After my La Fonera is now up since a long time, it is now time to migrate all the services it was running to a different machine on my network, and retire it.
(I have plans to recycle the hardware at a later point of time, but for now its time to plug the plug. It was a nice toy to play with, indeed.)
Missing only a measure against the threat of liability for e.g copyright infringements done by others....
(But hey, wouldn't that FON's Job....)
Some days ago, I patched the La Fonera to support RedBoot over Ethernet. As this is a very good opportunity trying out OpenWRT, I am gonna install OpenWRT on this piece.
Booting La Fonera -- Redboot Bootloader
RedBoot is the bootloader used in the La Fonera. As this bootloader can not only operate over RS232, it also can be configured to offer a simple -- but powerful -- dedicated shell over telnet / Ethernet. This is also true for the La Fonera, but has only one problem: It has no IP configured, therefore you cannot use it. We'll gonna change that now!
Just for the records:
In the La Fonera+ sources is the patch applied to dnsmasq. I did not anaylze it, but for the sake of completness, I am gonna place it here:
La Fonera+ is designed to be more easier to install and harder to hack: All the known bugs have been eliminated, the on-board-serial does not reveal a console anymore, the communication with fon is also encrypted (ASFAIK) using DNS and maybe more.
But they forget, that if you lock someone out -- especially in a community --, it but there are always smart people just encouraged by this. Here's the result:
On my regular check of my "fon-home-log", I detected, that FON is shipping two updates out since October 23.
I am currently analyzing the changes introduced by these, but until I know more I thinks its safer NOT to apply these updates: On a first sight, they fiddle around with DNS. (Well, dnsmasq to be precise. dnsmasq should not be a problem, but better safe than sorry).
THE CHANGES I ANALYZED SO FAR ARE DANGEROUS (in terms of losing control)! THEY ARE
INSTALLING COOVA (coova.org) AND WITH THIS PACKAGE IT IS POSSIBLE TO
LOSE CONTROL OF THE FONERA! (SSH etc.)
The package to be installed is only the cova-chillispot. This package does contains not the complete coova firmware, so AFAIK there no possibility to modify the La Fonera using this way. However, Kolofonium will cease to work, as the code injection using chilli is not longer possible. On the other side, it is still a hotfix: Hard-reseting will still do the job. And for the "downgraded original" firmware its easy with all the known hacks. (Instructions for the hard-reset-part here). When the Foneras are factory-equipped with 0.7.2-2, it is getting tougher but there is also a RS232 and JTAG-header inside of the case. However, either way voids the warranty.