Sunday, November 05, 2006

Open your La Fonera

We decided to publish a guide to "open" your La Fonera. Stefan is hosting it here. You will find a detailed description of the remote configuration of La Fonera. Besides, a small Perl script is available to easily execute any shell code.

8 comments:

Stent One said...

Very clever!

Matías said...

Excellent article!! Indeed very clever. An excellent example why mailing lists are full of RTFMs :p

Do you mind if I translate it to Spanish?

Michael said...

Feel free to translate it and thanks for the commendation.

Anonymous said...

yeah - be stupid - hack free internet for everyone - this is not clever, this is against the spirit of fonera, and you are stupid enough to do this ...

Johannes said...

since the trick doesnt work for me for some reason i wanted to ask if anyone else experienced this problem. has fon already reacted and fixed this "bug" in their system? or am i missing something?
1. execute the script (works without error)
2. reboot (unplug) the fonera
3. wait till it comes up and then try to ssh to port 22

drchaos said...

@johannes: And what happens after you step 3? If you find port 22 open (use nmap or 'telnet fonera_ip 22' to find out), the hack should have worked. If you can see port 22 open, try 'nbclient fonera_ip -i /path/to/key -l root'. However I am not sure whether this key thing is correct or not, because I got a login prompt anyway. If you have that, too, try 'admin' or the password you've set in the router config (via fon.com) - at least that worked for me

Johannes said...

what happens is that port 22 isnt open (neither on the wire nor on wireless) and connecting thus fails. im wondering how to reset my fonera to the factory-setting though.

Michael said...

Hi Johannes,

you can easily reset your La Fonera with the tiny reset button at the bottom. It will fully reset the La Fonera to factory defaults.

Try it only with "/etc/init.d/dropbear". After that you should be able to connect the the SSH server from your private wireless LAN.