TG799VAC-XTREME-17.2-MINT icon indicating copy to clipboard operation
TG799VAC-XTREME-17.2-MINT copied to clipboard

Request for add VPN card in ansuel/tch-nginx-gui

Open Ansuel opened this issue 6 years ago • 15 comments

i notice the VPN card... Can we include this in the main gui ? or also the telstra theme?

Ansuel avatar Oct 05 '18 07:10 Ansuel

Sure, that's fine @Ansuel.

wuseman avatar Oct 05 '18 10:10 wuseman

I see you do not have the CWMP tab either, is it something you chosed to not include or do you want info for add this tab too?

wuseman avatar Oct 05 '18 10:10 wuseman

CWMP is present one of the latest card

FrancYescO avatar Oct 05 '18 11:10 FrancYescO

We will need to port openvpn to most of the modems as they don’t have it on them

On 5 Oct 2018, at 7:54 pm, Francesco M [email protected] wrote:

CWMP is present one of the latest card

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub, or mute the thread.

kevdagoat avatar Oct 05 '18 11:10 kevdagoat

Oh, you are right @FrancYescO. This is my current setup.

Screenshot

Tried to install openvpn without any luck, openvpn require kmod-tun package and when i am trying to install this package i get this error msg: satisfy_dependencies_for: Cannot satisfy the following dependencies for kmod-tun: * kernel (= 3.3.8-1-3e727c51e42e8034f8ada81e0e9fe681) *

Edit: Wait, i will be back later about openvpn i got it working it seems, i will try to fix a tab for openvpn.

wuseman avatar Oct 05 '18 12:10 wuseman

Have you guys fixed the VPN card yet? Maybe I missunderstood last time and thought you just wanted the card for vpn, sorry.

I have played with router for few days and i remember you asked about this so i compressed all files that probably is neded for the vpn card.

My router also have CLASH and other features you guys missing i checked the decrompressed dir from @ansuel and I got some cards you seems not have (or maybe you just didnt include them), let me know if you want them too for your gui file i can create a list when you fixed vpn. We don't downloading the firmware(rbi) file on the same way on VBNT-H it seems, we must use clash for download this file and then create a backup with sysupgrade -b i figured out this after 100000 hours.

VBNT-H USERS THAT MIGHT BE READING THIS:

BE VERY CAREFUL WITH THIS IDIOT METHOD IF YOU DONT HAVE A RBI FILE AS A BACKUP THEN YOUR DEVICE MIGHT BE BRICKED, FOREVER

For find alot of passwords, firmware and temp files I did this:

  • Factory reset your router
  • Get root shell as usual via nc or autogui
  • ASAP !!!! ASAP !!! You are connected change name on /bin/rm > /bni/rm2 and /bin/reboot > /bin/reboot2 for ~1minute and 30 seconds then you must rename them again before you router will reboot otherwise you will get into real problems! Key files and everything in /proc not need to be cracked they are stored there since they cant be removed, also ALOT of settings in /tmp that only exist for ~2minutes after a reset. I also tried to rename /dev/null > /dev/null2 temporary after a reset this only gave me alot of .jar files for all kind of logs I never seen before(i usually do not playing with devices like this by renaming binarys but this was my last hope :P), also bootlog and such wierd things I found when i removed null BUT DONT THIS IF YOU DONT WANT TO RISK YOUR DEVICE MANY BINARYS USING DEV/NULL FOR WORK PROPERLY I had really problems to get into shell again but after few hours I finally could get acceess again so my device survived this time ^^

The result of doing this will be:

You will find your ISP password in plaintext in /tmp/tmp

You can get all configuration files files in /tmp named: dl-config-1u309ruq3oifr2q980ufrqjfh3fjh90q8fjqujfqujfq Around ^ 10 such files will be created until it will reboot after a reset(all these files wont be deleted since rm command is gone)

And there is alot more stuff that wont be deleted, there is some unreadable files in / dir aswell when you removing the RM command, also you will find all keys in /proc folder without any cracking needed. You will also find plain passwords for DLSCONFIG and some more more settings I never seen before (i dont know what this is for yet) and some other passwords in plaintext and much more things probably, atleast on VBNT-H this works very well.

If you dont wanna use my idiot method by deleting binarys use a loop I did this first but I needed reset the router so many times and my patience is so bad so above method went much faster then it did when did a factory reset for like 100 times to see figure out wich files that is being created and deleted some only exist for a second or even less like all cwmpd files, around 10 such files will be created and deletedf: '/tmp/cwmpd.ahaufa'. There is really many files that is created and removed after a factory reset until the first auto reboot after 2minutes, atleast VBNT-H rebooting after 2min when you have did a factory reset thats why i tried this, first i used below commands for log everything without risk to harm device:

while :; cat  /tmp/dl-*;sleep 1 > dl-configs.txt; done
while :; cat  /tmp/tmp/*;sleep 1 > random2-configs.txt; done
while :; cat  /tmp/-*;sleep 1 > random-tmp-configs.txt; done
while :; cat  /tmp/cwmpd-*;sleep 1 > cwmpd-configs.txt; done
......
and so on

Also used a while loop for ps command to figure out how to launch all commands and it was on this way i finally figured out I was forced to use: /usr/bin/clash-upgrade-wrapper to get the RBI file wich has a random name not a name like telia-tg799vac.rbi it was named 96f4fbf294a13f05bd5bc3f1469d13de.

And then I am able to flash the router FINALLY !!!!! in clash shell , there is alot of clash scripts in /usr/lib/lua, this is clash if you guys don't have it on your firmware, I just type clash and then i joining another shell with the options on picture:

Screenshot

 /usr/bin/clash-iptables-wrapper
 /usr/bin/clash-coredump-wrapper
 /usr/bin/clash-logread-wrapper
 /usr/bin/clash-mptcpkpi-wrapper
 /usr/bin/clash-showinfo-wrapper
 /usr/bin/clash-tcpdump-wrapper
 /usr/bin/clash-upgrade-wrapper

Also i have much more folders in lib directories that I never tried to use so it would be cool to get help to enable all this since they are not enable on my default setup anyway.

  # ls /usr/share/transformer/mappings/ 
    bbf      clash    device2  igd      rpc      uci

In the bbf folder i have MANY .map files also like: X_000E50_SmartControl.map, X_000E50_ngwfdd.map, Cellular.Interface.X_000E50_Upgrade.map.

There is very many binarys on my router that is not being used maybe they are for a new version or something they are not used when I running lsof atleast.

I also was able to restore deleted files that was deleted before nginx has been started or could login on router and rename the binarys by typing, maybe some boot files or something I didnt check all files yet ;P)

 lsof +L1

Output: 

 lua        6572   root   10u   REG   0,14    42148     0   52767 /tmp/tmp/etilqs_JNW0EFhWVeQtCq8 (deleted)
 lua        5104   root   17u   REG   0,14    42148     0   52767 /tmp/tmp/wtilqs_p3wrEFhW2432q8 (deleted)

Restored the files by:

 cp /proc/6572/fd/10 /root/etilqs_JNW0EFhWVeQtCq8
 cp /proc/5104/fd/17 /root/etilqs_wtilqs_p3wrEFhW2432q8 

Ahh anyway, just wanted explain if someone have a VBNT-H and wanna download the firmware file :P

Lets start with the VPN card now since i probably missunderstood last time:

You can download all default l2tp files here: https://nr1.nu/f/tg799-v3/archive/tg799-vpncard-2019-04-16.tar.gz

Im not 100% sure ALL required files has been added since I am not so involved as you guys about this router but I searched for all files that contains vpn + l2tp in filename and added them all. Hopefully the tarball is complete otherwise just let me know which files you need and i will upload them too.

wuseman avatar Apr 16 '19 03:04 wuseman

link dead, btw if you just confirm that these firmwares https://github.com/wuseman/TG799VAC-XTREME-17.2-MINT/blob/master/firmware/telia-tg799vac-rbi-16.2-17.2.zip

are the latest (or at least where the VPN was working) we can use these as starting point

FrancYescO avatar Sep 09 '19 00:09 FrancYescO

I see, let me find that file it's moved to another dir I belive, back in a few

I must have misspelled that filename since its 17.2 that has the VPN card. I can give you entire setup, I also have all keys and sources for bootloader. I did a copy first minute I started the router and also i did a realtime backup first time i plugged in the cable eth0 cable and I got everything this way, I dont remember exactly all files that was included in that dead link maybe that's better to just upload everything in a zip file, I don't care at all since they blocked me at telia after my wikis. (blocked for get a new router, not as customer)

I have everything uboot.img, all keys from proc and such things also the main password that is being used for all routers , Im not very involved anymore cause i can't get into my current router after the upgrade :( (yet, I working almost every day for find a way :P)

But if you know wich files it is I can just sort them out and zip them aswell if not all files is needed

Anyway, is it possible to download the rbi file without being connected to the router via shell? I tried spoof my ip and neither that works, nothing works on this firwmare i got now,17.2.0405-1441010-20181017112915 VANT-W, i find a way to list root files if you plugin a usb into the router but never find a away to execute the commands, and btw. The old exploit with with the nc command in ping field might work, I still working on it, if you cut every character it works..

Lke: 1.1.1.1[space]-e is not allowed but if you do .1.1.1.1.-e.1337. it works but it does not accept the slash wich is required for /bin/bash at end of the command

We are not allowed to enter logviewer on our firmware but if you change <a href="/gateway.lp" for < href="/modals/logviewer-modal.lp" you will be able to see all syslogs they sending to a server that belongs to ISP, I can see all keys in this log but I cant download the files it seems, this will give you alot of info what's going on. But you must be quick otherwise they are gone fast. so exactly when router is started first time then just enter 192.168.1.1/modas/logviewer-modal.lp and everything is in plain text, keyfiles and such things..

Maybe you knew this already, however maybe it helps someone that is curios.

Aug 29 06:42:00 user.notice assist.remote -t filter -D input_rule -p tcp --src 131.116.67.192/26 --dst --dport -j ACCEPT Aug 29 06:41:59 user.notice warmboot reason:0 0:PWR Aug 29 06:41:59 kern.warn kernel [ 99.916000] netlink: 20 bytes leftover after parsing attributes. Aug 29 06:41:58 daemon.info transformer[5874] async run: /etc/fwdassist.sh Aug 29 06:41:58 daemon.info cwmpd[6848] PROT_TRACE: > Download Response Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : Timestamp = 99 sec Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : FailureUrl = Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : SuccessUrl = Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : DelaySeconds = 3 Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : TargetFileName = Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : FileSize = 54 Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : URL = http://192.168.21.52:7547/ACS-server/FileServlet/enCore/a016b8360857326c8355d6a02bb72cff/Zone.sts Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : FileType = 3 Vendor Configuration File Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : CommandKey = cd7d583d8ecc34ae8055b34a2078ea8a Aug 29 06:41:58 daemon.info cwmpd[6848] APP_TRACE: TRANSFER : State = WAITING; subState = UNCONFIRMED

Alot of such lines with all kind of files they downloading after a reset, and for find the private key they using you must be really quick, ASAP your router has been reset it is stored in a temp file in /tmp/.dl-....... and its there for a half second or something in plain text..

However, if I find that file I let you know anyhow I just wanna know how i can downgrade to 17.2 again

wuseman avatar Sep 09 '19 01:09 wuseman

if you have RBI files of your old firmware you can downgrade via TFTP https://hack-technicolor.readthedocs.io/en/stable/Recovery/#flashing-the-firmware

if you flash (downgrade to) a rootable firmware you can use the bank planning procedure to upgrade to the latest pre-rooting it https://hack-technicolor.readthedocs.io/en/stable/Hack%20Type%201&2/#bank-planning-with-firmware-upgrade

or, probably will be faster if you install tch-nginx-gui and than do an upgrade with reset config and root-only flags.

to get RBI files without stealing it from the modem is all up to your ISP and how it configured ACL and access to the firmware repository, but a common ACL is to just limit all IP outside there network, so only a telia customer could guess and download a telia firmware https://github.com/kevdagoat/hack-technicolor/issues/42#issuecomment-529215720

PS. in your comment you are talking about VANT-W Here https://github.com/wuseman/TG799VAC-XTREME-17.2-MINT/issues/3#issuecomment-483492530 you are warning about VBNT-H

i'm little confused about the right naming and board name of the device(s?) we are talking about

FrancYescO avatar Sep 09 '19 07:09 FrancYescO

link dead, btw if you just confirm that these firmwares https://github.com/wuseman/TG799VAC-XTREME-17.2-MINT/blob/master/firmware/telia-tg799vac-rbi-16.2-17.2.zip are the latest

these RBI are for VANT-R

If I correctly remember, @wuseman started playing on VANT-R (telia's 799vac) a lot of time ago, then he moved to the VBNT-H (telia's 799vac Xtream - not "xtreme") he bricked, now he's mentioning a VANT-W but I suggest you check further, maybe just the family ancestor name for its VBNT-H.

We have RBIs for both VANT-R and VBNT-H. I don't have any for VANT-W.

Every VANT-R firmware I saw so far has open ssh root access from wan - with varying restrictions of IPs, ports and VIDs. I guess VBNT-H is the same, just check.

LuKePicci avatar Sep 09 '19 17:09 LuKePicci

Yes, exactly like that @LuKePicci. I have the password for ACS, this secret password can be found if you hacking your router and are quick enough to get into the router first time you starting the router from factory, it is stored in /tmp/dl-config-3662336465363464316232613330323838336662356433383466313536663437 for few seconds then it gets removed (there is many of such files with all rules) but I dont know how I can download firmware without being connected to the router.

And btw, I can see everything router is doing by:

  • Right Click on any card when you are in /gateway.lp

  • Change modal/anything.lp to logserver-modal.lp

  • Now I can see all keys and such but when I am trying to download the files like TSBOOT.jar and all these it just gets disconnected after a while,

     reboot off
     add mwan rule
     set mwan.@rule[-1].src=lan
     set mwan.@rule[-1].dest_ip=194.22.195.0/24
     set mwan.@rule[-1].policy=iptv_only
     /etc/init.d/mwan reload
     reboot off
     add_list osgi_apps.apps.install=telia-zone
     reboot off
     add mwan rule
     set mwan.@rule[-1].src=lan
     set mwan.@rule[-1].dest_ip=81.236.63.98
     set mwan.@rule[-1].policy=iptv_only
     /etc/init.d/mwan reload
     reboot off
     set osgi.@bundle_url[0].url=http://131.116.22.230/repo/osgi5_17_2/TSBoot.jar
     set osgi.config.enabled=1
     set osgi.config.log_enable=1
     set osgi.config.boot_interval_min_timestamp=01:00
     set osgi.config.boot_interval_max_timestamp=05:00
     /etc/init.d/osgi stop
     /etc/init.d/osgi start
     reboot off
    

I have the commandkeys too but the question is how I can get the firmware, I dont even know the name of the rbi file :(

Im working daily almost to find a way to get into the new firmware :P

password_dslfconfig=973cc8a0b4c80a1a7efa0ac8842737774 password_dslfreset=cf1ac5d83c5c1bdeb52a23ae2142eb82

What is this password_dslfreset for?

And what is these urls: cwmpd.cwmpd_config.connectionrequest_url='http://10.144.236.176:51005/fwIKCQazWIkpziPW'?

I have ALL files, i removed rm command on my old router so when it autorebooted i was busted but I found all passwords in plain text :P

Also: /usr/bin/wget http://127.0.0.1:55555/ra?remote=on_permanent__<hidden_password> -O /dev/null, what is this for? Can I do something with all these without be connected to the router?

I have all files above since my old router, I am just curios how I can download them today with my new router since in logviewer if you edit the source code and changing to logviewer-modal i see them. And how do you guys figure out firmware name? Btw, when I change it to system-modal.lp instead then i get redericted to l login page again.

I have went through ALL files including all .jar and .dex files without find anything that could give me a hint what the rbi file name is, i even extracted uboot.img without find anything.

Many questions now =)

wuseman avatar Sep 20 '19 10:09 wuseman

First, you need a wan connection to management vlan. the vid is the usual one, 254, the mac address has to be set properly, the ip is retrieved by dhcp.

Second, you need a static route for any management host that explicitly say you want to go on the management wan. Of course, if you temporally setup a gateway with such connection ONLY it will be the default one.

Third, firmwares URLs from Telia's are usually in the form of http://131.116.22.230/XYZBMT.rbi; let me show you an example: 17.2.0339-1441018 for VBNT-H

symbol meaning value
X major version number 17
Y minor version number 2
Z build version number (w/out leading zeroes) 339
B last char in board name h
M build version mask 1441018
T telnet/shell availability closed

This naming conventions are from Telia only, they are free to change it whenever they want.

Fourth, do not get confused by different remote management frameworks Telia implemented. I see OSGi is implemented, CWMP of course, etc... The java stuff is OSGi related It is something the gateway sends to the OSGi management server. The jar package contains the necessary applet to give the management server enough knowledge about how to properly manage your gateway. The connection request part is related to CWMP, and this, in particular, is of no use. Even if I know your secret random CR token I could no nothing to your gateway. Usually CR ports are firewalled by the ISP, but the worst thing I could do knowing your secret CR endpoint credentials is to force your gateway to initiate an on-demand remote management session with Telia's ACS. Every CWMP management session is initiated by the gateway on some events (bootstrap, boot, value change, async task completed, periodic, connection request, etc..).

Finally, I usually see SSH access is open already from wan side on telia firmwares I looked in so far. Just set your network environment properly and try to get in.

LuKePicci avatar Sep 20 '19 11:09 LuKePicci

Oh okey, I will try that, btw I did a video before I saw you reply: https://nr1.nu/teg799.gif < this must be possible to bypass?

I will try set the network and we see how it goes

wuseman avatar Sep 20 '19 11:09 wuseman

It's on the management wan side, actually. In case the vlan is no more on vid 254, just let the gateway connect to your dhcp server via eth wan port, then sniff for packets belonging to a different vlan, check the correct vid.

LuKePicci avatar Sep 20 '19 11:09 LuKePicci

Ok, I will try and let you know how it goes

wuseman avatar Sep 20 '19 11:09 wuseman