Root access
m (→Modify the gainroot script: Closing tag properly) |
|||
Line 7: | Line 7: | ||
Screenshot added: [http://www.circuitwizard.de/misc/2935.jpg Cracked screen]<nowiki>; </nowiki>[http://maemo.org/pipermail/maemo-users/2006-July/001605.html Screen bug Post]. | Screenshot added: [http://www.circuitwizard.de/misc/2935.jpg Cracked screen]<nowiki>; </nowiki>[http://maemo.org/pipermail/maemo-users/2006-July/001605.html Screen bug Post]. | ||
- | |||
- | |||
== easyroot == | == easyroot == | ||
+ | |||
Install [http://nitapps.com/dists/chinook/user/binary-armel/easyroot_1.0-4_armel.deb easyroot] from [http://nitapps.com/ nitapps.com]. | Install [http://nitapps.com/dists/chinook/user/binary-armel/easyroot_1.0-4_armel.deb easyroot] from [http://nitapps.com/ nitapps.com]. | ||
Line 24: | Line 23: | ||
# Use the root password that the OpenSSH package asked you to enter to log in (in ancient OS versions you had to use the factory default "rootme" password). | # Use the root password that the OpenSSH package asked you to enter to log in (in ancient OS versions you had to use the factory default "rootme" password). | ||
- | = Securing root access = | + | == R&D Mode == |
+ | |||
+ | <small>''Note: As R&D mode has other side effects beyond simply enabling root access (including several that can negatively impact battery life), it is ''not'' the recommended method for gaining root access. Use [[#easyroot|easyroot]] instead.</small> | ||
+ | |||
+ | You can enable the Research & Development mode (R&D or RD mode, which enables you to execute <code>sudo gainroot</code> to get a root shell, simply follow the setup steps for flashing covered in [[Upgrading_tablet_OS#Flashing_your_Nokia_tablet|Upgrading tablet OS]], then execute | ||
+ | |||
+ | sudo ./flasher-3.0 --enable-rd-mode -r | ||
+ | |||
+ | You are now in R&D mode, and the sudo gainroot script's check will be satisfied. | ||
+ | |||
+ | == Securing root access == | ||
At this point you should have gained root access to your device, and be looking at the root prompt: | At this point you should have gained root access to your device, and be looking at the root prompt: | ||
Line 36: | Line 45: | ||
You also still need to secure the root account ("rootme" is a terrible password, and direct root log-in access is not necessarily required). | You also still need to secure the root account ("rootme" is a terrible password, and direct root log-in access is not necessarily required). | ||
- | == Secure future root-level access == | + | === Secure future root-level access === |
- | = | + | ==== Set user password ==== |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | === Set user password === | + | |
Set the [http://en.wikipedia.org/wiki/Password_strength password] for 'user': | Set the [http://en.wikipedia.org/wiki/Password_strength password] for 'user': | ||
Line 137: | Line 123: | ||
*[http://www.vandyke.com/download/securecrt/index.html SecureCRT] | *[http://www.vandyke.com/download/securecrt/index.html SecureCRT] | ||
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY], etc... | *[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY], etc... | ||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
Revision as of 05:35, 1 July 2008
This is an article from the old midgard wiki that hasn't yet been fully updated for this wiki, please update it. Please see the talk page for discussion. |
OK, first, the disclaimer: Doing whatever is stated on this page is not endorsed by Nokia in any way.
Warning: There have been reports of display failures (white with dim vertical stripes) after disabling rd mode and rebooting a new 770. If you get this, there is a hardware failure in your device and you need to return it and get a replacement.
Screenshot added: Cracked screen; Screen bug Post.
Contents |
easyroot
Install easyroot from nitapps.com.
Then, from the shell, run root
. This will give you a root shell.
OpenSSH
- Enabled Extras (if you haven't already).
- Install OpenSSH (client and server).
- SSH into your tablet as root
- For local access, run
ssh root@localhost
- For remote access, run
ssh root@tablet's ip address
- For local access, run
- Use the root password that the OpenSSH package asked you to enter to log in (in ancient OS versions you had to use the factory default "rootme" password).
R&D Mode
Note: As R&D mode has other side effects beyond simply enabling root access (including several that can negatively impact battery life), it is not the recommended method for gaining root access. Use easyroot instead.
You can enable the Research & Development mode (R&D or RD mode, which enables you to execute sudo gainroot
to get a root shell, simply follow the setup steps for flashing covered in Upgrading tablet OS, then execute
sudo ./flasher-3.0 --enable-rd-mode -r
You are now in R&D mode, and the sudo gainroot script's check will be satisfied.
Securing root access
At this point you should have gained root access to your device, and be looking at the root prompt:
#
However, if your wi-fi network is not password protected, so might anyone else near you who has WiFi, SSH and a clue.
You still need to secure root-level access.
You also still need to secure the root account ("rootme" is a terrible password, and direct root log-in access is not necessarily required).
Secure future root-level access
Set user password
Set the password for 'user':
passwd user
Note: when typing a password nothing will be shown on the screen.
Now, for the future, unless you want to keep SSH-ing from another machine, a clever move is to add "user" to sudoers:
echo "user ALL = PASSWD: /bin/su" >> /etc/sudoers
this way your password will be asked in order to become root. Or
echo "user ALL = NOPASSWD: /bin/su" >> /etc/sudoers
in order to become root without having to type your password.
Please keep in mind that password will be cached, so you won't have to type it every time you need to sudo.
Note that if you require a password to become sudo, some built-in apps (notably Application Manager) will appear to not load while they wait silently in the background for the password to be entered. The can be avoided by running a command in the xterm with sudo prior to lauching the app, so as to appease sudo when the OS calls it.
Ok, from now on all you have to do, in your Xterm session, to get root is to write:
sudo su -
Secure the root account
You MUST change (or disable) your root password before continuing!
Else you will be walking around with a device that can be accessed using a TRIVIAL and well known password.
Change root password
To change root password (as root user):
passwd
...when asked, input (twice) your new password.
It is still recommended to limit root logins to local console only in most cases.
Disable root login (highly suggested)
NOTE: Do not perform this step without having completed Step Modify the gainroot script or Set user password
After you gained access as root user:
passwd -l root
In this case, from now on you won't be able to login directly as root user -- not from ssh and not from the local console.
To get a root prompt:
sudo su -
Disabling root login when using OpenSSH
This step is semi optional. Definitely recommended for most installations, though.
When using dropbear as ssh server, you can disable root logins via ssh: just add the option "-w" to DROPBEAR_EXTRA_ARGS in /etc/default/dropbear:
DROPBEAR_EXTRA_ARGS="-w"
After that, restart dropbear:
/etc/init.d/dropbear restart
A remote root login via ssh is then no longer possible. So you have to use the "user" account (you should give the user a password beforehand).
For Windows Users Only
Obviously the same trick works also in Windows, but you have to use a (free or commercial) SSH enabled client:
- Absolute Telnet
- SecureCRT
- PuTTY, etc...