Welcome! Log In Create A New Profile

Advanced

2nd hand Pogoplug E02, uknown ssh password

Posted by jst818 
2nd hand Pogoplug E02, uknown ssh password
January 21, 2014 02:41PM
Ok, here is the sittuation, i bought 2nd hand Pogoplug E02 with uknown ssh password, previous owner says this distro was installed:http://rustybytes.com/2011/02/16/setup-your-pogoplug-as-a-squeezebox-server/#more-42 .

Looks like someone has modified bootloader, because without usb it should boot into stock pogo fimrware, but it doesnt, because pogo is not recognized under my.pogoplug.com site.
.
What to do ?
Re: 2nd hand Pogoplug E02, uknown ssh password
January 21, 2014 03:04PM
So its booting into this "squeezeplug" distro from USB? Why do you care about it? Looking at the instructions, I bet you could just boot a brand new stick built from bohdi's 3.12.0-kirkwood-tld3 rootfs. If not, I would suggest that you first and foremost open the box and setup serial access. It's the safest way to recover any of these devices.
Re: 2nd hand Pogoplug E02, uknown ssh password
January 21, 2014 03:14PM
Quote

So its booting into this "squeezeplug" distro from USB?
I guess so, but i dont have that particular usb stick.

Quote

Looking at the instructions, I bet you could just boot a brand new stick built from bohdi's 3.12.0-kirkwood-tld3 rootfs
http://forum.doozan.com/read.php?2,12096
Quote

Updated 14 Dec 2013:
Rootfs Debian-3.12.0-kirkwood-tld-3 was uploaded. This rootfs is to keep in sync with kernel Linux-3.12.0-kirkwood-tld-3 (and its new features).

This one ?



Edited 1 time(s). Last edit at 01/21/2014 03:17PM by jst818.
Re: 2nd hand Pogoplug E02, uknown ssh password
January 21, 2014 08:59PM
Sorry you confuse me. You need to be clearer. I thought you said its not booting the standard pogo firmware (which implies its booting another linux) and you have no idea what the password is for ssh access. Now you're saying you don't have the usb stick with that alternate linux environment? If that's all true, then I can only guess that the previous owner loaded that alternate linux into the nand.

I really suggest you crack her open and get serial access. Yes that's the rootfs I was referring, but I'm going to warn you now that it may not boot. If it doesn't boot, you will need to update the uboot. This is difficult without either serial access or another bootable and accessible linux system. But all is not lost. You may be able to find the old squeeze rootfs. That will have a 2.6 kernel and *should* boot. I can't guarantee that it will without seeing the uboot environment as that contains scripts that determine what can boot, and in what order.
Re: 2nd hand Pogoplug E02, uknown ssh password
January 22, 2014 03:49AM
3.12.0-kirkwood-tld3 rootfs should boot with all versions of uBoots that Jeff's script installed (i.e. even one with L2 cache enable). So chances is that it will boot this Pogo E02.

-bodhi
===========================
Forum Wiki
bodhi's corner (buy bodhi a beer)



Edited 1 time(s). Last edit at 01/22/2014 03:52AM by bodhi.
Re: 2nd hand Pogoplug E02, uknown ssh password
January 22, 2014 10:44AM
Oh! I didn't know it would boot off the original uboot. That certainly makes it easier.
Re: 2nd hand Pogoplug E02, uknown ssh password
January 23, 2014 02:34PM
my qoute
Quote

Looks like someone has modified bootloader, because without usb it should boot into stock pogo firmware, but it doesnt, because pogo is not recognized under my.pogoplug.com site.
This was my assumption, and could be wrong, cause there are 2 possibilities
1. stock fw with stopped Pogoplug software (hbwd)
2. debian on nand

Taking into account tutorial from http://rustybytes.com posted above i would put my money on 1st option, because there no vital nand is being harmed, only bootloader.


bodhi
Yes, unpacked "3.12.0-kirkwood-tld3 rootfs" on usb boots the pogo.


btw, unintentional i managed to erase whatever it was on mtd1,2 nand with "Rescue System v2" http://forum.doozan.com/read.php?4,3896 .
http://projects.doozan.com/rescue/install_rescue.sh
Quote

$FLASH_ERASEALL /dev/mtd1
$NANDWRITE /dev/mtd1 $UIMAGE_MTD1

$FLASH_ERASEALL /dev/mtd2
$UBIFORMAT /dev/mtd2 -s 512 -f $ROOTFS_MTD2 -y



Regarding password recovering, just my crazy thought: if one would dump all pogo mtd's (nand memory) and within them somehow found "/etc/shadow" (password hash for root user), then it would be possible to recover password in decent time ?


Too bad i discovered answer (way more simple) to my question here http://forum.doozan.com/read.php?8,11722,11750#msg-11750 .



Edited 3 time(s). Last edit at 01/23/2014 02:50PM by jst818.
Author:

Your Email:


Subject:


Spam prevention:
Please, enter the code that you see below in the input field. This is for blocking bots that try to post this form automatically. If the code is hard to read, then just try to guess it right. If you enter the wrong code, a new image is created and you get another chance to enter it right.
Message: