That's because you omitted the closing backquote.dont seem to work i just get a locked ui
nvram set dhcp_staticlist=`cat /mnt/sda1/tmp/dhcp.txt
This is the preferred syntax nowadays. The use of backquotes has been depreciated.This Worked
nvram set dhcp_staticlist="$(cat /mnt/sda1/tmp/dhcp.txt)"
Thank youThat's because you omitted the closing backquote.
This is the preferred syntax nowadays. The use of backquotes has been depreciated.
Yes that's right, as I am swaping between different versions of firmware be offical, merlin or beta.I believe @TrebleTA wants a working solution in both Asuswrt and Asuswrt-Merlin firmware. Manual in ssh is the only option left for Asuswrt. No scripts, recently no SCP available.
Why not use:I believe @TrebleTA wants a working solution in both Asuswrt and Asuswrt-Merlin firmware. Manual in ssh is the only option left for Asuswrt. No scripts, recently no SCP available.
### WRT Settings ###
I'm not comfortable trusting a generic third party tool for something as critical as reloading all of my router's settings. I use that tool occasionally but only to read the config not to write it. The program hasn't been updated in a significant way since 2017 and I don't trust that Asus haven't changed the file format is some way that the program can't handle. So I see no point in using it for updating settings when there are easy alternatives that are part of the firmware.Why not use:
### WRT Settings ###
"Allows you to view (and edit) NVRAM configuration files for AsusWRT (including
Merlin’s variant), Tomato and DD-WRT."
https://www.medo64.com/wrtsettings/
It is easy to view an RT settings export file. Then copy and paste into notebook ++ or excel to search. It's all there.
Although I have not tried, the author of the tool claims that edited settings files may be uploaded too.
A fair statement.So I see no point in using it for updating settings when there are easy alternatives that are part of the firmware
I can see my RT password with the ### WRT Settings ### toolNewer Asuswrt uses encrypted passwords, for example
I can see my RT password with the ### WRT Settings ### tool
Rechecked. Confirmed, can see pwd with ### WRT Settings ### tool.Seeing the password in plain text is not what I would expect though.
http_passwd=xxxxxxxx
http_username=xxxxxxxx
The tool does show decrypted passwords. However, if when you saved your settings file you had ticked "Click on this checkbox if you want to share the config file for debugging. Since the original password in the config file will be removed, please do not import the file into your router." they are replaced in the file with "x"s.Rechecked. Confirmed, can see pwd with ### WRT Settings ### tool.
Change User and Pwd. Now encrypted and does not show in ### WRT Settings ### tool.
Code:http_passwd=xxxxxxxx http_username=xxxxxxxx
Change User and Pwd. Now encrypted and does not show in ### WRT Settings ### tool.
If ASUS are even halfway competent (hardly a given in this context), it won't be reversible because it's not encryption at all but a one-way hash function.Is there any info available on the type of encryption that is used for the password? I'm trying to figure out how to reverse it so that a script can read the password stored in nvram.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!