MetaRepository

MetaRepository is mainly a bunch of scripts, so it's its own source. GPL.

But also contains a sample of GNU tar 2.24.2, which can be downloaded here, and a stripped down version of busybox 1.17.2, containing only the applets inetd and nc. The sources are extracted from the ZyXEL NSA325 GPL sources here.

Tweaks

Tweaks is mainly a bunch of scripts, so it's its own source. GPL.

It also contains the tool 'sg_start' from sg3_utils, which can be found here, and the tool 'fakewol'. fakewol.c is an adapted version of some sample udp server I found on the internet. My adaptions are GPL. Further it contains a tool 'btncpyctl' btncpyctl.c (GPL) a tool to intercept the Copy button function. But it can do more, like dis- and enabling WOL on a 325. The tool is based on the ZyXEL GPL kernel sources, which implements 'the other end'.

FFP

The sources of FFP can be found on the FFP homepage.

BtSync

btsync is not open source. The binary is downloaded from bittorrent.com.

Anyterm

The sources of anyterm can be found on anyterm.org, and are mirrored here.

Dropbear

The sources of dropbear can be found on it's homepage. Mirror.

Midnight Commander

Homepage. Mirror of the used version.

RandomTools

Random tools contains

unrar 5.2.1

Sources can be downloaded from rarlab.com. It's also mirrored here.
Unrar is not licensed under any opensource license.

UnRAR source code may be used in any software to handle RAR archives without limitations free of charge, but cannot be used to develop RAR (WinRAR) compatible archiver and to re-create RAR compression algorithm, which is proprietary. Distribution of modified UnRAR source code in separate form or as a part of other software is permitted, provided that full text of this paragraph, starting from "UnRAR source code" words, is included in license, or in documentation if license is not available, and in source code comments of resulting package.

su 8.15

This is a part of GNU coreutils 8.15, which can be found here.

sudo 1.6.8p12

I didn't compile this. It is extracted from the toolchain mentioned below

screen 4.2.1

From the GNU screen project. Source here.

nano 2.2.6

Also GNU. Sources here.

EncryptedShares

Encrypted shares is based on encfs (source), which is dependent on rlog and boost (version 1.55.0 used).

Pulse

I didn't compile this, it's extracted from the package downloaded here. But it is open source (GPL), and the sources can be found here.

Toolchain

The provided toolchain is extracted from sdk3.3-genericfs-arm-mv5sft.tar.gz, which is shipped with the ZyXEL NSA325 4.70 GPL sources, and happened to contain both a cross compiling toolchain, and a native one.
This is the native one, which needs to be chrooted due to directory incompatibilities with the firmware. I added a 'chroot.sh' script to do the chroot. Index of /zyxel/zypkg-repo

What is this?

This is a 3rd party repository for ZyXEL and some Medion NASes. (Mirror of the Mijzelf's repo) You can find the available packages in the /fw4 or /fw5 directory, depending on your NAS model. To get access to it, you'll have to install the package MetaRepository.
Basically that is a CGI script which runs locally on the NAS. Using the web_prefix file the firmware package manager is pointed to it. The script downloads the ZYPKG_INFO.tgz or ZYPKGS file from several repositories, and combines that to a single file, on base of (alphabetically) sorting the packages. Further it keeps a database of origin of all those packages, and when requested it downloads and offers them.

How to install

Step 1

Download the file web_prefix, and put it in the directory \\<NAS>\admin\zy-pkgs\ on the NAS. Make sure your browser doesn't add any extensions to the file. The filename is web_prefix, without extension, all lowercase characters.

NAS5xx, NAS326

(Firmware 5.10+ only) On this NAS there is no subdirectory zy-pkgs in \\<NAS>\admin\, so you'll have to create it.

NSA-212 (Medion)

For the NSA212, there is no support for the web_prefix file, so the procedure is a bit different. Enable the Telnet Backdoor, login over telnet (as root), and execute

echo http://mijzelf.duckdns.org/zyxel/zypkg-repo/Medion >/etc/package_src_url

Step 2

NSA series

In the packages menu in the webinterface execute 'Retrieve list from Internet'. Install MetaRepository. Execute 'Retrieve list from Internet' again.

NAS series

On the webinterface desktop, open the 'App Centre'. Goto 'Browse->All Apps'. Now there is a cycle icon on the page. Push it. install MetaRepository. Push the cycle icon again.

Medion

In the package menu in the webinterface execute 'Retrieve list from Internet'. Do not try to install anything else than MetaRepository. When MetaRepository is installed, goto the MetaRepository page, and change 'ftp://ftp2.zyxel.com/+' in 'ftp://ftp2.zyxel.com/NSA310/4.40/zypkg/' (without the quotes), and if you also want the Medion repository add a line 'ftp://nas-download:sEhtalr@download.medion.de/package/'. Now hit apply, and re-retrieve the package list. Warning: not all ZyXEL packages run on a Medion. Make sure you first install dropbear, and test it, to have an entrance if the webinterface fails.

How to configure

NSA series, Medion

In the package menu you can open the configuration page of MetaRepository.

NAS series

On the desktop you'll find a MetaRepository icon to open the configuration page.

Here you can enter the source repositories. When a package with the same name and version can be found in several repositories, the repository highest in this list is used. Further you can blacklist packages.

How to create your own (local) repository

Just put the package(s) in a share, in combination with a describing ZYPKGS file (case sensitive). Add the full path to the 'Repositories' list. Done. You can also supply a ZYPKG_INFO.tgz if you like. The script first tries to download/copy the ZYPKG_INFO.tgz file, and if that fails it tries ZYPKGS.

Telnet backdoor

On Medion boxes it is possible to start a telnet daemon on the NAS, by requesting a webpage:
Firmware 1.00:
http://<ip-of-nas>/r32694,/adv,/cgi-bin/remote_help-cgi?type=backdoor
Firmware 1.01(UZD.0):
http://<ip-of-nas>/r34814,/adv,/cgi-bin/remote_help-cgi?type=backdoor
Firmware 1.01(UZD.2):
http://<ip-of-nas>/r36258,/adv,/cgi-bin/remote_help-cgi?type=backdoor
You can login as admin, or as root, using the admin web password.

If your firmware version is not listed here, login on the webinterface of your nas, and have a look at the url to find out the 'r value' of your firmware version. Some browsers won't show this, in that case copy the url and paste it in notepad, or something like that.

(On most NSA boxes this telnet backdoor also works. Just find the 'r value' of your firmware. For other options read this.)