NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
chirpa
Apr 01, 2013Luminary
ReadyNAS OS 6.9.3 | Run on existing x86 (4.2) #notsupported
There are a few threads on this, showing how to convert 6.0 firmware to run on the 4.2 platform. I am combining the information here, so it is easier to digest. This is UNSUPPORTED by NETGEAR. Do...
chirpa
May 03, 2013Luminary
Some handy utilities for scripting...
# rnutil -h
Usage: rnutil COMMAND [OPTIONS]
event_push push a system event to the UI
get_disk_info print a list of all attached disks and disk information
notify_ups notify command called from upsmon
check_ups_drv check and possibly start network ups drivers
powerbtn handle power button events from acpid
disk_chan disk event helper for udev
set_mtu network interface mtu helper for udev
create_bond create bond
rn_shutdown shutdown readynasd and system gracefully
rn_lcd LCD display
remote_access start a remote access session for tech support
volume_util perform volume operations
mkhomedir_helper home subvolume creator for PAM
disk_event_handler handler for disk events
hotplug_event notifier for hotplug events
md_event notifier for MD RAID events
start_raids start all MD RAID arrays
rn_dbgrw debug utils
shutdown_eda shutdown all attached EDA500
list list all personalities
help print this help text
# rn_nml -h
Simple NML CLI. Return NML on stdout.
(C) NETGEAR Inc, 2012-
Usage: rn_nml -h ... help
Usage: rn_nml [-v] -I debpkg ... install debian package
Usage: rn_nml [-v] -i debpkg ... install debian package (w/o check signature)
Usage: rn_nml [-v] -g obj ... call NML-GET for obj.
Usage: rn_nml [-v] -s obj:opt ... call NML-SET for obj. (!! NOTE IMPLEMENTED !!)
Usage: rn_nml [-v] -a obj:opt ... call NML-ADD for obj.
Usage: rn_nml [-v] -S AppName ... call NML-CMD to start and enable app
Usage: rn_nml [-v] -K AppName ... call NML-CMD to stop and disable app
options:
-v ... verbose
Details
-g shares ... get share list
-a share:/volname/sharename ... add share 'sharename' under volume 'volname'
# /frontview/bin/avdu -h
Anti-Virus Definition file Update
(C) NETGEAR Inc, 2012-
Usage: /frontview/bin/avdu [options...]
options:
-h ... show this help
-v n ... verbose. n=0..3.
-V ... debug curl
# /frontview/bin/avdu -v 3 -V
avdu.c:117(3) [curl]* Connected to avdl.ctmail.com (216.163.188.32) port 80 (#0)
avdu.c:117(3) [curl]* Server auth using Basic with user '0001E241P1281I072105'
avdu.c:117(3) [curl]< GET /csav/deffiles/def5/antivir-hit.ini HTTP/1.1
Authorization: Basic MDAwMUUyNDFQMTI4MUkwNzIxMDU6
Host: avdl.ctmail.com
avdu.c:117(3) [curl]< HTTP/1.1 200 OK
avdu.c:291(3) Start downloading definition file (201305180140)
avdu.c:117(3) [curl]* Connected to avdl.ctmail.com (216.163.188.32) port 80 (#0)
avdu.c:117(3) [curl]* Server auth using Basic with user '0001E241P1281I072105'
avdu.c:117(3) [curl]< GET /csav/deffiles/def5/antivir-z-201305180140.zip HTTP/1.1
Authorization: Basic MDAwMUUyNDFQMTI4MUkwNzIxMDU6
Host: avdl.ctmail.com
avdu.c:117(3) [curl]< Content-Length: 29237024
avdu.c:117(3) [curl]< Content-Type: application/zip; charset=binary
avdu.c:303(3) Done downloading definition file (201305180140) rc=0 http_status=200
avdu.c:502(2) Successfully download definition file (201305180140)
avdu.c:330(3) Start installing virus definition file (201305180140)
avdu.c:356(3) Success installing virus definition file (201305180140)
avdu.c:519(2) Successfully installed new definition file (201305180140)
They may start hiding stuff as more people poke around via SSH. They apparently didn't like me running 'strings' on the fvdropbox binary and finding command line arguments. As of 6.0.5, they stripped out the command line arguments seen below, though they still work.
chirpa wrote: Looking at the /frontview/bin/fvdropbox binary, it uses the curl library to call dropbox.com APIs directly. Maybe there is an atomic timestamp issue, that it thinks the remote files are newer, so it downloads them again each time the service starts. It then uses inotify to find changed files, and upload them.
# strings /frontview/bin/fvdropbox
DropBox utitlity and sync server
This probram use 'parson' (a light json parser and reader) by Krzysztof Gabls, under MIT license.
See http://kgabis.github.com/parson/ for 'parson'.
# %s -h ... show this help
# %s [-v 0..3] ... start service
# %s [-v n] [-V] [-d] ... start service
# %s [-v n] [-V] -- cmd args... ... run utility command
-v n ... verbose. n=0..3.
-d ... debug service without started by systemd
info ... Get user info. (call /account/info API.)
... File listing. (call /metadata API.)
put [-f] local_path remote_path
... Upload file. (call /file_put API.) (Up to 150MB)
-f : forces update. otherwise update if newer.
get [-f] remote_path local_path
... Download file. (call /files (GET) API.)
-f : force download. otherwise download if newer.
sync [-c cursor] remote_folder local_folder
... Download all if newer. Then upload all if newer.
... Get file/directory info. (call /metadata API.)
-l : with list=true (default: list=false)
upload [-f] local_path remote_path
... Upload file. (call /chunked_upload API.)
... Create a folder (call /create_folder API.)
... Delte folder or file (call /delete API.)
This program should be started by systemd.# /frontview/bin/fvdropbox -v 2 -V -d -- infoIf you change the "-v 2" to "-v 3", you can see all the debug values. Scary that they don't verify the SSL certificate either, someone could hijack api.dropbox.com via DNS cache poisoning, and get your info. They call HTTPS with plaintext oauth secret key in the URL.
display_name=my name
quota=24561844224
email=my@email.addr
dbox_utils.c:84(debug) [curl]* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
box_utils.c:84(debug) [curl]< GET /1/account/info?oauth_consumer_key=REDACTED&oauth_token=REDACTED&oauth_signature_method=PLAINTEXT&oauth_signature=REDACTED&oauth_timestamp=REDACTED&oauth_nonce=REDACTED HTTP/1.1
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!