What's new

DHCP Backup

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

dont seem to work i just get a locked ui
nvram set dhcp_staticlist=`cat /mnt/sda1/tmp/dhcp.txt

This Worked
nvram set dhcp_staticlist="$(cat /mnt/sda1/tmp/dhcp.txt)"
 
Last edited:
Other ways:

Use this script

dhcpstaticlist.sh​



Or use
 
Other ways:

I believe @TrebleTA wants a working solution in both Asuswrt and Asuswrt-Merlin firmware. Manual in ssh is the only option left for Asuswrt. No scripts, recently no SCP available.
 
I believe @TrebleTA wants a working solution in both Asuswrt and Asuswrt-Merlin firmware. Manual in ssh is the only option left for Asuswrt. No scripts, recently no SCP available.
Why not use:

### WRT Settings ###

"Allows you to view (and edit) NVRAM configuration files for AsusWRT (including
Merlin’s variant), Tomato and DD-WRT."

https://www.medo64.com/wrtsettings/

It is easy to view an RT settings export file. Then copy and paste into notebook ++ or excel to search. It's all there.

Although I have not tried, the author of the tool claims that edited settings files may be uploaded too.
 
### WRT Settings ###

Not sure if this one is going to work on newer Asuswrt and hardware. The screenshot shows 2014 date and the routers mentioned are 10 years old. Newer Asuswrt uses encrypted passwords, for example.
 
Why not use:

### WRT Settings ###

"Allows you to view (and edit) NVRAM configuration files for AsusWRT (including
Merlin’s variant), Tomato and DD-WRT."

https://www.medo64.com/wrtsettings/

It is easy to view an RT settings export file. Then copy and paste into notebook ++ or excel to search. It's all there.

Although I have not tried, the author of the tool claims that edited settings files may be uploaded too.
I'm not comfortable trusting a generic third party tool for something as critical as reloading all of my router's settings. I use that tool occasionally but only to read the config not to write it. The program hasn't been updated in a significant way since 2017 and I don't trust that Asus haven't changed the file format is some way that the program can't handle. So I see no point in using it for updating settings when there are easy alternatives that are part of the firmware.
 
So I see no point in using it for updating settings when there are easy alternatives that are part of the firmware
A fair statement.
I too was (and still am) concern about any kind of upload with the tool. Yet I have recently used it to see the differences between my AX88U FW updates. At least it is an easy way without SSH to see all my static IP assignments without taking multiple screen shots :) .
 
Newer Asuswrt uses encrypted passwords, for example
I can see my RT password with the ### WRT Settings ### tool o_O
 
I can see my RT password with the ### WRT Settings ### tool o_O

So your router model/reset firmware(?) must not be encrypting the admin password.

OE
 
Last edited:
I don’t know when and where the encryption happens. Seeing the password in plain text is not what I would expect though.
 
Seeing the password in plain text is not what I would expect though.
Rechecked. Confirmed, can see pwd with ### WRT Settings ### tool. :cool:

Change User and Pwd. Now encrypted and does not show in ### WRT Settings ### tool. :)
Code:
http_passwd=xxxxxxxx
http_username=xxxxxxxx
 
And there is no import from this point. You won’t be able to login anymore.
 
Thanks all for the feedback. The two SSH commands I find nice simple and easy. Can even do on the go. Rest of my setting are minor and can take 5 min to do.
 
Rechecked. Confirmed, can see pwd with ### WRT Settings ### tool. :cool:

Change User and Pwd. Now encrypted and does not show in ### WRT Settings ### tool. :)
Code:
http_passwd=xxxxxxxx
http_username=xxxxxxxx
The tool does show decrypted passwords. However, if when you saved your settings file you had ticked "Click on this checkbox if you want to share the config file for debugging. Since the original password in the config file will be removed, please do not import the file into your router." they are replaced in the file with "x"s.
 
Last edited:
Is there any info available on the type of encryption that is used for the password? I'm trying to figure out how to reverse it so that a script can read the password stored in nvram.

Thanks,
Harry
 
Is there any info available on the type of encryption that is used for the password? I'm trying to figure out how to reverse it so that a script can read the password stored in nvram.
If ASUS are even halfway competent (hardly a given in this context), it won't be reversible because it's not encryption at all but a one-way hash function.

(Digression: you might be able to guess a string that hashes to the same hash code, which'd let you log in; but the odds of it being the same as the user's real password are tiny. The reason this approach is considered the minimum acceptable standard nowadays is that it protects users who are silly enough to use the same password for multiple services. Even if you get their hashed password out of service X and are able to reverse-engineer some string with the same hash (after much computation), it likely won't let you into their account on service Y.)

I gather from reading this thread that they used to not obscure the stored password at all, which is several steps below awful. I hope that when they fixed that, they brought it up to something approaching minimum-acceptable-practice-for-the-last-couple-decades, which would be hashing not true (i.e. reversible) encryption.
 

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top