Yes, that’s the added checksum so make sure you’re writing those extra 2 bytes to flash too! Your FLW command above is 2 bytes short i.e. 000E1000 shoud be 000E1002
Hello,
I’m having an issue upgrading my device ncp firmware. I got the device from aliexpress and there all kind of issue to resolve. I’m now successfully got root access to the device and installed serialgateway. my device firmware is not quite as same as people in this thread yet it is similar in nature. I have to dump flash and rebuild rootfs then write back into the device’s flash inorder to get access to device’s root.
now I’m try to upgrade the ncp firmware but seem my ncp firmware is not EmberZNet version 6.5.0.0 but it is EmberZNet version: 6.2.3.0 build 204
I try your script to upgrade the firmware with no sucess
bash-5.0# ./firmware_upgrade.sh 172.16.1.167 22 V7 ncp_firmware.gbl
[email protected]'s password:
[email protected]'s password:
[email protected]'s password:
Sending /tmp/firmware.gbl, 1434 blocks: Give your local XMODEM receive command now.
Xmodem sectors/kbytes sent: 0/ 0kRetry 0: Got a1 for sector ACK
Retry 0: NAK on sector
Retry 0: Got a1 for sector ACK
Retry 0: NAK on sector
Retry 0: Got a1 for sector ACK
Retry 0: Timeout on sector ACK
Retry 0: Timeout on sector ACK
Retry 0: Timeout on sector ACK
Retry 0: Timeout on sector ACK
Successfully flashed new EZSP firmware! The device will now reboot.
although the message shown sucess but bellows -d still show EmberZNet version: 6.2.3.0 build 204
Are there anything need to change on the upgrade process as it is not the same as from 6.5.5 to 6.7.8
*** Edit for Solution *** @Ordspilleren I Alread upgrade it to 6.7.8 using upgrade_ncp.py. your script some how not work on my device not sure why but I did try it several times with no luck.
Thanks BTW.
Is it possible to re-flash the roots flash dump back to the device with the same process to flash new root fs on to the device. It seem my device having a really old version of the firmware and may r it’s software too. One ncp firmware still at 6.2.3 while people here got 6.5.5 as preloaded firmware. My ssh do not on port 2333 as you mentioned in the guide but instead at port 23 as standard ssh. What is the FLW command I may use to write the roots.bin back to the device. I will try to pair my device to the cloud to get updated version before freeing it from the cloud later
*** Edit for Solution on upgrade ncp firmware ***
I try your python scritpt upgrade_ncp.py and it works first try.
Thanks you. I will not upgrade my device image from tuya cloud so thanks anyway
Quick update from my Silvercrest experience:
Up until about a month ago I was running on a separate OS/Hassio combo (wanted to run stuff from a SSD on a PI3+ and at that time this was not properly supported).
The Silvercrest hack was executed as described and stuff started to work, but ONLY using Bellows. Not all devices were able to join properly however like the Xiaomi Lux device (I got it to join, but it did not work as expected).
So last month I switched to a Out-of-the-box HomeAssistant installation and voilá, no more issues!
My advise if you are not yet running a clean HomeAssistant setup and have the hardware to do that: go for a clean setup! Saved me a lot of frustration in the end
thank a lot for your work, much appreciated !
Here is my feedback after a couple of months running it.
I am experiencing some issues with the serialgateway process stopping working after many days (10, 14 days tipically) which required rebooting the gateway.
Today I had the same issue with ZHA not connecting to the gatweway (connection refused), so I SSH to it and verified that the /tuya/serialgateway process was not running.
After rebooting everything works fine for days.
Have anyone else had this issue? What do you suggest?
Good idea! My serialgateway restarted yet again this morning. I put in a Homeassistant automation to tell me if one of my devices is unavailable and notify me if that happens.
i managed to get the root passwd, i can login with the root passwd
ifconfig reveals 192.168.1.42 as ip
but this command doesn’t work:
cat serialgateway.bin | ssh -p2333 [email protected] “cat >/tuya/serialgateway”
ssh: connect to host 192.168.1.42 port 2333: Connection refused
i can ping the gateway:
PING 192.168.1.42 (192.168.1.42) 56(84) bytes of data.
64 bytes from 192.168.1.42: icmp_seq=1 ttl=64 time=0.761 ms
64 bytes from 192.168.1.42: icmp_seq=2 ttl=64 time=0.654 ms
nmap -sT -p- 192.168.1.42
Starting Nmap 7.70 ( https://nmap.org ) at 2021-06-17 13:45 CEST
Nmap scan report for 192.168.1.42
Host is up (0.029s latency).
Not shown: 65533 closed ports
PORT STATE SERVICE
6668/tcp open irc
12130/tcp open unknown
MAC Address: 18:69:D8:30:29:7F (Unknown)
Nmap done: 1 IP address (1 host up) scanned in 35.86 seconds
I am having the same issue. I have also run nmap against the device and I see the same 2 ports open as you.
Annoyingly, I did have access via SSH but it seemed to hang as I was transferring the serialgateway.bin across. I rebooted the device and I haven’t been able to access it since.
Do you think it is possible that they performed an OTA upgrade and switched off the SSH server?
I still have serial access and I would be really grateful of any pointers
I’ve just managed to restart the ssh server. Connected via serial, if you run:
cat /tuya/ssh_monitor.sh
you’ll see what looks like a script which puts dropbear to sleep for extended periods of time for each failed login. But at the end there is the command to fire up dropbear again:
I have been running flashed lidl gateway for few weeks now. It goes offline every now and then (because I’ve setup an automation if the device goes offline). But The main problem is that I can’t change the Lidl E27 and GU10 bulbs colours. It shows the colour pallet but doesn’t do anything.
I am thinking to revert back to the factory firmware but I didn’t take the backup (for my sins).
Any ideas how to revert back to the lidl firmware?