Synology DS123 Hacking
Links
What’s running
The usuals
- cron
- inetd
- syslogd
- rsyslogd
- hotplugd
Services
- ntpd
- sshd
- Apache httpd 2.2.22
- postgres
- cupsd
- Sambda nmbd / smbd
- snmpd
- avahi-daemon
- lighttpd for MediaServer
Layout
Generally under /usr/syno
with one directory per package. Some in the
usual UNIX bin
etc.
Installing Debian
SynoCommunity provide a chroot package that can be installed from the DSM. It needs a little bit of work past there. Some incomplete notes:
admin
androot
have the same password, but onlyroot
cansu; chroot
- The chroot ended up in
/volume1/@appstore/debian-chroot/var/chroottarget
- Create the user and role account through DSM first
- Copy into the chroot
passwd
andshadow
- don’t overwrite - Bind mount
/volume1/homes
(/var/services/homes
) - Bind mount
/dev
,/dev/pts
, and/proc
for sshd to work - Run
sshd
inside the chroot to get direct, non-root access. Use a different port in/etc/ssh/sshd_config
- Change
/etc/apt/sources.list
to testing only. Drop the pinning in/etc/apt/preferences
A bit of hacking later, it seems that the scripts can do most of this
for you. /var/packages/debian-chroot/scripts/start-stop-status
will do
the bind mounts (except /home). The Services tab lets you start and
monitor the ssh server from DSM.
Next question is should I run everything inside the chroot or try to use the built-in basic services? The router will hide the port number differences.