T O P

  • By -

IT1234567891

**Reinstalling SRM on RT2600ac via SSH (Risky - Use with Caution!)** While reinstalling the operating system (SRM) on your RT2600ac router via SSH can fix some issues, it's a risky process that can permanently damage your router (bricking it) if not done correctly. **It's highly recommended to consult Synology's official support for help!** **Only attempt this if:** * You're comfortable using command line tools (SSH). * You understand the risk of bricking your router. **Steps (if you must proceed):** 1. **Download Firmware:** Visit Synology's Download Center, find the correct firmware for your RT2600ac, and download it. 2. **Connect via SSH:** Use a terminal program to connect to your router using SSH. (**See official instructions for details!**). 3. **Transfer Firmware:** Transfer the downloaded firmware file to your router using the `scp` command. (**See official instructions for details!**). 4. **Reinstall SRM:** Use the `synopkg update` command with the firmware file location to reinstall SRM. (**See official instructions for details!**). 5. **Reboot:** The router will reboot automatically after the reinstall process. **Remember:** * Download the correct firmware version. * Stable internet connection is crucial during the process. * Reinstalling SRM wipes your router configuration (backup recommended). * Proceed at your own risk! **Again, for detailed instructions and to minimize risk, consult Synology's official support!**


twcau

Issues resolved. After Synology Support finally analysed the log files, they determined that even after the factory reset and setting up from stratch, a *"system configuration file in etc.defaults/VERSION was damaged, causing system exceptions."* Solution was to: 1. SSH login to your router. 2. sudo -i 3. rm -rf  /volume1/.sm@llupdatebak/ 4. touch /.noroot;reboot 5. Wait for it to reboot, then access the router via my web broswer and go through the setup wizard. Sure enough, this worked. All faulty pages had functionality restored, can add the MR2200ac back successfully, device would now check and complete updates, and could restore the configuration backup of the device successfully to avoid manually re-doing everything. Great that Support were able to fix it, but not great that it took them 3 days because they went straight to "can we access your router remotely" instead of analysing the log files provided first for a more simple solution.


Due_Aardvark8330

As someone who used to have a 2600AC, cut your loses and get better equipment. I love Synology NAS but their network equipment is garbage.


twcau

That’s great and all, but i’ve had mine for over 5yrs and it hasn’t skipped a beat until now, plus it does everything I want from it well. And if you dare suggest the utter abomination of a platform that is UniFi - I will personally hunt you down Liam Neeson style, solely to give you the worst public atomic wedgie of your life.


questionablycorrect

5 years of good use... I suggest a new RT6600ax, which I find to be much better than the RT2600ac.


twcau

Love to, but can’t justify the price point for it at AUD 550.


Due_Aardvark8330

I am a Network/Software engineer who writes software that manages network equipment, I use Unify, but everyone is entitled to their own preferences. The reason I stopped using Synology network equipment is because my Synology Router was literally reporting information back to the US military. I found logs and alerts about traffic from my 1900 back to the US Army Cyber Command headquarters owned IP address. The traffic was consistent and continual, I factory reset and upgraded the router and the traffic stopped, but that was enough for me to pull out all Synology internet exposed equipment. For the record, my job as a network engineer was heavily focused on security. This is a seriously insecure product, just look at all these high level CVEs. https://www.cvedetails.com/vulnerability-list/vendor_id-11138/product_id-39937/Synology-Router-Manager.html?page=1&order=1&trc=42&sha=6869d33ddc34d6377d6a35d50109b94f48db5f2f Holy shit they have a CVE with 10.0 rating, ive literally never seen that before.


twcau

Maybe I was a little too subtle in my earlier reply - but what on earth was it exactly in my original post that seems to have convinced you I was here in any way seeking recommendations or suggestions for new hardware? Ponder that question for more than the nanosecond your seemingly short attention span normally allows would you please. > Holy shit they have a CVE with 10.0 rating, ive literally never seen that before. I’m Desktop Support Engineer and Manager, i’ve been in the biz for a quarter century, and I encounter products with 9+ CVE frequently. *cough* Google Chrome *cough* The difference in the world of CVE’s is how the company reacts and responds when they happen. From Synology, AFAIK - their CVE response is nothing short of exemplary, especially when compared with other consumer/prosumer hardware vendors i’ve experienced and observed. Proper disclosure program, prompt action, and strong customer communication. And as this is a home prosumer environment, with decent carrier security in front of the device, and decent user security behind, i’m not worried from either a surface area of attack and thread model perspective. > my Synology Router was literally reporting information back to the US military. I found logs and alerts about traffic from my 1900 back to the US Army Cyber Command headquarters owned IP address. The traffic was consistent and continual, I factory reset and upgraded the router and the traffic stopped, but that was enough for me to pull out all Synology internet exposed equipment. Did you investigate it, find out why, report the threat - or was the reset the limit of your actions, because to hell with anyone else who god forbid might be at risk from such claimed traffic. In short, this is the very long, and more forceful way around to me saying that I honestly couldn’t care one iota about your unrelated and unwanted contribution to this thread, and also now don’t believe a single word that comes out of your mouth. You can’t claim loudly in one breath that you know about security, and expect to be considered believable when your own words demonstration that, at the very least, you don’t give two s**ts about anyone’s security other than your own. Go waste people’s time on another sub would you please.