Locating Counterfeit FTDI chips and CH340 using udev

Upd

FTDI chips:

http://zeptobars.ru/en/read/FTDI-FT232RL-real-vs-fake-supereal

ftdi-ft232rl-real-vs-fake

The original FTDI chips have the text engraved and the clones have the text printed.

FTDI used malicious windows drivers to brick the counterfeit chips (changing their Product ID to zero). The clones were quite good and the original FTDI tool can be used to revert the changes. The tool also has another open source implementation here.

Online shops couldn’t sell the arduinos and they began cheating, they blocked the FTDI chip so that windows drivers can not write to them (corrupting the eeprom). The problem lies in that they all have the same serial number now.

This tool can be used to recover the serial number (but should not be used later on windows).

        print "Deliberately corrupting the checksum of your device\'s EEPROM will"
        print "protect it from being bricked by the malicious FTDI Windows driver,"
        print "while still functioning with said driver. However, if you do this,"
        print "ALL SETTINGS WILL REVERT TO DEFAULTS AND THE DEVICE SERIAL NUMBER"
        print "WILL NO LONGER BE VISIBLE.

Then my previous post can be used to locate them.

CH340 chips:

They don’t have a serial number but if they’re plugged allways in the same place other udev tricks could be used (the kernel parameter). I’ve to test it yet and then I’ll update this post.

Update:
udevadm info -n /dev/ttyUSB0 -a|grep KERNEL|grep :|grep –
KERNELS==”1-4:1.0″

iker@L450:/etc/udev/rules.d$ cat prueba.rules
SUBSYSTEM==”tty”, KERNELS==”1-4:1.0″, SYMLINK+=”rueda6″

udevadm trigger

Responder

Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s