Skip to content

Latest commit

 

History

History
66 lines (42 loc) · 3.33 KB

README.md

File metadata and controls

66 lines (42 loc) · 3.33 KB

SonOTA

Flashing Itead Sonoff devices via original OTA mechanism

This program is based on research documented here:

The script is fairly well documented (I think) - apart from that above stated links should provide some context of what's been done how and why. Feel free to open issue tickets or contact me directly: [email protected]

DNS redirect

The program only works if you made sure the hostname 'eu-disp.coolkit.cc' is being resolved to an IP address assigned to the machine this script is running on.

On a WiFi router running OpenWrt this can be easily done by adding the following line to /etc/hosts and restarting dnsmasq:

10.23.42.5 eu-disp.coolkit.cc

Adjust IP address and make sure variable serving_host in sonota.py is set to the same.

No DNS redirect is needed anymore with version 2 as the script can now also provision the Sonoff device and hence specify the serving_host. Just connect to the WiFi network which the Sonoff devices open called "ITEAD-XXXXXX" -- password is "12345678" and run the script.

Creation of SSL certificates

openssl req -x509 -nodes -newkey rsa:2048 -keyout ${SONOTA}/ssl/server.key -out ${SONOTA}/ssl/server.crt -days 42235

Building an user2 image with Arduino

--- a/~/.arduino15/packages/esp8266/hardware/esp8266/2.3.0/tools/sdk/ld/eagle.flash.1m64.ld
+++ b/~/.arduino15/packages/esp8266/hardware/esp8266/2.3.0/tools/sdk/ld/eagle.flash.1m64.ld
@@ -7,7 +7,7 @@ MEMORY
   dport0_0_seg :                        org = 0x3FF00000, len = 0x10
   dram0_0_seg :                         org = 0x3FFE8000, len = 0x14000
   iram1_0_seg :                         org = 0x40100000, len = 0x8000
-  irom0_0_seg :                         org = 0x40201010, len = 0xf9ff0
+  irom0_0_seg :                         org = 0x40281010, len = 0xf9ff0
 }
 
 PROVIDE ( _SPIFFS_start = 0x402FB000 );

Converting Arduino images to v2 images

esptool.py elf2image --version 2 image_user1.ino.elf esptool.py elf2image --version 2 image_user2.ino.elf

mv image_user1-0x01000.bin image_user2-0x81000.bin ${SONOTA}/static/

Run

The script needs to be run as root, as it binds to port 443 to which the Sonoff device initially sets up a HTTPS POST request.

The script can now be run as a regular user; as we can do the provisioning now, we can also set the port to anything other than 443.

python3 sonota.py --wifi-ssid foobar --wifi-password ew4Ookie 10.23.42.5

Issues

As we don't override the bootloader which still expects v2 images and our custom firmware might end up in the user2 partition, vanilla Arduino OTA functionality - if provided by your custom image - will not work.

Due to the impressive work of @khcnz there's now a sketch for intermediate images: https://github.com/khcnz/Espressif2Arduino Espressif2Arduino provides the correct linker scripts for ESP8266 and ESP8285 chips (user1 and user2) and -- once flashed and booted -- replaces the Espressif bootloader by the Arduino one. From there it will attempt to download and flash and unmodified Arduino image (e.g. a https://github.com/arendst/Sonoff-Tasmota one) from your local webserver via the Arduino OTA method.