- I live in an apartment building and can generally see 20+ wireless networks, and performance often suffers due to the fact that there are only 3 channels in the 2.4GHz band that don’t overlap. With 5Ghz, there are several more available channels, and nobody’s using them yet! But I need the dual band support so that I can still use my 2.4GHz only iPhone 4S. All of my other devices support the 5GHz bands, no problem.
- The EA3500 has gigabit ethernet ports, as does my ReadyNAS Duo, where I have all my movies and music stored. One day I noticed that I was transferring data to my AppleTV 2 quicker over 802.11 than over a network cable, and decided I really needed gigabit so I don’t spend all day copying movies to my NAS.
I’ve been using OpenWRT for quite a while, and am pretty spoiled with respect to the configurability of my routers, so I started out seeing what I could do to my new EA3500. It turned out, not much. None of OpenWRT, DD-WRT, or Tomato currently support it.
Getting and Analyzing the Firmware
A quick bit of googling led me to Hacking Linksys E4200v2 firmware, which is a very similar router, and plenty of discouraging posts about how it’s running a Marvell SoC which isn’t very community friendly and won’t be supported by the open source firmware community anytime soon. Bummer. The Firmware Modificaiton Kit used for a lot of older routers also doesn’t support the EA3500, at least out of the box.
Starting from Brampton’s blog post, I was able to obtain the actual firmware image from Linksys’s servers using the same techniques, giving me FW_EA3500_184.108.40.206544.SSA. Analyzing this file, I’ve determined that it contains:
- A 64 byte legacy uImage bootloader header (offset 0)
- A kernel image (offset 0x40)
- A JFFS2 root filesystem image (offset 0x290000)
- A cryptographic signature (the last ~400 bytes of the file)
Further analysis has led me to believe that the cryptographic signature is only verified for updated firmware images that are automatically downloaded by the device; those that are uploaded manually via the web interface will not be verified, and it should be possible to modify the root filesystem however you want, and proceed to flash it. That said, until I have a working serial console, I’m hesitant to actually try it!
I made a quickie script which splits out the SSA firmware file:
The resulting root image can be mounted and examined using the same techniques Brampton used.
My first goal was to disable WPS as I simply don’t trust it after some recent security issues. A quick grep of the root filesystem led me to believe that maybe I could just set
wl1_wps_state=disabled in nvram, so I set out to make those modifications. Examination of the firmware led to the discovery of a simple structure for the nvram backups, which are DES encrypted with a hardcoded key before being downloaded by the client browser. I wrote a script to decrypt and re-encrypt these backups, which allows for changing arbitrary nvram values with the stock firmware.
Unfortunately, setting the
wl*_wps_state=disabled variables didn’t work; it turns out whether to disable wps is a decision that is reevaluated based on several factors, but lucky for me, all you actually have to do is disable SSID broadcasting on your wireless networks and WPS will be disabled as well. I confirmed this with
iw wlan0 scan in a Backtrack VM, and seeing that, indeed, WPS was no longer enabled. No hacking required … just not exactly obvious!
I noticed while poking around the root filesystem that the EA3500 has special treatment for any USB mass storage device that is plugged in with a
packages directory off the root. The contents of this directory are automatically linked to
/opt, and anything in the
/opt/etc/registration.d directory is executed, init script style, to extend the functionality of the stock firmware.
I should note that this could be a security hole, in that, at first glance, anybody with FTP access to the router could create files in these special directories that will later (after a reboot) be executed by the root user. But for my purposes, I was happy to take advantage.
I cross compiled the dropbear ssh server for ARM, using the same toolchain - CodeBench Lite Edition - as was used by Cisco, and placed it in the appropriate directory structure on a USB flash drive. Upon plugging in the flash drive, the SSH server was launched and I was able to login to the box as the root user (with the admin password for my router.)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
I’m making available an archive of the dropbear binaries and corresponding init script, for anyone else who wishes to get ssh access to their device. Permissions don’t matter much. I just extracted it in the root of a normal FAT32 filesystem, but it looks like HFS or even ext2 should work. I also imagine the same archive will work with an E4200, but havn’t tested it.
At this point, the only other thing I really want to accomplish is Tomato style QoS rules (I love the “any TCP connection with more than x kB of downloaded data shall be lower priority” rule), but with shell access it shouldn’t be a problem, and I didn’t even need to risk flashing a custom firmware!
It seems that, to run OpenWRT or something similar, the wireless driver is the big blocker, but it’s available as a binary kernel module (
ap8x.o) in the root filesystem. The open source mwl8k driver, however, says that it currently supports the 88W8366 chipset, which appears to be the EA3500 chipset, so maybe support isn’t as far off as one would think.