Notices


Reply
Thread Tools
Posts: 1,179 | Thanked: 770 times | Joined on Nov 2009
#411
Originally Posted by RobbieThe1st View Post
Check your *drive*/systemBackups folder - what files exist and what size?
Have a 623.1mb -optfs file and a 270.4mb rootfs file.
 
Posts: 1,341 | Thanked: 708 times | Joined on Feb 2010
#412
I think, Backupmenu should have a settable password.

I'd love to install this, but if my device get stolen or lost, backupmenu without password is too easy way to hack it.

Because, even if rootfs and eMMC is flashed, security code stays the same and if it has been set, the device will ask the security code when the system boots after both rootfs+eMMC-flash.
 
Posts: 842 | Thanked: 1,197 times | Joined on May 2010
#413
Er... No, it doesn't. If you flash your n900, the security code will be the same, yes, but it -will not- ask for it at boot. This means that someone could easily enough simply pull up a root terminal, grab a "key-code grabber" script(It's one line), run the encrypted result through John The Ripper, and have a new password set in an hour.

Remember: When you lose physical control, you have lost all security.

As such, I'm not going to do this. SSH/terminal mode -do- require a password however(Your root password).
Also, for anyone that cares - Once you login via ssh and have your password entered, you can type "getlockcode" at the prompt to recover your (encrypted) lock code.

@etuoyo:
Can you give me the output of "df -h"? That rootfs size looks fine, and the optfs -may- be fine too. It may be just a corrupted file or something... But you should be getting a message about it during backup.
__________________
My projects: BackupMenu - OS Backup & restore | Video: Flashing your n900(LiveCD)
My devices: N770 + 8GB SD card soldered internally, N900 with 8GB SD card + Custom OC(125-950 typically).
OC freqs: 0:22,90 125:22,90 250:28,180 500:30,360 550:32,400 600:34,430 700:39,430 750:41,430 805:45,430 850:47,500 900:50,500 950:54,500 1000:58,500 1100:67,520 1150:71,520
 

The Following User Says Thank You to RobbieThe1st For This Useful Post:
Posts: 1,341 | Thanked: 708 times | Joined on Feb 2010
#414
Originally Posted by RobbieThe1st View Post
Er... No, it doesn't. If you flash your n900, the security code will be the same, yes, but it -will not- ask for it at boot. This means that someone could easily enough simply pull up a root terminal, grab a "key-code grabber" script(It's one line), run the encrypted result through John The Ripper, and have a new password set in an hour.
I have flashed couple of times both eMMC+rootfs and every time when I boot, the N900 asks the security code or it will not boot further. Also my N900 (both of them) somehow does not show anything useful for John The Ripper to work from.
 

The Following User Says Thank You to zimon For This Useful Post:
Posts: 842 | Thanked: 1,197 times | Joined on May 2010
#415
I just checked the topic. I'm guessing you broke something in /dev/mtd1 (Bad block, perhaps?) - Not only is flashing not resetting it, but you aren't getting any code back, while everyone else seems to be able to do it.

Unless you can actually have your code -work- as well as not be able to get in after reflash without the code, I can't say that's the "normal" behavior.

edit:
As it is, if you are a knowledgable person(and take the time), if you have BackupMenu on your system you would be able to login via SSH(with your root password) and either crack or replace/fix the lock code if it was needed.
I'm pretty sure that in the case of BackupMenu, users would prefer to be able to recover things than have more security. Remember, if there was a lock on this too, you would be screwed - you wouldn't be able to get in via BM either.
__________________
My projects: BackupMenu - OS Backup & restore | Video: Flashing your n900(LiveCD)
My devices: N770 + 8GB SD card soldered internally, N900 with 8GB SD card + Custom OC(125-950 typically).
OC freqs: 0:22,90 125:22,90 250:28,180 500:30,360 550:32,400 600:34,430 700:39,430 750:41,430 805:45,430 850:47,500 900:50,500 950:54,500 1000:58,500 1100:67,520 1150:71,520

Last edited by RobbieThe1st; 2010-12-03 at 08:29.
 

The Following 2 Users Say Thank You to RobbieThe1st For This Useful Post:
Posts: 284 | Thanked: 320 times | Joined on May 2010 @ Peterborough, UK
#416
Hey Robbie, I've been thinking more about using nandsim/nandwrite to make it easier to create the ubinized image. In the process, I've discovered an alternative to using dd which does include OOB data - namely, nanddump /dev/mtd5 (the rootfs partition). This can then be restored using nandwrite -a -o /dev/mtd5 path/to/image/file and does keep bad blocks marked etc?
 

The Following User Says Thank You to Tigerite For This Useful Post:
Posts: 1,341 | Thanked: 708 times | Joined on Feb 2010
#417
Originally Posted by RobbieThe1st View Post
I just checked the topic. I'm guessing you broke something in /dev/mtd1 (Bad block, perhaps?) - Not only is flashing not resetting it, but you aren't getting any code back, while everyone else seems to be able to do it.

Unless you can actually have your code -work- as well as not be able to get in after reflash without the code, I can't say that's the "normal" behavior.

edit:
As it is, if you are a knowledgable person(and take the time), if you have BackupMenu on your system you would be able to login via SSH(with your root password) and either crack or replace/fix the lock code if it was needed.
I'm pretty sure that in the case of BackupMenu, users would prefer to be able to recover things than have more security. Remember, if there was a lock on this too, you would be screwed - you wouldn't be able to get in via BM either.
There are few others who have this "problem" also, that there is not coming anything looking like DES encryption after the string "lock_code" in /dev/mtd1

I wonder, if this is a patent thing, and in some parts of the world Nokia has indeed used other encryption than DES.
Or if it indeed is some kind of fortunate seldom triggered bug, that makes the device harder to crack.

And forgot to mention, I have in settings, that in 10 minutes of idle usage, the device will lock itself with the security code. I think that is why it asks the security code every time it boots up, also after full rootfs+rMMC reflash. I guess people normally do not have that auto security lock enabled and haven't noticed it does survive over reflash also. (which seems to be a good thing).

Backupmenu asks a root password with ssh access, good, but using (o) USB-storage mode or Create a backup it is, IMO, too easy now to copy user data out of the device by a thief. Couldn't the same password be used as with ssh-access to whole backupmenu if a user wants to set up it that way?

I know, having physical access to the device and enough time, a thief can get the data anyhow, maybe (?), but now with backupmenu leaving the phone unattended just for a few minutes lets a cracker copy eMMC to his PC and only thing owner notices is that the device has been shut down.

I said "maybe", because currently I haven't figured out how to access or mount /home/user (or MyDocs) without knowing the security code. Maybe flashing with rescue_initrd allows it to be mounted over USB without knowing the security code? Also in those devices where DES is working "normally", I guess one can flash /dev/mtd1 and get rid of the security code asking, but then the owner will notice that the security code has been removed.

At least, it would make the crack harder and more time consuming and perhaps there would be marks left by a cracker. Now with backupmenu installed there is no trails left to notice if someone has stolen you data while you were in a toilet.
 
Posts: 306 | Thanked: 106 times | Joined on Feb 2010
#418
Guys,
I havent read the 42 page thread but need some suggestions. I plan to install my own custom kernel on N900 but before doing that want to make sure i dont end with a bricked device. I have installed backupmenu and taken a backup of rootfs and opt in MyDocs.

Now if i flash my kernel (and copy over /lib/modules) and the device doesnt boot will i be able to restore the /lib/modules from backup. This is assuming that i still willbe able to see the bootmenu even after flashing my custom kernel and a bricked device.

Also, i dont plan to change my kernel version string but have it as -omap1 which is the same as stock kernel. I will simply overwrite all the stock /lib/modules/2.6.28-omap1 with my own custom kernel modules.

How does this sound?
__________________
------------------------------------------------------------------
Voice choppy on sip calls
Please vote for bug number 10388
 
Posts: 539 | Thanked: 165 times | Joined on Feb 2010 @ Berlin, Germany
#419
Originally Posted by rajil.s View Post
Also, i dont plan to change my kernel version string but have it as -omap1 which is the same as stock kernel. I will simply overwrite all the stock /lib/modules/2.6.28-omap1 with my own custom kernel modules.
You'd be on a safers ide if you were leaving original files as they are and use some other string for your own kernel. That way you'd have no downside (as far as I know) but would always be able to reflash the original kernel and it would immediately find its own modules again.
 

The Following User Says Thank You to x-lette For This Useful Post:
Posts: 306 | Thanked: 106 times | Joined on Feb 2010
#420
Originally Posted by x-lette View Post
You'd be on a safers ide if you were leaving original files as they are and use some other string for your own kernel. That way you'd have no downside (as far as I know) but would always be able to reflash the original kernel and it would immediately find its own modules again.
I presently have a symlink /lib/modules/current which points to /lib/modules/2.6.28-omap1. Is that 'current' symlink necessary in maemo? Because if it is, and since it will point to my new set of modules and if try to use the stock kernel it will fail.

If i have /lib/modules/2.6.28-omap1 and /lib/modules/2.6.28-mykernel and no 'current' symlink, would the device boot up fine?
__________________
------------------------------------------------------------------
Voice choppy on sip calls
Please vote for bug number 10388
 
Reply

Tags
backup, backupmenu, cssusupplement, max(useful), rescue-console, restore, system

Thread Tools

 
Forum Jump


All times are GMT. The time now is 12:37.