On Sun, 29 Dec 2013 13:52:13 -0500 Celejar <cele...@gmail.com> wrote:
> > This: > > > > http://www.brother-usa.com/VirData/Content/en-US%5CPrinters%5CConsumer%5CNetworkUsersManual%5CNUM_DCP_7065DN_HL_2280DW_MFC_7360N_7460DN_7860DW_EN_2845.PDF > > > > gave me an idea - they run telnet, but they use some variation of tcp > > wrappers which forbids any telnet connections (possibly other services > > too) from anything except maybe 192.168.0.1 (or, 192.168.0.5, or > > 169.254.0.0/16). > > What did you see there (what page)? Nothing in particular, just a guess. Manufacturers like to do stuff like this. Best of them think 'like, everyone and their dog uses 192.168.0.0/24 for the home network, let's secure our product by denying access from anyone outside'. Of course, to hardcode 192.168.0.0/24 is the easiest these guys can do. So, I browsed that pdf, searched for IPs, and sure enough, there was 192.168.0.1 as a default gateway example and 192.168.0.5 as a printer example, and some explanation of LLNR. > I tried telnetting from my router, an OpenWrt box with address > 192.168.0.1, and I get: > > Entering character mode > Escape character is '^]'. > > And then pretty much the same thing: no response, and eventual > disconnect after several carriage returns. So, no luck. Maybe it requires some engineering password first. Can you dump the firmware from the printer? Reco -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20131230000051.0cd6507ae360156306f7a...@gmail.com