Skip to content

A guide with accompanying scripts to get a working arch linux chroot on the Alcatel 4044C, a $40 flip phone.

License

Notifications You must be signed in to change notification settings

chin123/archlinux-4044C

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

archlinux-4044C

What is this?

  • A guide with accompanying scripts to get a working arch linux chroot on the Alcatel 4044C, a $40 flip phone with 4G and wifi support. It comes with KaiOS, a linux based mobile operating system.
  • This guide should work for any Android/KaiOS device in general, although you might have to modify the scripts to tailor them to your device.
  • This is one of many possible ways to get an arch chroot working, but given how little this method requires (just the ability to use EDL to modify partitions), it should be applicable to the most number of devices.

What we're going for

Terminal emulator on the 4044C
This is Apache Guacamole loaded on the default KaiOS browser, running an ssh session logged in to the arch linux chroot.
Here's a video of me executing some commands on the device: https://www.youtube.com/watch?v=gze_Acba490

Prerequisites

Precompiled binaries

Trust me for some reason? Don't want to setup the NDK? I've uploaded the pre-compiled binaries for dropbear, adbd, busybox, and zip here.

Figure out a way to read and write to partitions

If you have root access and adb already working you're done here. However, the alcatel 4044C comes with adb over USB blocked, and I could never figure out how to get it to work. However, it is easy to enter download mode on the 4044C: turn off the phone, and hold both volume buttons. With the usb cable connected to the computer, insert it to the phone while you are pressing both volume buttons. It should vibrate and display a warning about entering download mode. At this point, release the down volume button and wait until the screen turns black. You have now entered qualcomm EDL (emergency download) mode. (Credit to luxferre for discovering this). You can now use EDL tools to read and write to the device partitions on the 4044C. This specific fork of edl tools worked on the 4044C, along with the firehose file in misc/0x009600e100420024.mbn however it might not for you. Read the bananahackers page about EDL to learn more about edl and firehose files and how to use it on your device.

Backup!

Once you have successfully been able to read partition data from your device, backup all of your partitions. It is invaluable to have a working backup of all your partitions, especially the recovery, boot, system, userdata, and custpack partitions. If you ever screw up, you can just flash back to a working state. Backup regularly and you can have a bit more confidence while hacking.

Modify recovery image

First, we will want adb shell access in the recovery. This will let us have direct shell access into the device, so that we don't have to keep flashing whole system partitions. Follow the guide in prerequisite reading (3) and install adb in your recovery partition. Reboot into recovery and you should have full root shell access, however only in recovery mode. I was able to use adb shell after selecting the mount system option in recovery mode.

Install dropbear, adbd in the system partition

Once you have adb access in recovery, you will be able to remount the system partition as read/write to modify it, using a command like:

mount -t ext4 -o rw,remount /system

Either compile or download the dropbear-android binary. Create the required keys as described in the dropbear-android README, and place the dropbear binary in /system/bin/dropbear. Also, place the rooted adbd binary in /system/bin/adbd. You can obtain adbd from the gerdaOS repo here (yeah, you need to download a random binary from a stranger, but what can you do? I didn't bother trying to compile adbd). It would also be nice to place busybox at /system/bin/busybox if you dont have busybox there already. Now all that's left to do is to start the dropbear binary at boot. A simple way to do this is to just add the following command to the end of /system/bin/b2g.sh, just before the last line exec $COMMAND_PREFIX "$B2G_DIR/b2g", because at this point network access is already established:

/system/bin/dropbear -A -N root -C supersecurepassword -r /system/dropbear_rsa_host_key -r /system/dropbear_dss_host_key -p 10022 2> /data/dropbear_err.txt

This will let you ssh into your device from your computer as so:

ssh root@<ip addr> -p 10022 "sh"

with password supersecurepassword. NOTE: you cannot just ssh in and expect a shell, because you will end up facing this error:

PTY allocation request failed on channel 0
shell request failed on channel 0

I didn't really do a lot of investigation as to why this happens, because I literally only use this to start adb. Running sh as the command in ssh will open a simple stdin/stdout interface with the shell. You can now start adb over tcp as so:

setprop service.adb.tcp.port 5555
adbd

Wait for a couple of seconds, and you will be able to connect to your phone like this:

adb connect <device ip addr>:5555
adb shell

You now have a functional shell! You can use all the regular shell tools, pass files to and from your device with adb push/adb pull, and edit files with busybox vi! Now would be a good time to take another system backup.

Setting up arch linux

Get an SD card and format it with ext4 (or any other file system which supports symlinks I guess). Extract the arch linux arm rootfs you downloaded earlier into the sd card, and pop it into your phone. I have a bunch of helper scripts in scripts/ which you can use to mount arch linux (specifically arch_chroot.sh to get an arch linux shell, and arch_start.sh to just execute a script in the arch linux chroot). The TLDR is: mount the sd card with rw and exec permissions, mount the necessary device files, and chroot in. Credit to this blog post which helped me with this process. Chroot in, and you should have a basic bash shell in arch. Congratulations, the hard part is now over!

Getting pacman to work, downloading packages, all that fun stuff

systemd manages /etc/resolv.conf by default, but we don't have systemd here, so just delete /etc/resolv.conf which is just a symlink and place this in instead:

nameserver 8.8.8.8
nameserver 4.2.2.2

Or any other DNS server you like.
Start off by doing a quick pacman -Syy, and try updating all the packages with pacman -Syu to see if it works. By default, I was unable to install anything with pacman because it kept complaining about the GPG keys not being trustable. I fixed this by following the pacman package signing troubleshooting tips in the arch wiki. You should now be able to install arbitrary packages from the arch repos. If not, the arch wiki is your friend, and should help you resolve any problem related to pacman.

Setting up sshd, vncserver, guacamole

Now that you've got the arch basics setup, this part should be easy. I have a simple sshd config in misc/sshd_config, but you can modify it any way you like. You can also setup a vnc server, i used tigerVNC. Read the guacamole documentation and setup guacamole on arch, preferably with apache tomcat. I have an example user-mapping.xml file in misc/user-mapping.xml which you can base yours off of. The default apache guacamole client works well, but could be a bit better for flip phones. I modified the default layout and merged a full-screen option patch, you can find my fork here. But you're free to use the default one too, it works well, but you'll miss out on scrolling because there's no way to drag or use Shift+PgUp/Dn in the kaiOS browser. I haven't gotten full screen to work yet, because I dont know how to open the guacamole menu in the KaiOS browser, but it does work on desktops for what its worth.
You can see the script scripts/startterm.sh for an example on how to start tomcat with guacamole too. I am assuming you have some familiarity with the command line and starting and stopping services so I'm not going to go into much detail here, just read the documentation and my scripts and adjust as you please. (Disclaimer: the quality of my scripts are debatable, created over a few sleepless nights).

You're done!

Open up the kaiOS browser, and go to localhost:8080/guacamole and you should be able to login and open a terminal emulator. Have fun!

Some notes and warnings

You can automate everything above using an app, but this is left as an exercise to the reader. Hint: read the source code of some of the apps included in your device, located at /custpack/webapps/, and some 3rd party apps such as Luxferre's adb root for the 4044 to figure out how to run arbitrary commands from an app.

Please note that you are running an arch linux chroot with root access easily accessible over wifi. If you plan on taking your phone outside your house and connecting to untrusted wifi networks, you'll probably want to setup a firewall. There is a simple iptables rules file located in misc/ which you can use.

Questions?

If anything is unclear, or you find a mistake, feel free to open up a github issue or PR!

License

The code and this guide is licensed under CC0.

About

A guide with accompanying scripts to get a working arch linux chroot on the Alcatel 4044C, a $40 flip phone.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages