computer science, math, programming and other stuff
a blog by Christopher Swenson

# Hacked my former Vonage's D-Link VTA-VD

I finally successfully hacked my D-Link VTA-VD (Vonage Terminal Adapter) 1.00.09 firmware to work with an arbitrary SIP server. (Although I've kept it at the 1.00.07 firmware once I successfully downgraded).

I relied heavily on these two posts. I definitely would have had a hard time doing it without them.

First, you can just hope that your D-Link has the Support account unlocked. Usually, the password will either be blank, or it will be "tivonpw", and the user name is "Support".

If that doesn't work, you can try the URL trick: login as "user" (usually the password is "user"), and then send it a URL of the form

http://192.168.0.2/cgi-bin/webcm?getpage=/usr/wwwsafe/html/home/homesystem.htmvar:OldProvisioned=on&=&var:OldUnProvisioned=on&=&var:isFirstTime=no

where you change the IP address, and alternate between "on" and "off" for the "OldProvisioned" setting in the URL. Eventually, you should get both the "Provisioned" and "Non-Provisioned" reset check boxes checked. Once you do, tell it to do a factory reset. Hopefully that will work. (It may take several tries, as well as a hardware reset or two (by pressing the reset button).)

That didn't work for me. If that doesn't for you as well, you are in for a bit of work. You will need a DHCP server, a DNS server, a TFTP server, and Wireshark. I have OS X, so I used Fink to install a DHCP server (called "dhcp") (rather than futz with OS X's built-in one) and the DNS server (I used BIND, listed under "bind9"). So, first, set up your DHCP server with a nice subnet like (in /sw/etc/dhcpd.conf):

subnet 192.168.0.0 netmask 255.255.255.0 {
range 192.168.0.2 192.168.0.2;
server-name "192.168.0.101";
option routers 192.168.0.101;
option domain-name-servers 192.168.0.101;
}

Where 192.168.0.101 is the IP address of your box, 192.168.0.2 is the address of your VTA that you would like to hack. If it complains when you start it up about some file being missing, just run sudo touch /var/db/dhcpd.leases.

Now you need a DNS zone. If you are on OS X, just drop this line into your /sw/etc/named.conf:

zone "vonage.net" {
type master;
file "/sw/etc/named.vonage";
notify no;
};

And then create a file /sw/etc/named.vonage with the following junk in it (again, the 192.168.0.101 should be your server):

\$TTL    604800
@   IN  SOA vonage.net. root.vonage.net. (
1     ; Serial
604800     ; Refresh
86400     ; Retry
2419200     ; Expire
604800 )   ; Negative Cache TTL
@   IN  NS  ti.tftp.vonage.net.
ti.tftp.vonage.net.      3600000      A     192.168.0.101

While you are at the command-line, go ahead and launch the built-in TFTP server with the command sudo launchctl load -F /System/Library/LaunchDaemons/tftp.plist. You can unload it later with sudo launchctl unload /System/Library/LaunchDaemons/tftp.plist. The TFTP folder is in /private/tftpboot.

You have Wireshark installed by now, right? Good. Now, plug that router into your machine (not connected to the Internet), and sniff all of the traffic using Wireshark. After about a minute or so, you should see a TFTP request come in for a file called at ti.tftp.vonage.net at "/adsfadf/ti00179A------.xml", where the junk at the beginning is some random junk, and the "00179A------" is your MAC address.

Now, go out on the Internet, and grab that XML file from Vonage at http://httpconfig.vonage.net/adsfadf/ti00179A------.xml (again, replacing where necessary), and upload the XML file to that same folder under /private/tftpboot on your server. Don't bother trying to read it... it's apparently encrypted with RC4 (and you can recover the key later). Now the VTA will either find the file on its own, or you may just reboot it again and it will search for the file and find it on your "Vonage" TFTP server.

Okay, home stretch. Configure it with a static IP (trust me... it's easier). Now find a Windows box (ugh) and get the beta copy of CYT 4.6 (I couldn't get the stable one to work, at least). Open up the program from the command-line with "DLINK" as a command-line parameter (like, cyt46.exe DLINK). Set the IP address of your device (option 3), and then go to option 1 to reset the password and start an XML provisioning server.