122 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			122 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| This has been confirmed to work for, at the very least, my own Verizon Fi-OS
 | |
| Actiontec MI424WR-GEN3I on firmware 40.21.24. It might work on other models as
 | |
| well, but this hasn't been tested.
 | |
| 
 | |
| No non-stdlib modules are required.
 | |
| 
 | |
| Place your routers credentials in ~/.config/optools/actiontec_mgmt.json
 | |
| in the following format:
 | |
| (pay close attention to the quoting)
 | |
| (minified json is OK/whitespace-insensitive):
 | |
| _______________________________________________________________________________
 | |
|                 {
 | |
|                     "ip_addr": "192.168.1.1",
 | |
|                     "user": "admin",
 | |
|                     "password": "admin",
 | |
|                     "ssl": false,
 | |
|                     "port": 23
 | |
|                 }
 | |
| _______________________________________________________________________________
 | |
| 
 | |
| IF:
 | |
| 
 | |
| - That file isn't found:
 | |
| -- A default (blank) one will be created (with secure permissions). All values
 | |
|    will be null (see below).
 | |
|    
 | |
| - "ip_addr" is null:
 | |
| -- You will be prompted for the IP address interactively. (If you don't know
 | |
|    the IP address of it, it's probably the default -- "192.168.1.1".)
 | |
| 
 | |
| - "user" is null:
 | |
| -- You will be prompted for the username to log in interactively. (If you don't
 | |
|    know the username, it's probably the default -- "admin".)
 | |
| 
 | |
| - "password" is null:
 | |
| -- You will be prompted for the password. When being prompted, it will NOT echo
 | |
|    back (like a sudo prompt).
 | |
|    
 | |
| - "ssl" is null:
 | |
| -- The default (false) will be used.
 | |
| 
 | |
| - "port" is null:
 | |
| -- The default port (23) will be used.
 | |
| 
 | |
| 
 | |
| 
 | |
| TIPS:
 | |
| 
 | |
| - You need to ensure that you have the management interface enabled. Log into
 | |
|   your Actiontec's web interface, and:
 | |
|   1.) "Advanced" button (at the top)
 | |
|   2.) "Yes" button
 | |
|   3.) a.) Choose "Local administration" if you'll be managing the device within
 | |
|           the network it provides.[0]
 | |
|       b.) Choose "Remote administration" if you'll be managing the device
 | |
|           outside the network it provides (i.e. over the Internet).[0]
 | |
|       3.5) The "Telnet" options are what you want, ignore the "Web" settings.
 | |
|   4.) Select the protocols/ports you'll be using. SEE FOOTNOTE 0 ([0])!
 | |
|   5.) Click the "Apply" button.
 | |
| 
 | |
| - "ip_addr" can also be a host/DNS name -- just make sure it resolves on your
 | |
|   local machine to your Actiontec IP address! The default, at least on mine,
 | |
|   was "wireless_broadband_router" (can be changed via Advanced > Yes > System
 | |
|   Settings > Wireless Broadband Router's Hostname):
 | |
|   
 | |
|         [bts@cylon ~]$ nslookup wireless_broadband_router 192.168.1.1
 | |
|         Server:		192.168.1.1
 | |
|         Address:	192.168.1.1#53
 | |
| 
 | |
|         Name:	wireless_broadband_router
 | |
|         Address: 192.168.1.1
 | |
|         Name:	wireless_broadband_router
 | |
|         Address: <YOUR_PUBLIC_IP_ADDRESS>
 | |
| 
 | |
| 
 | |
| - Unfortunately it's a necessity to store the password in plaintext currently.
 | |
|   Future versions may give the option of encrypting it via GPG and using an
 | |
|   existing GPG agent session to unlock (if there's demand for such a feature).
 | |
|   Make sure your machine's files are safe (I recommend full-disk encryption).
 | |
|   
 | |
| 
 | |
| [0] NOTE: ENABLING MANAGEMENT CAN BE HIGHLY INSECURE, *ESPECIALLY* IF ENABLING
 | |
|           "REMOTE ADMINISTRATION"! *ONLY* DO THIS IF YOU UNDERSTAND THE RISKS
 | |
|           AND HAVE ACCOUNTED FOR THEM. TELNET PASSES CREDENTIALS IN PLAINTEXT
 | |
|           BY DEFAULT, AND IF SOMEONE NASTY GETS THEIR HANDS ON YOUR DEVICE'S
 | |
|           CREDENTIALS THEY CAN DO *VERY* NASTY THINGS. I REFUSE ANY AND ALL
 | |
|           LIABILITY YOU OPEN YOURSELF UP TO BY ENABLING THIS. AT *LEAST* USE
 | |
|           THE "USING SECURE TELNET OVER SSL PORT"[1] OPTION.
 | |
|           YOU HAVE BEEN WARNED.
 | |
| 
 | |
| [1] NOTE: Even if using SSL, it's HIGHLY insecure and not to be trusted. The
 | |
|           key has been leaked (as of 2018-04-12):
 | |
|                     https://code.google.com/archive/p/littleblackbox/
 | |
|           and it uses VERY weak ciphers, at that:
 | |
|           _____________________________________________________________________
 | |
|           | ssl-cert: Subject: commonName=ORname_Jungo: OpenRG Products Group/|
 | |
|           |           countryName=US                                          |
 | |
|           | Not valid before: 2004-06-03T11:11:43                             |
 | |
|           |_Not valid after:  2024-05-29T11:11:43                             |
 | |
|           |_ssl-date: 2018-04-12T09:42:22+00:00; -1s from scanner time.       |
 | |
|           |_ssl-known-key: Found in Little Black Box 0.1 -                    |
 | |
|           |         http://code.google.com/p/littleblackbox/                  |
 | |
|           |         (SHA-1: 4388 33c0 94f6 afc8 64c6 0e4a 6f57 e9f4 d128 1411)|
 | |
|           | sslv2:                                                            |
 | |
|           |   SSLv2 supported                                                 |
 | |
|           |   ciphers:                                                        |
 | |
|           |     SSL2_RC4_128_WITH_MD5                                         |
 | |
|           |     SSL2_RC4_64_WITH_MD5                                          |
 | |
|           |     SSL2_RC2_128_CBC_EXPORT40_WITH_MD5                            |
 | |
|           |     SSL2_RC4_128_EXPORT40_WITH_MD5                                |
 | |
|           |     SSL2_DES_192_EDE3_CBC_WITH_MD5                                |
 | |
|           |     SSL2_RC2_128_CBC_WITH_MD5                                     |
 | |
|           |_    SSL2_DES_64_CBC_WITH_MD5                                      |
 | |
|           |___________________________________________________________________|
 | |
|           
 | |
|           It's generally probably not even worth it, to be honest. You'll get
 | |
|           more security mileage out of firewalling off to select hosts/nets.
 | |
|           But, if you insist on having it and using it, you will ALSO need to
 | |
|           install the following module:
 | |
|           
 | |
|                         ssltelnet
 | |
|                         https://pypi.python.org/pypi/ssltelnet | 
