雖然 Synolocker threat 唔影響 DSM 5.0, 以防萬一都係upgrade 左隱陣d 臺灣出現NAS勒索軟體災情,群暉證實舊版DSM漏洞釀災 Synology Advise Users of SynoLocker Ransomware Step 1: download download Nano-Boot 5.0.3.1 (DSM 5.0-4493) from http://www.xpenology.nl/boot-images/#IMG download DSM 5.0-4493 from official website http://www.synology.com/en-us/support/download/DS3612xs#download_tabs_dsm (direct link) download DSM 5.0-4493 update 3 from http://hkdl.synology.com/download/criticalupdate/update_pack/4493-3/synology_bromolow_3612xs.pat 其他 mirror sites: ukdl.synology | usdl.synology.com Step 2: write image to USB 打開 Win32DiskImager, select downloaded file: NB_x64_5031_DSM_50-4493_Xpenology_nl.img and write to USB drive Step 3: installation 關機, 插 USB再開機, boot up 1st GRUB menu: Nanoboot DSM 5.0-4493 Install/Upgrade 2nd GRUB menu: Nanoboot DSM 5.0-4493 (install/downgrade) 要等好一會才完成. 打開 Synology Assistant > search, 會顯示 migrateable, right click, install then select DSM_DS3612xs_4493.pat set up admin password, next … (可以行開沖返柸野飲, 都幾耐才完成安裝過程) Step 4: verify login diskstation, 控制台 > 更新 & 還原, 安裝版本: 5.0-4493 (as feature image) Step 5: upgrade to update-3 ssh root@diskstation
去返 UI, 更新. 會重新啟動(都係要等一陣), done! Side Notes: 3rd party packages: Package Center > Settings > Package Sources Name: synocommunity packages Location: http://packages.synocommunity.com
updated on 2014-08-10: ignore & don’t use ipkg. it’s gone after upgrade and packages too old. I used Debian-Chroot from custom package provider instead DSM: Package Centre > Settings > Package Sources Name: SynoCommunity Location: https://synocommunity.com/packages ————————————– I am using HP N36L (AMD CPU), here just a record of my installation process. First things first, readings: http://forum.synology.com/wiki/index.php/Overview_on_modifying_the_Synology_Server,_bootstrap,_ipkg_etc#How_to_install_ipkg download bootstrap scripts for installation: http://ipkg.nslu2-linux.org/feeds/optware/syno-i686/cross/unstable/syno-i686-bootstrap_1.2-7_i686.xsh since I use USB as boot disk, my temp directory is on volume2 instead.
Reboot DSM, @optware link created, path was set, to check:
relogin ssh afterwards.
create/insert to .bashrc
Then $ source ~/.bash_aliases , $ ssh2hostname1 should go there directly if ssh without password configured.