<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ne, TFTP funktioniert. <br>
    Schon etliche Male gemacht<br>
    B.<br>
    <br>
    <div class="moz-cite-prefix">Am 26.07.2018 um 22:21 schrieb heini66:<br>
    </div>
    <blockquote type="cite"
cite="mid:CAGeoTgDFA0KWrUTyOBNcmmTNLDWRx=HnvMSDY+L4MiF=1+b31Q@mail.gmail.com">
      <meta http-equiv="content-type" content="text/html; charset=utf-8">
      <div dir="ltr">
        <div>
          <div>mit nem 1043v5 hab ichs noch nicht verifiziert. vlt hat
            tp link aber was am bootloader geändert.<br>
          </div>
          zur not mal serielle ranklemmen...<br>
        </div>
        angebot: schick her, ich schau ma...<br>
        <br>
        <div>
          <div>
            <div class="gmail_extra"><br>
              <div class="gmail_quote">Am 26. Juli 2018 um 18:49 schrieb
                ZeD <span dir="ltr"><<a
                    href="mailto:zed2010-freifunk@web.de"
                    target="_blank" moz-do-not-send="true">zed2010-freifunk@web.de</a>></span>:<br>
                <blockquote class="gmail_quote" style="margin:0 0 0
                  .8ex;border-left:1px #ccc solid;padding-left:1ex">Hallo,<br>
                  <br>
                  Nach der Anleitung:<br>
                  <br>
                  <a
href="https://nordheide.freifunk.net/wiki/TP-Link_Router_Recovery_per_u-boot-bootloader_mit_tfp-server_ohne_serielle_Console"
                    rel="noreferrer" target="_blank"
                    moz-do-not-send="true">https://nordheide.freifunk.<wbr>net/wiki/TP-Link_Router_<wbr>Recovery_per_u-boot-<wbr>bootloader_mit_tfp-server_<wbr>ohne_serielle_Console</a><br>
                  <br>
                  Kommt nicht mehr als das :( <br>
                  <br>
                  <br>
                  tcpdump -npi enp24s0 udp<br>
                  tcpdump: verbose output suppressed, use -v or -vv for
                  full protocol<br>
                  decode listening on enp24s0, link-type EN10MB
                  (Ethernet), capture size<br>
                  262144 bytes 18:38:08.876535 IP 0.0.0.0.68 >
                  255.255.255.255.67:<br>
                  BOOTP/DHCP, Request from 30:9c:23:04:d6:70, length 300
                  18:38:09.047552<br>
                  IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 350 18:38:13.997862 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  350 18:38:14.062208 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:38:14.198433 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 350 18:38:16.344922 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:38:17.885008 IP6 fe80::d75c:60f5:bb33:e75d.5353
                  > ff02::fb.5353:<br>
                  0 PTR (QM)? _googlecast._tcp.local. (40)
                  18:38:17.885046 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:38:18.886058 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:38:18.886155 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:38:19.144836 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  350 18:38:19.604336 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:38:20.886450 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:38:20.886508 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:38:26.463528 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  350 18:38:27.424464 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:38:43.134264 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 350 18:38:44.052349 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:38:54.086921 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:38:55.334574 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 300 18:38:57.613242 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:38:58.991605 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:39:00.117160 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:00.117229 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:01.118096 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:01.118186 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:03.118871 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:03.118977 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:04.063746 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:39:11.264677 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:39:14.517124 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 350 18:39:27.148127 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:39:39.093423 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:39:40.574627 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 300 18:39:42.220619 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:39:43.624005 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:39:44.731129 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:44.731158 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:45.732243 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:45.732336 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:47.733664 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:47.733753 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:39:48.333943 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:39:56.449324 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:40:13.182053 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 300 18:40:19.024240 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  350 18:40:24.099500 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:40:25.791218 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 300 18:40:28.691343 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:40:29.847912 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:40:30.064017 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:40:30.064071 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:40:31.064883 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:40:31.064973 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:40:33.066092 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:40:33.066182 IP6<br>
                  fe80::d75c:60f5:bb33:e75d.5353 > ff02::fb.5353: 0
                  PTR (QM)?<br>
                  _googlecast._tcp.local. (40) 18:40:33.319958 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  300 18:40:41.493567 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:40:58.026315 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 300 18:41:23.660727 IP
                  0.0.0.0.68 ><br>
                  255.255.255.255.67: BOOTP/DHCP, Request from
                  30:9c:23:04:d6:70, length<br>
                  350 18:42:02.538457 IP 0.0.0.0.68 >
                  255.255.255.255.67: BOOTP/DHCP,<br>
                  Request from 30:9c:23:04:d6:70, length 300
                  18:42:03.431729 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 350 18:42:03.444161 IP
                  192.168.0.1.67 ><br>
                  192.168.0.4.68: BOOTP/DHCP, Reply, length 548
                  18:42:03.444229 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 360 18:42:03.484081 IP
                  192.168.0.1.67 ><br>
                  192.168.0.4.68: BOOTP/DHCP, Reply, length 548
                  18:42:03.867842 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 300 18:42:03.883276 IP
                  192.168.0.1.67 ><br>
                  192.168.0.4.68: BOOTP/DHCP, Reply, length 548
                  18:42:03.883391 IP<br>
                  0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP,
                  Request from<br>
                  30:9c:23:04:d6:70, length 306 18:42:03.923527 IP
                  192.168.0.1.67 ><br>
                  192.168.0.4.68: BOOTP/DHCP, Reply, length 548<br>
                  <br>
                  <br>
                  <br>
                  <br>
                  <br>
                  <br>
                  <br>
                  Am Thu, 26 Jul 2018 17:31:20 +0200<br>
                  schrieb heini66 <<a href="mailto:heini66@gmail.com"
                    moz-do-not-send="true">heini66@gmail.com</a>>:<br>
                  <div class="HOEnZb">
                    <div class="h5"><br>
                      > anleitung zum recover per tftp ohne
                      serielle...<br>
                      > <a
href="https://nordheide.freifunk.net/wiki/TP-Link_Router_Recovery_per_u-boot-bootloader_mit_tfp-server_ohne_serielle_Console"
                        rel="noreferrer" target="_blank"
                        moz-do-not-send="true">https://nordheide.freifunk.<wbr>net/wiki/TP-Link_Router_<wbr>Recovery_per_u-boot-<wbr>bootloader_mit_tfp-server_<wbr>ohne_serielle_Console</a><br>
                      > <br>
                      > <br>
                      > gruss aus der nordheide<br>
                      > <br>
                      > Am 26. Juli 2018 um 16:40 schrieb Oliver
                      Krüger<br>
                      > <<a
                        href="mailto:freifunk@oliverkrueger.de"
                        moz-do-not-send="true">freifunk@oliverkrueger.de</a>>:<br>
                      > <br>
                      > > Hallo ZeD.<br>
                      > ><br>
                      > > Geht um einen TP-LINK TL-WR1043N v5<br>
                      > ><br>
                      > > Wollte dann einfach zurück Flashen auf
                      TP-Link Firmware doch das<br>
                      > > geht wohl nicht so einfach. Sagt Falsche
                      Firmware für Gerät.<br>
                      > ><br>
                      > > <a
                        href="https://www.tp-link.com/de/download/TL-WR1043N.html#Firmware"
                        rel="noreferrer" target="_blank"
                        moz-do-not-send="true">https://www.tp-link.com/de/<wbr>download/TL-WR1043N.html#<wbr>Firmware</a><br>
                      > ><br>
                      > ><br>
                      > > Eigentlich sollte es bei TP-Link Geräten
                      einfach möglich sein, in<br>
                      > > den Konfigurationsmodus [1] zu wechseln
                      und dort unter Erweiterte<br>
                      > > Einstellungen in der Rubrik „Firmware
                      aktualisieren“ eine<br>
                      > > Firmware-Datei des Herstellers
                      hochzuladen. Hierbei ist darauf zu<br>
                      > > achten, dass die Firmware-Datei exakt zu
                      der Hardware-Revision des<br>
                      > > Gerätes passt. (Also eine Datei für den
                      1043v4 kann beispielsweise<br>
                      > > nicht auf den 1043v5 gespielt werden.)<br>
                      > ><br>
                      > > Sollte das nicht mit der Weboberfläche
                      funktionieren, kann man das<br>
                      > > gleiche auch auf der Kommandozeile
                      machen und dort den<br>
                      > > Sicherheitsmechanismus der
                      Revisionskontrolle aushebeln.<br>
                      > > Um auf die Kommandozeile des Knotens zu
                      kommen, muss ggf. vorher ein<br>
                      > > Passwort eingerichtet werden. Siehe [2].<br>
                      > ><br>
                      > > ssh <a class="moz-txt-link-abbreviated" href="mailto:root@xxx.xxx.xxx.xxx">root@xxx.xxx.xxx.xxx</a> (mit der IP
                      Adresse des Knotens)<br>
                      > > cd /tmp<br>
                      > > wget <a
                        href="http://download.adresse.der.firmware/tp-link-firmware.bin"
                        rel="noreferrer" target="_blank"
                        moz-do-not-send="true">http://download.adresse.der.<wbr>firmware/tp-link-firmware.bin</a><br>
                      > > sysupgrade firmwaredatei.bin<br>
                      > > wenn das nicht klappt alternativ:<br>
                      > > sysupgrade -f firmwaredatei.bin<br>
                      > ><br>
                      > > Wenn das alles nicht klappt oder man
                      sich beim Aushebeln des<br>
                      > > Sicherheitsmechnismus eine
                      falsche/defekte Firmware geflashed hat,<br>
                      > > kann man den Knoten noch im sog.
                      Failsafe Modus booten und per TFTP<br>
                      > > eine Firmware installieren. Das zu
                      erklären, würde allerdings den<br>
                      > > Rahmen dieser EMail sprengen. :)<br>
                      > ><br>
                      > > Bei Problemen stehen unsere Türen
                      jederzeit offen. Einfach bei<br>
                      > > unseren Treffen [3] vorbeikommen.<br>
                      > ><br>
                      > > Gruß,<br>
                      > > Oliver<br>
                      > ><br>
                      > ><br>
                      > ><br>
                      > > [1] <a
                        href="https://hannover.freifunk.net/wiki/Freifunk/ConfigMode"
                        rel="noreferrer" target="_blank"
                        moz-do-not-send="true">https://hannover.freifunk.net/<wbr>wiki/Freifunk/ConfigMode</a><br>
                      > > [2]<br>
                      > > <a
href="https://hannover.freifunk.net/wiki/Freifunk/RouterPerSSHAdministrieren"
                        rel="noreferrer" target="_blank"
                        moz-do-not-send="true">https://hannover.freifunk.net/<wbr>wiki/Freifunk/<wbr>RouterPerSSHAdministrieren</a><br>
                      > > [3] <a
                        href="https://hannover.freifunk.net/wiki/Freifunk/Treffen"
                        rel="noreferrer" target="_blank"
                        moz-do-not-send="true">https://hannover.freifunk.net/<wbr>wiki/Freifunk/Treffen</a><br>
                      > ><br>
                      > ><br>
                      > > --<br>
                      > > hannover mailing list<br>
                      > > <a href="mailto:hannover@freifunk.net"
                        moz-do-not-send="true">hannover@freifunk.net</a><br>
                      > > <a
                        href="http://lists.freifunk.net/mailman/listinfo/hannover-freifunk.net"
                        rel="noreferrer" target="_blank"
                        moz-do-not-send="true">http://lists.freifunk.net/<wbr>mailman/listinfo/hannover-<wbr>freifunk.net</a><br>
                      > ><br>
                      > >  <br>
                      <br>
                      -- <br>
                      hannover mailing list<br>
                      <a href="mailto:hannover@freifunk.net"
                        moz-do-not-send="true">hannover@freifunk.net</a><br>
                      <a
                        href="http://lists.freifunk.net/mailman/listinfo/hannover-freifunk.net"
                        rel="noreferrer" target="_blank"
                        moz-do-not-send="true">http://lists.freifunk.net/<wbr>mailman/listinfo/hannover-<wbr>freifunk.net</a><br>
                    </div>
                  </div>
                </blockquote>
              </div>
              <br>
            </div>
          </div>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
    </blockquote>
    <br>
    <pre class="moz-signature" cols="72">-- 
freundliche Grüße

Bernd Schittenhelm
Vorstand FNorden e.V. 
Förderverein freier Netze im Norden 
</pre>
  </body>
</html>