Posts Tagged ‘Linux’

Buildroot Linux on the Pandaboard Rev. 3

March 13, 2014 Leave a comment

At my work I have to develop software for the Pandaboard. Unfortunately there are a lot of false or incomplete information on how to build/run U-Boot and/or the Linux kernel on the Pandaboard. Most of the false information is due to the fact, that a lot of people own a Pandaboard ES and just write something like: “How to build Linux for the Pandaboard”, when it should state “…for the Pandaboard ES.
This tutorial is all about booting Linux on the Pandaboard Rev. 3 with the TI Omap 4430. You can easily check which version of the Pandaboard you have, by flipping it over to the backside. In the picture below you see a photo of my Pandaboard Rev. 3.

Pandaboard Rev. 3

Pandaboard Rev. 3

Builroot GIT
Unfortunately the GIT repository of Buildroot is incredibly slow, but once you have cloned the repository with

git clone git://

you are ready to go.

Linux .config
Before we start configuring our target system, we have to fetch a working configuration for the Linux kernel. I have prepared a .config for the Linux kernel 3.9.11 which boots on my Pandaboard Rev.3.

cd buildroot
wget -O panda_config

Now we have a working config and can start setting up the rest of our target system.

Buildroot configuration for the Pandaboard
First we have to configure Buildroot to build an uImage (Linux Kernel), a MLO binary (second stage bootloader) and an u-boot.bin (third stage bootloader). To start the configuration we have to change into the newly created directory and call the following

make menuconfig

Once we are in the settings we can start configuring our system.

Target options
The Target options menu defines the overall target architecture (and some additional settings). The entries should look like

    Target Architecture (ARM (little endian)) —>
    Target Architecture Variant (cortex-A9) —>
    Target ABI (EABI) —>
[ ] Enable NEON SIMD extension support
    Floating point strategy (Soft float) —>
    ARM instruction set (ARM) —>

The Kernel menu allows us to customize our Linux kernel. In the entry Configuration file path we specify our previously downloaded Linux Kernel configuration. The target binary should be an uImage, because that’s the image type U-Boot can easly recognize and load. The load address is somewhere in the RAM of the Pandaboard (start of RAM is 0x80000000). Everything else can be taken from below

[*] Linux Kernel
      Kernel version (Custom version) —>
(3.9.11) Kernel version
()   Custom kernel patches
      Kernel configuration (Using a custom config file) —>
(panda_config) Configuration file path
      Kernel binary format (uImage) —>
(0x80008000) load address (for 3.7+ multi-platform image)
[ ]  Device tree support
      Linux Kernel Extensions —>

Filesystem images
To make the boot process easier we link a RAM disk into the Linux kernel. This increases the size of the uImage but adds the convenience that we only have to load one image.

[ ] cloop root filesystem for the target device
-*- cpio the root filesystem (for use as an initial RAM filesystem)
      Compression method (no compression) —>
[ ]   Create U-Boot image of the root filesystem
[ ] cramfs root filesystem
[ ] ext2/3/4 root filesystem
[*] initial RAM filesystem linked into linux kernel
[ ] jffs2 root filesystem
[ ] romfs root filesystem
[ ] squashfs root filesystem
[ ] tar the root filesystem
[ ] ubifs root filesystem

Newer U-Boot versions can create the second stage bootloader for the Pandaboard, in addition to the actual third stage bootloader (U-Boot). So we don’t have to enable X-loader in the Buildroot configuration. As a source for U-Boot we use Linaro’s customized U-Boot repository. We check out the required branch and load the correct Board definition (omap4_panda).

[ ] Barebox
*** gummiboot needs a toolchain w/ largefile, wchar ***
[ ] mxs-bootlets
[*] U-Boot
(omap4_panda) U-Boot board name
      U-Boot Version (Custom Git repository) —>
(git:// URL of custom reposito
(2011.11.2) Custom repository version
()    custom patch dir
U-Boot binary format (u-boot.bin) —>
[ ]   produce a .ift signed image (OMAP)
[ ]   Custom Network Settings —-
[ ]   U-Boot SPL support
[ ]   Environment image —-
[ ] X-loader

Once we are done with the configuration we save the settings…

Saving the menuconfig

…and then we can build everything, by calling


When everything is done, we can find the binaries in the following folders

  1. uImage - output/images
  2. u-boot.bin - build/uboot-2011.11.2
  3. MLO - build/uboot-2011.11.2

U-Boot boot script
Before we copy everything to an SD card we create a small U-Boot script to automate the boot process. Just copy the below text into a file called boot_mmc.txt.

setenv bootargs ‘root=/dev/mmcblk0p2 rw rootwait rootfstype=ext3 console=ttyO2,115200n8 vram=16M’
fatload mmc 0 82000000 uImage
bootm start 82000000
bootm loados
bootm go 82000000

Afterwards execute the following command to create the boot.scr script

mkimage -A arm -O linux -T script -C none -a 0 -e 0 -n “Panda SD Boot” -d boot_mmc.txt boot.scr

Now we put an SD card into our PC, format it to FAT32 and enable the boot flag. For this job I usually use gparted. But feel free to use the tool of your choice.

Afterwards we copy all files to the SD card

mount /dev/sdc1 /media/sd_card
cp /output/build/uboot-2011.11.2/MLO /media/sd_card
cp /output/build/uboot-2011.11.2/u-boot /media/sd_card
cp /output/images/uImage /media/sd_card
cp /boot.scr /media/sd_card

Finally put in the SD card and see the system boot.

My Pandaboard in action

My Pandaboard in action

That’s it now you should have a running Linux setup for the Pandaboard.

Have fun & Happy hacking!


Linux not From Scratch – But Debian

February 8, 2013 1 comment

I’m a huge fan of the APT package management system, but I don’t like the trend where Canonical is going with Ubuntu and I’m not really a fan of Gnome3. Therefore, I was looking for something based on the APT package management system which is neither Ubuntu/Unity nor Gnome3.

My idea was to take a minimal Debian testing installation and customize it to my needs. No sooner said than done!


I already had a running Linux system on my Laptop, so I was able to prepare the boot medium directly from this machine. But the following steps can also be performed from a Windows or Mac machine, because UNetbootin is available for all these three operating systems (my boot medium had to be a USB stick because my X220 doesn’t have a CD/DVD drive).

I started my plan by installing two necessary packets

sudo apt-get install gparted unetbootin

Then I started gparted and created a fat32 partition on my USB stick. Afterwards I started UNetbootin and selected Debian testing x86_64 hd_media as my target system. Once finished I downloaded the first DVD of the Debian testing release


and stored it on the USB sticks root directory along with the stuff that UNetbootin put on it. Now, some of you might ask why I didn’t use the much smaller network installer and instead downloaded the whole DVD image when I only wanted to use a minimal set of applications. In my defense, I tried the network installer first, but I had some problems with it. The running Kernel lacked support for LVM, disk encryption and my SSD wasn’t recognized.
Once done preparing my USB stick I plugged it into the X220 and rebooted the system. During boot I held down the blue ThinkVantage-button, then hit F12 to select a temporary Boot device. From the menu I selected my USB stick and started the Debian installer.


I went through the default Debian installation (I used my entire disk with LVM and full disk encryption) up to the software selection dialog. There I only selected the following:

[ ] Desktop environment
[ ] Web server
[ ] Print server
[ ] DNS server
[ ] File server
[ ] Mail server
[ ] SQL server
[*] SSH server
[*] Laptop
[*] Standard system utilities

I didn’t want a graphical system just yet, because I didn’t want one of the bloated environments like Gnome or KDE. I just selected some essential components (Even the SSH server is optional. I use it quite often therefore I enabled it, but it isn’t a must-have).


After installing a basic system it was time for me to boot my newly created system. After logging in I installed a set of tools

sudo apt-get install i3 vim-gtk zsh rxvt-unicode build-essential xinit

The package build-essential is also optional. I’m a developer so I need it. Maybe I forgot some packages, just install them as you need them.

That was basically it, now I was able to start the GUI by executing


My window manager should be plain, simple and easy to configure, so I decided to use i3wm. It’s a tiling window manager which provides a lot of cool features. The first usage of i3wm might be a little bit unfamiliar but once you get used to it, it’s very powerful. Here is a quick introduction to i3wm.
You have one Super key, upon first start you can decide which one to use, either ALT-key or Windows-key (I simply refer to it as Super key). There are only a handful shortcuts you need to know in order to navigate through the system.

Super+d Start application
Super+Number Switch between workspaces
Super+cursor left/right Switch active window
Super+w window takes entire screen
Super+e windows side-by-side

For a more complete reference check the keybindings page on For now I wanted to spawn a shell, so I hit Super+d, typed urxvt in the appearing bar and hit Enter.

The default installation of i3wm didn’t look very appealing, so I wrote my own config file. I stored it in ~/.i3/config and the config file for the i3status bar in /etc/i3status.conf. I overwrote the existing files. Now I was able to just hit Super+r to reload the GUI and everything looked a lot better. It might be necessary to install additional fonts (I don’t remember exactly =P). If so, just run

sudo apt-get install xfonts-base

I added the following line in my ~/.i3/config to show my wallpaper.

exec feh –bg-scale /home/jester/Pictures/24.jpg

Before I did any additional configuration work, I wanted to switch to a better shell. In the beginning I had already installed the zsh. Now I just wanted a good configuration. Luckily there is a guy (Robbie Russell) who does this for us. I had to fetch oh-my-zsh from Github (on the bottom of the Github page are further installation instructions). After installing this framework I opened my ~/.zsh and changed the following lines:

plugins=(git debian cp)

to enable the cool git feature which you will see in the screenshot below, and also some aliases for aptitude. Oh-my-zsh contains several themes, I decided to use geoffgarside. So I added the following line


All themes can also be browsed here. Just select the one you like.

For a consistent color scheme I had to write my own ~/.Xdefaults file to have cool colors and transparency in the urxvt terminal windows. After storing the file in ~/.Xdefaults I was able to apply the changes by calling

xrdb ~/.Xdefaults

When I spawned a new shell the background was transparent, the wallpaper was visible and the colors matched the ones in the i3bar.

Instead of installing vim I installed vim-gtk, because with vim-gtk allows to navigate with the mouse and copy/paste text into/out of vim easily by selecting the text. For an even better experience, I wrote my own ~/.vimrc. I just stored this file in ~/.vimrc to have a solid vim configuration.


The following screenshot shows my fully configured system. In the bottom right I have vim open so that you can see the colors, and the status bar in vim. On the top left you can see the zsh (with oh-my-zsh) and its git integration. I’m currently in a directory which contains a git tree (Linux kernel), so thanks to the plugin I can see on which branch I’m currently on. On the left side I simply run Firefox with my start page. On the bottom you can see the i3bar showing system information (e.g. IP address, battery level, CPU temperature, etc.). Also in the i3bar in the far right corner you can see that I’m running Pidgin and Dropbox. It’s pretty neat that the i3bar supports applications with notification icons.


Several parameters in my configuration files are device depended.

If the i3wm doesn’t start correctly check the file /etc/X11/xinit/xinitrc. Mine looks like

# /etc/X11/xinit/xinitrc
# global xinitrc file, used by all X sessions started by xinit (startx)

# invoke global X session script
. /etc/X11/Xsession

Volume Up/Down keys
In my ~/.i3/config I have mapped two keys for volume up and down and another one to mute the sound

bindsym XF86AudioRaiseVolume exec amixer -c 0 — sset Master playback 3.22dB+
bindsym XF86AudioLowerVolume exec amixer -c 0 — sset Master playback 3.22dB-
bindsym XF86AudioMute exec /usr/local/bin/toggle-mute

These keys might differ depending on the used device. With the tool xev it is possible to capture the correct key events and compare them with the mapping table (xmodmap -pk). It might be necessary to write a new ~/.Xmodmap. I didn’t need to do this, therefore I can’t explain it. But there are plenty of information on the web about that.

Have fun!

Categories: tech foo Tags: , , ,

Debian on Android/Atrix with Debootstrap (Part III)

July 22, 2012 1 comment

As an extension to my previous post I will now explain how to make all the stuff persistent. You then do not need to retype the whole stuff to start the VNCServer every time you restart your phone. Just put the following script into the folder /etc/init.d/ of your chroot:


export HOME=”/root”
export USER=”/root”

STARTCMD=”vncserver -geometry 960×540″
STOPCMD=”vncserver -kill :1″

case $1 in
        if [ -e /tmp/.X1-lock ]; then
            echo “VNCServer already running”
        echo “$0 start|stop|restart”
        exit 1

exit 0

Afterwards you are able to start and stop the VNCServer, with the commands

service vncserver start


service vncserver stop

This allows starting, stopping and restarting the server.
To actually start the server when you switch into your chroot, you have to autostart it. The following way is not best practice (don’t let a Linux guru know ;-)). But for us it is working:

echo “service vncserver start” >> /root/.bashrc

or (when you don’t want to get the “VNCServer started…” message everytime you log into your chroot)

echo “service vncserver start > /dev/null 2>&1” >> /root/.bashrc

When you call “bootdebian” in your shell, the VNCServer will automatically start and you can connect to it via your favorite VNCClient.
Have fun!

Debian on MacOSX with VirtualBox in Headless Mode

Orignally I was searching for a way to build Buildroot images on MacOSX. Because my IMac has much more power than my Thinkpad X220i (i5 Quad-Core vs. i3 Dual Core). Therefore I tried to install all “build-essentials” (the Debian/Ubuntu users know what I mean) via MacPorts. Unfortunately some packets aren’t available through MacPorts, and missing packets aren’t the only problem, the fact that MacOSX not always complies to standards makes it hard/impossible to create uImages with Buildroot on MacOSX. Thus I was searching for a way to have a full Debian system available on my Mac.

My First idea was a Debian Chroot, but in my knowledge there is no way to get a Debian Chroot to run on MacOSX (although there is a Debian port for the Mach Microkernel). My second thought was then a Virtual Machine. I know with a VM I loose a lot of performance. But I gave it a try, because while my Mac executes build tasks I still can use my Laptop without any constrains and do something else at the time.

Therefore I was looking for an approach to have an “always on” Debian on my Mac (By “always on” I mean, starts when I boot my system, and runs in the background without needing too much CPU cycles when idling). At first I tried to automate the start of the VirtualBox application during boot. But I don’t wanted to have the running application always in my sidebar (two times actually, first, the VirtualBox icon itself, and second the VM icon).

Luckily on a website I found an explanation on how to start a VM in headless mode with VirtualBox’s command line tools. First I downloaded the Debian Netboot image (16MBytes), then I started the VirtualBox application and set up a new Linux system (For the name I chose “debian_shell”, I set the amount of Ram to 2Gbytes (from my 4GBytes) and for the harddisk I selected 8GBytes “dynamically allocated”. Afterwards I booted the downloaded Debian Netboot image to install a minimal system. During installation, in the packet selection screen I deselected “Desktop” and selected “SSH Server”. It was important for me to only have a terminal based system no X window overhead. That was it for now, my system was installed, configured and ready to be used.
After finishing the installation I configured the network behavior of my guest system (In the VirtualBox application “Right Click->Settings” on the “debian_shell” entry, then “Click” on “Network->Adapter1->”Port Forwarding”). I added an entry like the following to forward SSH connection attempts on my host machine on port 9003 to the default SSH port (22) on the guest system.


Then I created a small shell script with the following content to start my VM in headless mode.

RUNNING=`ps aux | grep -v grep | grep VBoxHeadless | cut -d ' ' -f 1`

if [ x$RUNNING == "x" ]; then
    VBoxHeadless --startvm debian_shell --vrdp=off > /dev/null 2>&1 &
    sleep 10
ssh death-jester@ -p 9003

I stored this script under “/usr/local/bin” with the name “debian”. Now when I called the script, it checked if the VM was already running if not it started the VM, and then logged into the machine via SSH, if the VM already ran it just logged in. For a more comfortable login I also stored the public key of my host-machine on the guest system.

Now have fun with your new “headless” Virtual Machine.

L4Linux Patch for MV643xx Ethernet

April 12, 2012 2 comments

A while ago I posted a tutorial on how to run Linux virtualized on top of L4 on the Sheevaplug. But one problem with the solution is that Sheevaplug’s hardware components (e.g. network, sd-card, etc.) aren’t working out of the box. In the menuconfig of L4Linux you can’t even select the driver (…for L4 architecture). So for all who want to run L4Linux on the Sheevaplug and want to use the physical network interface, this patch is for you mv643xx.patch. Copy the patch beside your ‘L4Linux’ folder and call

patch -p0 < mv643xx_eth.patch

to patch your Linux tree. Then enable

Device Drivers -->
    Network device support -->
        Ethernet (1000 Mbit) -->
            Marvell Discovery (643XX) and Orion ethernet support

in your ‘menuconfig’ and use the following configuration when you build your L4 image (at least the *.io file)


modaddr 0x01100000

entry L4Linux ARM
kernel fiasco -serial_esc
roottask moe rom/l4lx.cfg
module l4re
module ned
module l4lx.cfg
module io
module vmlinuz.arm
module ramdisk.rd

  NIC => new Device()
    .hid = "mv643xx"; 
    new-res Mmio(0xF1000000 .. 0xF100FFFF);
    new-res Mmio(0xF1020000 .. 0xF102FFFF);
    new-res Mmio(0xF1070000 .. 0xF107FFFF);
    new-res Irq(46);
    new-res Irq(11);

  DMA => new Device()
    .hid = "dmamem";
    new-res Mmio_ram(8388608,0);

l4lx_bus => new System_bus()
  DMA => wrap(hw-root.DMA);
  NIC => wrap(hw-root.NIC);


-- vim:set ft=lua:


local io_caps = {
    sigma0 = L4.cast(L4.Proto.Factory, L4.Env.sigma0):create(L4.Proto.Sigma0);
    l4lx_bus = L4.default_loader:new_channel():svr();
    icu =;

local linux_caps = {
    log  = L4.Env.log:m("rws"),
    vbus = io_caps.l4lx_bus    

    caps = io_caps,
    log = { "io", "blue" }
}, "rom/io -vvv rom/");

    caps = linux_caps,
    log = {"l4linux", "yellow"},
    l4re_dbg = L4.Dbg.Warn
}, "rom/vmlinuz.arm mem=64M console=ttyLv0 l4x_rd=rom/ramdisk.rd \
root=1:0 ramdisk_size=11000 rw");

Depending on the name/size of your ramdisk you have to adapt the parameters in the config files.

The patch is tested and working, I’m using the device every day. But sometimes L4Linux jumps into the debugger JDB with the message ‘IRET returned’, I’m not 100% sure if the problem arises from my patch but could be. When this happens, restarting the device is your only chance. When you are in the debugger hit ‘^^’ twice to restart.
Leave a comment when you have questions about the patch…

Have fun!

Categories: tech foo Tags: , , , ,

TP-Link WR1043ND + OpenWRT + OpenVPN

November 25, 2011 1 comment

The Story

Yesterday I went to my local computer store (k&m computer) to buy a four port switch to connect some of my devices at home. But after some time in the store I decided to buy a TP-Link WR1043ND, because it cost 48 euro instead of 20 euro for a 4-port switch. And while I was in the store I checked whether OpenWRT would run on this device. The first link I found on Google was how to install OpenWRT on the TL-1043ND. So the decision was made.

The Setup

I’m living in a WG and my flatmate handles everything related to our Internet connection because he is paying for it and I’m just allowed to use it via WLAN. I wanted my own home network behind our Internet router to have a secure encapsulated network for all my private devices. So my setup looks like in the graphic taken from the OpenWRT wiki.

But I didn’t want just an encapsulated network apart from the rest of the net, I also wanted some way to access this network from the outside. For SSH access to my iMac. Since OpenVPN was the first VPN service that came to my mind I decided to use this one.

Installing OpenWRT on WR1043ND


Installing OpenWRT on the Wr1043ND is pretty simple:

  1. Pull the latest version of OpenWRT from their FTP server
  2. Now connect your computer to the WR1043ND via the included network cable and disable all other connections on your computer like wifi, 3g, etc.
  3. Open up a web browser and type into the address bar, the web interface of the WR1043ND should appear. Default password and username are admin:admin
  4.  Now navigate to ‘System Tools’->’Firmware Upgrade’.
  5. Select the OpenWRT image you downloaded in the previous step and click ‘Upgrade’
  6. Now it takes some time, while the router flashes the new image, be patient!!
  7. Now its time to log into our newly installed OpenWRT. Call telnet to log into the device. A screen like the following should appear.
  8. Now the first thing is to set an appropriate password for the root user. This is done by calling passwd
  9. After setting up a password call reboot to restart your device.
  10. Now you are able login to the machine via ssh. By calling ssh root@
  11. We are done!

Routed client mode


When you freshly installed OpenWRT on your router the next command is not necessary but when you already played around and miss configured something you can call

rm -f /etc/config/wireless
wifi detect > /etc/config/wireless

to get a clean and fresh start. After cleaning everything up we are ready to start:

  1. Call the following commands one after another
    uci del wireless.@wifi-device[0].disabled
    uci del wireless.@wifi-iface[0].network
    uci set wireless.@wifi-iface[0].mode=sta
    uci commit wireless
  2. Now open up the file vi /etc/config/wireless and change the bolted lines according to your wifi connection
    config wifi-device radio0
        option type mac80211
        option channel xx
        option macaddr xx:xx:xx:xx:xx:xx
        option hwmode llng
        option htmode HT20
        option ht_capab SHORT-GI-40
        option ht_capab DSSS_CCK-40
    config wifi-iface
        option device radio0

        option 'network' 'wan'
        option 'mode 'sta'
        option 'ssid' 'my-ssid'
        option 'encryption' 'psk2'
        option 'key' 'my-secret-key'
  3. Now we have to remove an option from the WAN interface, open the file vi /etc/config/network
    and remove the line with the ifnameoption from the entry

    config 'interface' 'wan'
    option 'proto' 'dhcp'
  4. The last step is to call
    ifup wan

    to reconfigure the wireless network.

  5. Now be patient again it takes some time until the device is connected and the routes are setup. In the meantime you can test the OpenWRT web interface, go to tab ‘Network’->’Diagnostics’ to test the connection

OpenVPN Server + Client

Original: +

The following section describes how to set up an OpenVPN server on the TL-WR1043ND and, how to configure the client (in my case my N900).

Certificate magic

  1. First of all we have to login to our router ssh root@ and install a few packets opkg install openvpn openvpn-easy-rsa luci-app-openvpn
  2. We now give some information so that the certificate will be generated for the right entity
    cd /etc/easy-rsa
    vi vars

    Edit the following lines

    # Uncomment those lines, so that your certificates never expire
    export CA_EXPIRE=3650
    export KEY_EXPIRE=3650
    # Fill these fields with the right information
    export KEY_COUNTRY="DE"
    export KEY_PROVINCE="BE"
    export KEY_CITY="Berlin"
    export KEY_ORG="Kaos & Theory AG"
    export KEY_EMAIL=""
  3. Now we create the certificates, it is important to use the same password for the server and client certificate
    build-key-server server
    build-key client
  4. Then we copy all generated keys from /etc/easy-rsa/keys to /etc/openvpn cp ca.crt ca.key dh1024.pem server.crt server.key /etc/openvpn
  5. You can also already copy the client stuff to your host computer. Call the following commands from a shell of your host computer not, from your router
    scp root@ .
    scp root@ .
    scp root@ .
    scp root@ .

Server configuration

  1. First of all configure the dhcp server running on the TP-Link, vi /etc/config/dhcp. The section ‘lan’ should look like the following
    config 'dhcp' 'lan'
        option 'interface' 'lan'
        option 'ignore' '0'
        option 'start' '50'
        option 'limit' '150'

    Now you will only get IP addresses in the range of to

  2. Now that we have configured the dhcp we have to configure the firewall, so that it doesn’t drop packets for our OpenVPN server. Edit the file vi /etc/config/firewall to the following (In my case I have selected port 9001 for my server, the normal OpenVPN port is 1194)
    config 'rule'
        option 'target' 'ACCEPT'
        option 'name' 'VPN'
        option 'src' 'wan'
        option 'proto' 'udp'
        option 'dest_port' '9001'
  3. It’s time to generate the actual configuration file for our server open the file vi /etc/config/openvpn and remove everything in it and replace it with the following
    config 'openvpn' 'lan'
        option 'enable' '1'
        option 'port' '1194'
        option 'proto' 'udp'
        option 'dev' 'tap0'
        option 'ca' '/etc/openvpn/ca.crt'
        option 'cert' '/etc/openvpn/server.crt'
        option 'key' '/etc/openvpn/server.key'
        option 'dh' '/etc/openvpn/dh1024.pem'
        option 'ifconfig_pool_persist' '/tmp/ipp.txt'
        option 'keepalive' '10 120'
        option 'comp_lzo' '1'
        option 'persist_key' '1'
        option 'persist_tun' '1'
        option 'status' '/tmp/openvpn-status.log'
        option 'verb' '3'
        option 'server_bridge' ''
        list push "dhcp-option DNS lan-server-ip"
        list push "redirect-gateway def1"
  4. Last step is to restart your router and access the web-interface ones more. After the restart in the entry ‘Network’->’Interfaces’->’LAN’->’Physical Settings’ should be a new interface called tap0. Uncheck the entry ‘VLAN Interface: “eth0.1″‘ and then check the following three entries ‘Bridge Interfaces’, ‘Ethernet Switch: “eth0″‘ and ‘Ethernet Adapter: “tap0″‘, now click ‘Save & Apply’
  5. Finally we start the OpenVPN server on the router. This can also be done from the web interface. Browse to ‘System’->’Startup’ and make sure that the OpenVPN daemon is running and is also started at startup.
  6. We are done with the server side.

Client configuration

  1. The client configuration is very easy. Run a terminal on your N900 and type sudo gainroot to get root access.
  2. Call apt-get install openvpn to install the OpenVPN client software
  3. Attach the following lines to a configuration file and store it under /etc/openvpn/client.ovpn
    remote external-server-ip 9001
    proto udp
    dev tap
    ca ca.crt
    cert client1.crt
    key client1.key
    verb 3
    keepalive 10 120
    resolv-retry infinite
    mute 20
  4. In a previous step we already copied the necessary certificates from the router to a host, now copy these certificates to the N900 into the folder /etc/openvpn/
  5. Finally we start the client, with the following script
    cd /etc/openvpn
    openvpn client.ovpn

The Ending

Now you should be able to connect your devices to the four LAN ports of the WR1043ND and they are protected from the other network. If you are somewhere else, like Starbucks or some other place that offers free Wifi you should also be able to tunnel your N900 to your local network with the OpenVPN client.
If you want a static IP for your WR1043ND you can always use a service like DynDNS. OpenWRT has a packet called DDNS that handles that and the OpenWRT wiki also describes how to configure that service.

Categories: tech foo Tags: , , ,