Fonera: Unterschied zwischen den Versionen

aus Metalab Wiki, dem offenen Zentrum für meta-disziplinäre Magier und technisch-kreative Enthusiasten.
Zur Navigation springenZur Suche springen
Zeile 139: Zeile 139:
  yes
  yes
  *****
  *****
On Windows you can use [http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html PuTTY] for the SSH connection.


== CONFIGURATION ==
== CONFIGURATION ==

Version vom 9. April 2008, 09:28 Uhr

Fonera

FLASHING

Mac OS X

Since EasyFlash isn't available for Max OS X, we do this manually (FON2200 + ethernet only):

1. Set IP address of your Mac:

sudo ifconfig en0 192.168.1.254

antifuchs says: this does not work reliably on Leopard. What does work is: In Network.prefpane, Make a new network location, make inactive every device except ethernet; set ethernet config to "Manual", configure IP address 192.168.1.254. Then select that location as your current location.

2. Enable tftp

Get TFTPServer, point it to the directory that contains the firmware; it needs to be world-read/writable; you can let that program fix permissions for you.

3. Copy OpenWRT files to tftp dir:

These files are typically what you want to use:

  • openwrt-atheros-2.6-vmlinux.lzma
  • openwrt-atheros-2.6-root.squashfs


4. Upload the firmware

Two methods here: The lazy approach, and flashing it manually. I recommend doing it by hand at least once to be able to debug the lazy approach if it goes wrong.

Flashing manually

Get access to RedBoot

See also http://forum.openwrt.org/viewtopic.php?pid=63402.

echo -e "\003" > break

fonera an den strom, wenn das 2te led zu blinken beginnt:

nc -vvv 192.168.1.254 9000 < break;

danach ctrl+c

telnet 192.168.1.254 9000

-> You should now have a "RedBoot>" prompt. If not, rinse and repeat.

Flash new kernel and filesystem images in RedBoot:

In RedBoot (assuming you configured the machine with the tftp server to 192.168.1.254):

fis init
load -r -b 0x80041000 openwrt-atheros-2.6-vmlinux.lzma
fis create -e 0x80041000 -r 0x80041000 vmlinux.bin.l7
load -r -b 0x80041000 openwrt-atheros-2.6-root.squashfs
fis create -l 0x06F0000 rootfs

Reboot

You are now where EasyFlash ends. Wait for the boot to finish and telnet to 192.168.1.1 and set a root password.

Flashing automatically (the lazy approach)

Get this expect script (written by Antifuchs and Marius): https://whatever.metalab.at/user/kintel/fonera/flashit.expect

Usage:
1. Start script: ./flashit.expect
Optionally, you can give kernel and squashfs files as parameters if they don't have the default filenames 2. Connect and power up the Fonera
3. When you see stuff happening, go for lunch.<br/

When the script exits (and you see no error message), you can safely reboot the box and telnet to 192.168.1.1

Windows/Linux (easyflash):

http://downloads.berlin.freifunk.net/fonera/

[ ]	ap51-flash-fonera-1.0-38	18-Dec-2007 19:10 	3.3M
[ ]	ap51-flash-fonera-gui-1.0-38.exe	18-Dec-2007 19:12 	3.3M

Passendes Tool runterladen.


http://downloads.openwrt.org/kamikaze/7.09/atheros-2.6/
 [   ] openwrt-atheros-2.6-root.jffs2-64k                 30-Sep-2007 20:16  1.6M  
 [   ] openwrt-atheros-2.6-vmlinux.lzma                   30-Sep-2007 20:16  768K   

die beiden runterladen.



Jetzt kommts..
0. sudo ifconfig eth0 192.168.1.254
1. Fonera mit ETHERNETKABEL an eth0 anstecken.
2. ./ap51-flash-fonera-1.0-38 eth0 openwrt-atheros-2.6-root.jffs2-64k  openwrt-atheros-2.6-vmlinux.lzma 
3. Strom an den Fonera anstecken 


Der Fonera schickt nun beim hochfahren einen ARP request raus, das Flashtool wartet darauf und tut dann seine Magie.
Der ganze Flashvorgang dauert rund _15_ Minuten.
Zuerst sieht man die IP vom Router 
Dann steht da was von 
Loading RootFS ..
Writing RootFS..  (10 Minuten)
Loading Kernel ..
Writing Kernel.. 
Rebooting Device..


Fertig.

Danach hat der Fonero die IP 192.168.1.1 und ist über TELNET erreichbar.
Happy hacking.


set password after flashing

telnet 192.168.1.1
passwd
*****
*****
exit
ssh root@192.168.1.1
yes
*****

note: after flashing, the fingerprint of the router changes. in that case you can delete the known-hosts file from ssh:

rm ~/.ssh/known_hosts
ssh root@192.168.1.1
yes
*****

On Windows you can use PuTTY for the SSH connection.

CONFIGURATION

network configuration files

file description
/etc/ethers specifying static IP addresses via DHCP
/etc/dnsmasq.conf configures DNS masquerading
/etc/hosts maps IP-address to hostname
/etc/networks maps network addresses to network name
/etc/protocols maps protocol to port number; see IANA for a complete list
/etc/config/dhcp configures dhcp server
/etc/config/dropbear configures ssh
/etc/config/firewall configures firewall
/etc/config/network configures network interfaces
/etc/config/system
/etc/config/wireless configures wireless lan adapter

/etc/ethers

This file maps a given MAC-address to an IPv4-Address via DHCP. Example:

# desktop
xx:xx:xx:xx:xx:xx 192.168.1.2
# laptop
xx:xx:xx:xx:xx:xx 192.168.1.3
# another desktop
xx:xx:xx:xx:xx:xx 192.168.1.4

Hint: You get the MAC-address using ipconfig -all on Windows or by using ifconfig on Linux/Unix.

/etc/hosts

maps IP address to full domain names, local domain names, and local hostnamea. Example:

127.0.0.1   www.mydomain.com   localhost.lan   www.lan   localhost   www

/etc/config/network

See OpenWRT Kamikaze Manual for setting up basic network configuration

/etc/config/wireless

See OpenWRT Kamikaze Manual for setting up basic wireless network configuration

Installing Packages

After you have successfully configured a connection with the internet, you can load additional software packages using ipkg.

CLONING

How to clone (or backup) a Fonera:

1. Get this expect script (written by Marius): https://whatever.metalab.at/user/kintel/fonera/clone.expect

2. Set up your fonera so you can ssh in without a password:

  • Copy your computer's ~/.ssh/id_dsa.pub (or equivalent) to the Fonera
  • On the Fonera:
  # cp id_dsa.pub /etc/dropbear/authorized_keys
  # chmod og-r /etc/dropbear/authorized_keys

3. Run the script on your computer

4. The backup is now made to the files clone.lzma and clone.squashfs. These can be used to reflash another fonera to become an identical copy.


Assumptions: The fonera lives at 192.168.1.1, the root prompt contains a "#", a normal openwrt is flashed on it.


NB! This has not been tested very well, so use with caution until it's been more quality assured. Bugreports are welcome :)

SOFTWARE

software zum flashen + packages .. http://download.berlin.freifunk.net/fonera/


Buildchain http://wiki.openwrt.org/BuildingPackagesHowTo

svn co https://svn.openwrt.org/openwrt/tags/kamikaze_7.09

http://forum.openwrt.org/viewtopic.php?pid=31794#p31794


Fettes ipkg repository http://downloads.openwrt.org/kamikaze/packages/mips/

HARDWARE

LCD am fonera? http://www.lefinnois.net/wpen/index.php/2007/11/11/lcd-screen-for-la-fonera/

I2C bus? http://www.lefinnois.net/wpen/index.php/2007/05/13/i2c-bus-for-la-fonera/

SD card am fonera? http://www.larsen-b.com/Article/262.html http://phrozen.org/fonera.html


GPIO kernel modul http://mobileaccess.de/fonera/gpio/ http://daubau.net/proc_gpio/

Fertig compiliertes GPIO kernelmodul im feschen .ipk + src Media:Kamikaze_7.09_GPIOkmod.tar.gz