{"id":75,"date":"2009-03-15T22:30:32","date_gmt":"2009-03-16T03:30:32","guid":{"rendered":"http:\/\/www.glaver.org\/blog\/?p=75"},"modified":"2011-12-21T06:21:03","modified_gmt":"2011-12-21T11:21:03","slug":"nss4000-nss6000-update","status":"publish","type":"post","link":"https:\/\/www.glaver.org\/blog\/?p=75","title":{"rendered":"NSS4000 \/ NSS6000 Update"},"content":{"rendered":"<p>Linksys has transferred maintenance of the NSS products (and others) to Cisco. As part of this, Cisco released a new version of the firmware for the NSS4000 \/ NSS6000, version 1.14-20.<\/p>\n<p>One of the things Cisco claims for this release is &#8220;improved security&#8221;. Apparently, as part of this some of the tricks on my previous page don&#8217;t work any more. So here are some updates:<\/p>\n<p>1) dropbear &#8211; \/linuxrwfs\/etc\/init.d\/S02hwdep is now a link to \/etcrc\/init.d\/_hwdep, which is on a read-only filesystem and can&#8217;t be edited. Fortunately, \/linuxrwfs is still read-write, so just do: cd \/linuxrwfs\/etc\/init.d; mv S02hwdep S02hwdep_old; cp -p \/etcrc\/init.d\/_hwdep .\/S02hwdep and then edit the file as described in my previous post.<\/p>\n<p>2) su &#8211; \/usr\/sbin\/busybox will complain &#8220;su: This applet requires root priviledges!&#8221; if you try to issue the su command. To get around this,\u00a0do: cp -p \/bin\/busybox \/etc\/busybox; chmod 4555 \/etc\/busybox. Then use \/etc\/busybox su to su. Don&#8217;t forget that users need to be listed in the wheel entry in \/etc\/group as well.<\/p>\n<p>3) passwd &#8211; when I tried to add a new user, while I could edit the passwd file, when I tried to change the password for that user, the user wouldn&#8217;t show up in the shadow password file. The solution was to copy one of the other lines in the shadow file, change the username, and re-issue the passwd command.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linksys has transferred maintenance of the NSS products (and others) to Cisco. As part of this, Cisco released a new version of the firmware for the NSS4000 \/ NSS6000, version 1.14-20. One of the things Cisco claims for this release is &#8220;improved security&#8221;. Apparently, as part of this some of the tricks on my previous [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=\/wp\/v2\/posts\/75"}],"collection":[{"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=75"}],"version-history":[{"count":7,"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=\/wp\/v2\/posts\/75\/revisions"}],"predecessor-version":[{"id":271,"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=\/wp\/v2\/posts\/75\/revisions\/271"}],"wp:attachment":[{"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=75"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=75"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glaver.org\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}