Fonera: Unterschied zwischen den Versionen
MovGP0 (Diskussion | Beiträge) |
MovGP0 (Diskussion | Beiträge) |
||
Zeile 133: | Zeile 133: | ||
ssh root@192.168.1.1 | ssh root@192.168.1.1 | ||
***** | ***** | ||
+ | |||
+ | note: after flashing, the fingerprint of the router changes. in that case you can delete the known-hosts file from ssh: | ||
+ | rm ~/.ssh/known_hosts | ||
+ | ssh root@192.168.1.1 | ||
+ | yes | ||
== CLONING == | == CLONING == |
Version vom 8. April 2008, 21:54 Uhr
Fonera
FLASHING
Mac OS X
Since EasyFlash isn't available for Max OS X, we do this manually (FON2200 + ethernet only):
1. Set IP address of your Mac:
sudo ifconfig en0 192.168.1.254
antifuchs says: this does not work reliably on Leopard. What does work is: In Network.prefpane, Make a new network location, make inactive every device except ethernet; set ethernet config to "Manual", configure IP address 192.168.1.254. Then select that location as your current location.
2. Enable tftp
Get TFTPServer, point it to the directory that contains the firmware; it needs to be world-read/writable; you can let that program fix permissions for you.
3. Copy OpenWRT files to tftp dir:
These files are typically what you want to use:
- openwrt-atheros-2.6-vmlinux.lzma
- openwrt-atheros-2.6-root.squashfs
4. Upload the firmware
Two methods here: The lazy approach, and flashing it manually. I recommend doing it by hand at least once to be able to debug the lazy approach if it goes wrong.
Flashing manually
Get access to RedBoot
See also http://forum.openwrt.org/viewtopic.php?pid=63402.
echo -e "\003" > break
fonera an den strom, wenn das 2te led zu blinken beginnt:
nc -vvv 192.168.1.254 9000 < break;
danach ctrl+c
telnet 192.168.1.254 9000
-> You should now have a "RedBoot>" prompt. If not, rinse and repeat.
Flash new kernel and filesystem images in RedBoot:
In RedBoot (assuming you configured the machine with the tftp server to 192.168.1.254):
fis init load -r -b 0x80041000 openwrt-atheros-2.6-vmlinux.lzma fis create -e 0x80041000 -r 0x80041000 vmlinux.bin.l7 load -r -b 0x80041000 openwrt-atheros-2.6-root.squashfs fis create -l 0x06F0000 rootfs
Reboot
You are now where EasyFlash ends. Wait for the boot to finish and telnet to 192.168.1.1 and set a root password.
Flashing automatically (the lazy approach)
Get this expect script (written by Antifuchs and Marius): https://whatever.metalab.at/user/kintel/fonera/flashit.expect
Usage:
1. Start script: ./flashit.expect
Optionally, you can give kernel and squashfs files as parameters if they don't have the default filenames
2. Connect and power up the Fonera
3. When you see stuff happening, go for lunch.<br/
When the script exits (and you see no error message), you can safely reboot the box and telnet to 192.168.1.1
Windows/Linux (easyflash):
http://downloads.berlin.freifunk.net/fonera/ [ ] ap51-flash-fonera-1.0-38 18-Dec-2007 19:10 3.3M [ ] ap51-flash-fonera-gui-1.0-38.exe 18-Dec-2007 19:12 3.3M Passendes Tool runterladen. http://downloads.openwrt.org/kamikaze/7.09/atheros-2.6/ [ ] openwrt-atheros-2.6-root.jffs2-64k 30-Sep-2007 20:16 1.6M [ ] openwrt-atheros-2.6-vmlinux.lzma 30-Sep-2007 20:16 768K die beiden runterladen. Jetzt kommts.. 0. sudo ifconfig eth0 192.168.1.254 1. Fonera mit ETHERNETKABEL an eth0 anstecken. 2. ./ap51-flash-fonera-1.0-38 eth0 openwrt-atheros-2.6-root.jffs2-64k openwrt-atheros-2.6-vmlinux.lzma 3. Strom an den Fonera anstecken Der Fonera schickt nun beim hochfahren einen ARP request raus, das Flashtool wartet darauf und tut dann seine Magie. Der ganze Flashvorgang dauert rund _15_ Minuten. Zuerst sieht man die IP vom Router Dann steht da was von Loading RootFS .. Writing RootFS.. (10 Minuten) Loading Kernel .. Writing Kernel.. Rebooting Device.. Fertig. Danach hat der Fonero die IP 192.168.1.1 und ist über TELNET erreichbar. Happy hacking.
first steps in openwrt after flashing
set password
telnet 192.168.1.1 passwd ***** ***** exit
ssh root@192.168.1.1 *****
note: after flashing, the fingerprint of the router changes. in that case you can delete the known-hosts file from ssh:
rm ~/.ssh/known_hosts ssh root@192.168.1.1 yes
CLONING
How to clone (or backup) a Fonera:
1. Get this expect script (written by Marius): https://whatever.metalab.at/user/kintel/fonera/clone.expect
2. Set up your fonera so you can ssh in without a password:
- Copy your computer's ~/.ssh/id_dsa.pub (or equivalent) to the Fonera
- On the Fonera:
# cp id_dsa.pub /etc/dropbear/authorized_keys # chmod og-r /etc/dropbear/authorized_keys
3. Run the script on your computer
4. The backup is now made to the files clone.lzma and clone.squashfs. These can be used to reflash another fonera to become an identical copy.
Assumptions: The fonera lives at 192.168.1.1, the root prompt contains a "#", a normal openwrt is flashed on it.
NB! This has not been tested very well, so use with caution until it's been more quality assured.
Bugreports are welcome :)
SOFTWARE
software zum flashen + packages .. http://download.berlin.freifunk.net/fonera/
Buildchain
http://wiki.openwrt.org/BuildingPackagesHowTo
svn co https://svn.openwrt.org/openwrt/tags/kamikaze_7.09
http://forum.openwrt.org/viewtopic.php?pid=31794#p31794
Fettes ipkg repository
http://downloads.openwrt.org/kamikaze/packages/mips/
HARDWARE
LCD am fonera? http://www.lefinnois.net/wpen/index.php/2007/11/11/lcd-screen-for-la-fonera/
I2C bus? http://www.lefinnois.net/wpen/index.php/2007/05/13/i2c-bus-for-la-fonera/
SD card am fonera? http://www.larsen-b.com/Article/262.html http://phrozen.org/fonera.html
GPIO kernel modul http://mobileaccess.de/fonera/gpio/ http://daubau.net/proc_gpio/
Fertig compiliertes GPIO kernelmodul im feschen .ipk + src Media:Kamikaze_7.09_GPIOkmod.tar.gz