14: note: expected ‘struct nl_sock *’ but argument is of type ‘struct nl_handle *’
../src/drivers/driver_nl80211.c:95:9: error: too few arguments to function ‘genl_ctrl_alloc_cache’
/usr/include/libnl3/netlink/genl/ctrl.h:25:14: note: declared here

Solution #2

sudo apt-get install libnl-genl-3-dev
echo CONFIG_LIBNL32=y >> .config


Now compilation succeeded.


wpa_supplicant is really compiled

tulashi@arunx:~/work/wpa_supplicant-2.1/wpa_supplicant$ file wpa_supplicant
wpa_supplicant: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, BuildID[sha1]=0xd69c0b4bbafd67e19dfc86a66bfffdd10c2e2de8, not stripped




run wpa_supplicant as daemon


Run the compiled wpa_supplicant for command lines options as mentioned below

tulashi@arunx:~/work/wpa_supplicant-2.1/wpa_supplicant$ ./wpa_supplicant -h
wpa_supplicant v2.1
Copyright (c) 2003-2014, Jouni Malinen <j@w1.fi> and contributors

This software may be distributed under the terms of the BSD license.
See README for more details.

This product includes software developed by the OpenSSL Project
for use in the OpenSSL Toolkit (http://www.openssl.org/)

wpa_supplicant [-BddhKLqqtvW] [-P] [-g] \
[-G<group>] \
-i<ifname> -c [-C] [-D] [-p<driver_param>] \
[-b<br_ifname>] [-e<entropy file>] \
[-o<override driver>] [-O<override ctrl>] \
[-N -i -c [-C] [-D] \
[-p<driver_param>] [-b<br_ifname>] [-I<config file>] …]

nl80211 = Linux nl80211/cfg80211
wext = Linux wireless extensions (generic)
wired = Wired Ethernet driver
-b = optional bridge interface name
-B = run daemon in the background
-c = Configuration file
-C = ctrl_interface parameter (only used if -c is not)
-i = interface name
-I = additional configuration file
-d = increase debugging verbosity (-dd even more)
-D = driver name (can be multiple drivers: nl80211,wext)
-e = entropy file
-g = global ctrl_interface
-G = global ctrl_interface group
-K = include keys (passwords, etc.) in debug output
-t = include timestamp in debug messages
-h = show this help text
-L = show license (BSD)
-o = override driver parameter for new interfaces
-O = override ctrl_interface parameter for new interfaces
-p = driver parameters
-P = PID file
-q = decrease debugging verbosity (-qq even less)
-v = show version
-W = wait for a control interface monitor before starting
-N = start describing new interface
wpa_supplicant -Dnl80211 -iwlan0 -c/etc/wpa_supplicant.conf


wpa_cli : p2p commands

Wpa_Supplicant needs client to communicate i.e wpa_cli

tulashi@arunx:~/work/wpa_supplicant-2.1/wpa_supplicant$ ./wpa_cli -h
wpa_cli [-pctrl sockets>] [-i] [-hvB] [-a] \
[-P<pid file>] [-g<global ctrl>] [-G<ping interval>]  [command..]
-h = help (show this usage text)
-v = shown version information
-a = run in daemon mode executing the action file based on events from
-B = run a daemon in the background
default path: /var/run/wpa_supplicant
default interface: first interface found in socket path
status [verbose] = get current WPA/EAPOL/EAP status
ifname = get current interface name
ping = pings wpa_supplicant
relog = re-open log-file (allow rolling logs)
note <text> = add a note to wpa_supplicant debug log
mib = get MIB variables (dot1x, dot11)
help [command] = show usage help
interface [ifname] = show interfaces/select interface
level <debug level> = change debug level
license = show full wpa_cli license
quit = exit wpa_cli
set = set variables (shows list of variables when run without arguments)
get <name> = get information
logon = IEEE 802.1X EAPOL state machine logon
logoff = IEEE 802.1X EAPOL state machine logoff
pmksa = show PMKSA cache
reassociate = force reassociation
preauthenticate = force preauthentication
identity <network id> <identity> = configure identity for an SSID
password <network id> <password> = configure password for an SSID
new_password <network id> <password> = change password for an SSID
pin <network id> <pin> = configure pin for an SSID
otp = configure one-time-password for an SSID
passphrase = configure private key passphrase
for an SSID
sim <network id> <pin> = report SIM operation result
bssid = set preferred BSSID for an SSID
blacklist <BSSID> = add a BSSID to the blacklist
blacklist clear = clear the blacklist
blacklist = display the blacklist
log_level <level> [<timestamp>] = update the log level/timestamp
log_level = display the current log level and log options
list_networks = list configured networks
select_network <network id> = select a network (disable others)
enable_network <network id> = enable a network
disable_network <network id> = disable a network
add_network = add a network
remove_network <network id> = remove a network
set_network <network id> <variable> <value> = set network variables (shows
list of variables when run without arguments)
get_network <network id> <variable> = get network variables
list_creds = list configured credentials
add_cred = add a credential
remove_cred <cred id> = remove a credential
set_cred <cred id> <variable> <value> = set credential variables
save_config = save the current configuration
disconnect = disconnect and wait for reassociate/reconnect command before
reconnect = like reassociate, but only takes effect if already disconnected
scan = request new BSS scan
scan_results = get latest scan results
bss < | > = get detailed scan result info
get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilies
reconfigure = force wpa_supplicant to re-read its configuration file
terminate = terminate wpa_supplicant
interface_add <ifname> <confname> <driver> <ctrl_interface> <driver_param>
<bridge_name> = adds new interface, all parameters but <ifname>
are optional
interface_remove <ifname> = removes the interface
interface_list = list available interfaces
ap_scan <value> = set ap_scan parameter
scan_interval <value> = set scan_interval parameter (in seconds)
bss_expire_age = set BSS expiration age parameter
bss_expire_count = set BSS expiration scan count parameter
bss_flush = set BSS flush age (0 by default)
stkstart = request STK negotiation with
ft_ds <addr> = request over-the-DS FT with <addr>
wps_pbc [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration
wps_pin [PIN] = start WPS PIN method (returns PIN, if not hardcoded)
wps_check_pin <PIN> = verify PIN checksum
wps_cancel Cancels the pending WPS operation
wps_reg = start WPS Registrar to configure an AP
wps_ap_pin [params..] = enable/disable AP PIN
wps_er_start [IP address] = start Wi-Fi Protected Setup External Registrar
wps_er_stop = stop Wi-Fi Protected Setup External Registrar
wps_er_pin <UUID> <PIN> = add an Enrollee PIN to External Registrar
wps_er_pbc <UUID> = accept an Enrollee PBC using External Registrar
wps_er_learn <UUID> <PIN> = learn AP configuration
wps_er_set_config <UUID> <network id> = set AP configuration for enrolling
wps_er_config <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP
ibss_rsn = request RSN authentication with in IBSS
sta <addr> = get information about an associated station (AP)
all_sta = get information about all associated stations (AP)
deauthenticate = deauthenticate a station
disassociate <addr> = disassociate a station
chan_switch <cs_count> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [blocktx] [ht|vht] = CSA parameters
suspend = notification of suspend/hibernate
resume = notification of resume/thaw
drop_sa = drop SA without deauth/disassoc (test command)
roam = roam to the specified BSS
p2p_find [timeout] [type=*] = find P2P Devices for up-to timeout seconds
p2p_stop_find = stop P2P Devices search
p2p_connect <“pbc”|PIN> [ht40] = connect to a P2P Device
p2p_listen [timeout] = listen for P2P Devices for up-to timeout seconds
p2p_group_remove <ifname> = remove P2P group interface (terminate group if GO)
p2p_group_add [ht40] = add a new P2P group (local end as GO)
p2p_prov_disc <addr> <method> = request provisioning discovery
p2p_get_passphrase = get the passphrase for a group (GO only)
p2p_serv_disc_req <addr> <TLVs> = schedule service discovery request
p2p_serv_disc_cancel_req <id> = cancel pending service discovery request
p2p_serv_disc_resp <freq> <addr> <dialog token> <TLVs> = service discovery response
p2p_service_update = indicate change in local services
p2p_serv_disc_external <external> = set external processing of service discovery
p2p_service_flush = remove all stored service entries
p2p_service_add <bonjour|upnp> <query|version> <response|service> = add a local service
p2p_service_del <bonjour|upnp> <query|version> [|service] = remove a local service
p2p_reject <addr> = reject connection attempts from a specific peer
p2p_invite <cmd> [peer=addr] = invite peer
p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers
p2p_peer <address> = show information about known P2P peer
p2p_set <field> <value> = set a P2P parameter
p2p_flush = flush P2P state
p2p_cancel = cancel P2P group formation

= unauthorize a peer

p2p_presence_req [<duration> <interval>] [<duration> <interval>] = request GO presence
p2p_ext_listen [<period> <interval>] = set extended listen timing
p2p_remove_client <address|iface=address> = remove a peer from all groups
sta_autoconnect <0/1> = disable/enable automatic reconnection
tdls_discover = request TDLS discovery with
tdls_setup = request TDLS setup with
tdls_teardown = tear down TDLS with
signal_poll = get signal parameters
pktcnt_poll = get TX/RX packet counters
reauthenticate = trigger IEEE 802.1X/EAPOL reauthentication
raw <params..> = Sent unprocessed command
flush = flush wpa_supplicant state
radio_work = radio_work <show/add/done>


ஃ படித்தைமைக்கு மிக்க நன்றி || Thanks for visiting my blog ஃ


Connman using systemctl


If you are dealing with Embedded systems or IVI systems running Tizen or Meego Linux OS.

This guide will help you to assign static IP address manually using Connman. It is nothing but Connection Manager for Etehrnet, Wifi, Bluetooth and Wifi Direct connections.

The following steps were experimented on

Dev Board: Intel x86 platform(i386 )

OS: Tizen + Meego for IVI Systems

Linux Kernel: 3.8.xx


1. Go to this directory: This directory contains may pythons scripts.

root@localhost:~> cd /usr/lib/connman/test


2. Check the Existing Ethernet Configuration 

root@localhost:/usr/lib/connman/test> ./list-services
[ ethernet_e840f2d1c0c6_cable ]
IPv6.Configuration = { Method=off }
AutoConnect = true
Name = Wired
Nameservers = [ ]
Provider = { }
Favorite = true
Domains.Configuration = [ ]
Timeservers.Configuration = [ ]
State = ready
Proxy = { Method=direct }
Nameservers.Configuration = [ ]
IPv4 = { Netmask= Method=dhcp Address= }
Timeservers = [ ntp.meego.com ]
IPv6 = { }
Domains = [ ]
Ethernet = { Interface=eth0 MTU=1500 Method=auto Address=E8:40:F2:D1:C0:C6 }
Security = [ ]
Proxy.Configuration = { }
Type = ethernet
Immutable = false
IPv4.Configuration = { Method=dhcp }


3. Assign Static IP address, Netmask and Gateway Addresses.

Here you should use the interface name from the above output, for Ethernet you should use  “ethernet_e840f2d1c0c6_cable” like this, for you it may different Ethernet name.

root@localhost:/usr/lib/connman/test>./set-ipv4-method ethernet_e840f2d1c0c6_cable manual
Setting method manual for ethernet_e840f2d1c0c6_cable
New IPv4.Configuration:  {‘Netmask’: dbus.String(u’′, variant_level=1), ‘Gateway’: dbus.String(u’′, variant_level=1), ‘Method’: dbus.String(u’manual’, variant_level=1), ‘Address’: dbus.String(u’′, variant_level=1)}


4.Check the New IP Address

root@localhost:/usr/lib/connman/test> ./list-services
[ ethernet_e840f2d1c0c6_cable ]
IPv6.Configuration = { Method=off }
AutoConnect = true
Name = Wired
Nameservers = [ ]
Provider = { }
Favorite = true
Domains.Configuration = [ ]
Timeservers.Configuration = [ ]
State = ready
Proxy = { Method=direct }
Nameservers.Configuration = [ ]
IPv4 = { Netmask= Gateway= Method=manual Address= }
Timeservers = [ ntp.meego.com ]
IPv6 = { }
Domains = [ ]
Ethernet = { Interface=eth0 MTU=1500 Method=auto Address=E8:40:F2:D1:C0:C6 }
Security = [ ]
Proxy.Configuration = { }
Type = ethernet
Immutable = false
IPv4.Configuration = { Netmask= Gateway= Method=manual Address= }


5. Assign Name-Servers Address

root@localhost:/usr/lib/connman/test> ./set-nameservers ethernet_e840f2d1c0c6_cable
Setting name-server to [‘’, ‘’]


6. Assign Proxy of XXXX Company
root@localhost:/usr/lib/connman/test> ./set-proxy ethernet_e840f2d1c0c6_cable auto url=http://xxx.yyyyy.co.jp/pac/proxy.pac


7. Check All the Configuration
root@localhost:/usr/lib/connman/test> ./list-services