Jump to content
XPEnology Community

Trial of Nanoboot (4493) - 5.0.3.1


Recommended Posts

Can someone point me to instructions on how to upgrade Gnoboot with 4458U2 to Nanoboot 4493U2 without losing data on my array? I tried searching the forum threads but did not find anything.

 

Thanks :smile:

 

1. Create a new USB stick with nanoboot 5.0.3.1 (you can use Rufus to write the ISO to the flash)

2. Download the latest .pat from Synology for your type of machine

3. Re-Boot from the new nanoboot USB flash

4. Select from the boot list Upgrade

5. Navigate to http//yournasip:5000 and follow the on-screen wizard but at a certain point use the MIGRATE MY FILES from the wizard. If you don't know he nas's IP address just use Synology Assistant to find it.

After a successful migration, just use the update menu from DSM's Control Panel to update to Update 2

6. Good luck!

 

 

Sent from my iPhone using Tapatalk

Link to comment
Share on other sites

Can someone point me to instructions on how to upgrade Gnoboot with 4458U2 to Nanoboot 4493U2 without losing data on my array? I tried searching the forum threads but did not find anything.

 

Thanks :smile:

 

1. Create a new USB stick with nanoboot 5.0.3.1 (you can use Rufus to write the ISO to the flash)

2. Download the latest .pat from Synology for your type of machine

3. Re-Boot from the new nanoboot USB flash

4. Select from the boot list Upgrade

5. Navigate to http//yournasip:5000 and follow the on-screen wizard but at a certain point use the MIGRATE MY FILES from the wizard. If you don't know he nas's IP address just use Synology Assistant to find it.

After a successful migration, just use the update menu from DSM's Control Panel to update to Update 2

6. Good luck!

 

 

Sent from my iPhone using Tapatalk

Link to comment
Share on other sites

I had asked you this question on another thread but didn't get a chance yet to upgrade. Now that there is a newer version of nanoboot, I would like to ask and confirm if I can use your steps to upgrade directly from Trantor 4.3 3810 ?? I hope migration will work on that as well. Is it safe to do so ?? Also which pat file do I need to download for this...

Tx.

 

1. Create a new USB stick with nanoboot 5.0.3.1 (you can use Rufus to write the ISO to the flash)

2. Download the latest .pat from Synology for your type of machine

3. Re-Boot from the new nanoboot USB flash

4. Select from the boot list Upgrade

5. Navigate to http//yournasip:5000 and follow the on-screen wizard but at a certain point use the MIGRATE MY FILES from the wizard. If you don't know he nas's IP address just use Synology Assistant to find it.

After a successful migration, just use the update menu from DSM's Control Panel to update to Update 2

6. Good luck!

 

 

Sent from my iPhone using Tapatalk

Link to comment
Share on other sites

I had asked you this question on another thread but didn't get a chance yet to upgrade. Now that there is a newer version of nanoboot, I would like to ask and confirm if I can use your steps to upgrade directly from Trantor 4.3 3810 ?? I hope migration will work on that as well. Is it safe to do so ?? Also which pat file do I need to download for this...

Tx.

 

1. Create a new USB stick with nanoboot 5.0.3.1 (you can use Rufus to write the ISO to the flash)

2. Download the latest .pat from Synology for your type of machine

3. Re-Boot from the new nanoboot USB flash

4. Select from the boot list Upgrade

5. Navigate to http//yournasip:5000 and follow the on-screen wizard but at a certain point use the MIGRATE MY FILES from the wizard. If you don't know he nas's IP address just use Synology Assistant to find it.

After a successful migration, just use the update menu from DSM's Control Panel to update to Update 2

6. Good luck!

 

 

Sent from my iPhone using Tapatalk

 

Worked for me .. came from Trantor 4.3 XXXX

 

So far nanoboot kick azz

Link to comment
Share on other sites

After upgrade my xpenology from gnoboot to nanoboot in my root folder there are two files:

"ccmmdd" ( execute binary elf ) and 'task1" and log file from wget:

 

--2014-06-28 15:46:19-- http://124.173.114.175:8080/task1

Connecting to 124.173.114.175:8080... connected.

HTTP request sent, awaiting response... 200 OK

Length: 5100983 (4.9M) [application/octet-stream]

Saving to: `task1'

 

^M77% [=============================> ] 3,938,262 170K/s eta 15s $

 

2014-06-28 15:47:15 (88.9 KB/s) - `task1' saved [5100983/5100983]

 

This site http://124.173.114.175:8080 is from China and include several files:

 

arm 968.02 KB 2014-6-15 18:51:54 3

ccmmdd 1.10 MB 2014-6-27 1:22:06 124 >>>>>>> this is in my root folder

guchun24 4.86 MB 2014-6-16 6:35:58 3

guchun26 1.77 MB 2014-6-15 18:17:54 3

mips 1.10 MB 2014-6-15 18:57:54 3

server 4.86 MB 2014-6-26 2:58:16 1

server.exe 201.41 KB 2014-6-25 11:26:08 31

task1 4.86 MB 2014-6-28 19:34:01 9 >>>>>> and this file too

 

Can anyone else confirm the download of these files, and if anyone knows what they are?

I'm beginning to doubt the honest intentions of the developer nanoboot.

Link to comment
Share on other sites

thanks for the heads up.

...time to refresh Ole Faithful (Trantor 4.3-3810) with new TBs and power off the NANOBOT. I didn't need two of these things anyway. blocking the IP 124.173.114.175 is good for about 3 seconds. If NANOBOT has the same taste in Porn then he/she/they should be pretty pleased, I dare say there is not a torrent file NB doesn't already have. I have not and never will go Quick Connect whether I own a SYNOLGY box or XPENOLOGY, at least not until I have 2 separate networks in house.

 

Good Luck and have fun storming the Castle

MF

Link to comment
Share on other sites

A little info this mysteriuos IP:

 

Current IP Range:

124.173.114.0 - 124.173.114.255

 

IP Range Location: China, Guangdong, Guangzhou

IP Owner: World Crossing Telecom(Guangzhou) Ltd

Owner Full IP Range:

124.173.0.0 - 124.173.255.255

Owner Address: 17/fl, International Bank Center, 191# Dongfengxi Rd. Guang Zhou, China

Owner Country: China

Owner Phone: +86-20-81351813

Owner Website: www.gzidc.com, www.cnnic.cn

All Owner IP Ranges: 124.172.0.0 - 124.175.255.255, 58.66.0.0 - 58.67.255.255, 203.88.208.0 - 203.88.223.255, 203.88.200.0 - 203.88.207.255, 59.107.0.0 - 59.107.255.255, 58.67.128 … … [see all]

All Owner IP Reverse DNS (Host)s: 124.172.147.78, 58.66.176.122, 203.88.210.158, 203.88.202.138, 59.107.172.0, 58.67.197.39, 124.172.238.226, 124.173.145.88

Whois Record Updated: 28 Apr 2008

Link to comment
Share on other sites

Are you sure that is a Nanoboot Problem ??

I think that isn't from Nanoboot, i think your System was hacked.

It seems that is the classic Syno Hack Problem, because there were several security holes

in the last Releases...

 

My NAS is in local network, only public access is via ports 5001(gui web )and 8000(pyload) ssh is only route to router not nas, so explain me how could infect synology and about which vulnerabilities are writing ?

Link to comment
Share on other sites

Can anyone explain me please, what are these processes using memory?

/usr/bin/httpd -DSSL -DSPDY -DHAVE_PHP

php-fpm: pool www

php-fpm: pool www

php-fpm: pool www

php-fpm: pool www

/usr/bin/httpd -DSSL -DSPDY -DFrameOptions

 

11kihsi.jpg

 

 

I have only this process:

/usr/bin/httpd -DSSL -DSPDY -f

Link to comment
Share on other sites

probably because just yabba235's box was hacked :smile:

 

Not a Lunix guy so assistance or confirmation required.

> Putty to DSM5

> Login is as Root

> Enter ls -l /etc

> Contents of Root displayed

No suspect files or at least not the files as seen be yabba235

 

Cheers

MF

Link to comment
Share on other sites

Look here:

 

http://www.symantec.com/connect/blogs/r ... rabilities

Same Problem with Port 5001...

 

or here:

 

http://www.cvedetails.com/vulnerability ... ology.html

http://web.nvd.nist.gov/view/vuln/detai ... -2013-6955

 

It is/was EXTREMLY dangerous to connect any Syno Device to the Internet without the actual DSM Patches.

There are so many Security Holes in the past Releases of DSM.

Link to comment
Share on other sites

"It is/was EXTREMLY dangerous to connect any Syno Device to the Internet without the actual DSM Patches."

 

Yes, I know and i use dsm 5 4493-update 2 so actual patches is it here.

 

"There are so many Security Holes in the past Releases of DSM."

Yes, but not in DSM 5 - you have provided links to threats to the previous version of DSM ( < 5, not DSM 5)

 

BTW Nothing more I can do :smile: last update installed :smile:

 

The only difference between the systems is that I'm using the hacked version of the DSM, so I am not surprised that I was hacked

Edited by Guest
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...