I would like to know about this service:

  1. How the router communicate to the goodcloud server?
  2. What encryption method is used?
  3. Which information is shared?
  4. Can we have access to the code of the software or script?
  5. Is it possible from the server side, I mean, for the Gl-inet staff to access all my router configuration?

I’m concerned about the security of this service.


  1. via mqtt protocol
  2. AES
  3. Only basic setting
  4. No, what do you want to do?
  5. It can’t so far. But we are planing to add remote tty, which allow you ssh to the router, so you can control it fully.

What’s your usage scenario?

1 Like

Thanks for the reply.
Can you be more specific on question 3?
And for question 4 I’m concerned that someone else could access my configuration in the router and that’s why I would like to see the code.

Now your router’s setting is not stored on the cloud. The cloud only know it is online/offline and your IP etc.

All the info you can access from the browser is get from the router realtime. We also removed all admin password, wifi password in all of the data from the router’s API.

@alzhao, to use to monitor many router is good. Having the IP address and the status (Online or Offline) is good. But I would be very worried if I can control my router right from It only means that people just need to break into my account in to take control of all the routers. It is good if the router Only supply the basic info to There should not be critical info like login password be sent from router to the That is probably why our friend here is asking for the code to assure himself.

You are right @Sunny. I checked and the application /usr/bin/gl_mqtt_cli calls the application in /www/api to get the information. We know that a mqtt server has control over a client, and if the server is able to send a restart command, can change a SSID, can change the transmit power, can block stations, we know it can do all it wants, as send a copy command to get more information that the one showed in the control page of Goodcloud. Is for this reason that we should have access to the code, to be sure that the staff in Goodcloud is not getting more information that the one showed in the page, and to be sure that the communications are secure and that there is nothing that could be done without our permission.

1 Like

I’m only testing goodcloud on my home network with a few GL.iNet routers attached and it is quite handy. I would feel more confident if there was something like a 2 Factor Authentication (say Google Authenticator) layer on top purely from an access to Goodcloud point of view, especially if I had heaps more devices or in a more commercial environment. Just my 2c worth :grinning:

I checked /www/src/store/api.js and I found this, and it’s possible to take full control over the router from the server.

‘use strict’;

define(function () {
return {
// index
“check_wan2lan”: “/api/wan/lan/switch”,
// “router”: “/api/router/status”,
“router”: “/api/router/running/state”,
‘router_ddns’: ‘/api/router/info’,
‘getmcu’: ‘/api/mcu/get’,
‘router_clients’: ‘/api/client/statistics’,
// WAN
‘waninfo’: ‘/api/wan/info’,
‘wantype’: ‘/api/wan/access/get’,
‘wanset’: ‘/api/wan/access/set’,
// TetheringF
‘teinfo’: ‘/api/tethering/info’,
‘tetget’: ‘/api/tethering/get’,
‘teset’: ‘/api/tethering/set’,
“teDelete”: “/api/tethering/disconnect”,
// Repeater wifi
‘stainfo’: ‘/api/repeater/info’,
‘scanwifi’: ‘/api/repeater/scan’,
‘joinwifi’: ‘/api/repeater/join’,
‘setoption’: ‘/api/repeater/set’,
‘getoption’: ‘/api/repeater/get’,
‘savedwifi’: ‘/api/repeater/manager/list’,
‘removewifi’: ‘/api/repeater/manager/remove’,
‘disconnectwifi’: ‘/api/repeater/enable’,
“bridge_set”: “/api/router/bridge/set”,
“bridge_get”: “/api/router/bridge/get”,
“protal_set”: “/api/router/protal/set”,
“protal_get”: “/api/router/protal/get”,

// Internet
'internetreachable': '/api/internet/reachable',
'getserverip': '/api/internet/public_ip/get',
// 3/4G Modem
'moAuto': '/api/modem/auto',
'moSet': '/api/modem/set',
'moCarrier': '/api/modem/carrier',
'moEnable': '/api/modem/enable',
'moGet': '/api/modem/get',
'moInfo': '/api/modem/info',
'moReset': '/api/modem/reset',
'moStatus': '/api/modem/status',
'smslist': '/api/modem/sms/list',
'smsremove': '/api/modem/sms/delete',
'smssend': '/api/modem/sms/send',
'smsstatus': '/api/modem/sms/status',
'smscode': '/api/modem/sms/code',
'atsend': '/api/modem/at',
'simcells': '/api/modem/cells/get',
// AP
'getaps': '/api/ap/config', // get
'enableap': '/api/ap/enable', // post
'updateap': '/api/ap/update', // post
// Radio
'settxpower': '/api/radio/txpower/set', // post
// Client
'getclients': '/api/client/list', // get
'clientblock': '/api/client/block',
"setqos": '/api/client/qos/set',
"settraffic": "/api/client/traffic/set",
"gettraffic": "/api/client/traffic/get",
// Router
'getlanguage': '/api/router/language/get', // get
'setlanguage': '/api/router/language/set', // post
'logout': '/api/router/logout', // get
'login': '/api/router/login', // get
'laninfo': '/api/router/laninfo',
'guestinfo': '/api/router/guestinfo',
'setlanip': '/api/router/setlanip',
'setguestip': '/api/router/setguestip',
'getmacsinfo': '/api/router/mac/get',
'resetfactorymac': '/api/router/mac/resetfactory',
'clonemac': '/api/router/mac/clone',
'changeadminpwd': '/api/router/changeadminpwd',
'gettimezone': '/api/router/timezone/get',
'settimezone': '/api/router/timezone/set',
'isconnected': '/api/router/hello', //无需登录即可调用
'reboot': '/api/router/reboot',
'routerinfo': '/api/router/model',
'initpwd': '/api/router/initpwd',
'ovpnfiledownload': '/api/router/file/download',
'getapplist': '/api/router/getapplist',
// Not login
'getap4config': '/api/router/nologin/apinfo', //无需登录即可调用

// Firmware
'readautoupgrade': '/api/firmware/autoupgrade/get', // get
'firmwareinfo': '/api/firmware/info', // get
'checkfirmware': '/api/firmware/onlinecheck', // get
'setautoupgrade': '/api/firmware/autoupgrade/set', // post
'prepareupgrade': '/api/firmware/prepareupgrade',
'uploadfirmware': '/api/firmware/upload',
'verifyfirmware': '/api/firmware/verify',
'downloadfirmware': '/api/firmware/download',
'firmdownloadprogress': '/api/firmware/downloadprogress',
'revertfirmware': '/api/firmware/reset',
'flashfirmware': '/api/firmware/upgrade',
'firmtfrun': '/api/firmware/autoupkg/run',
'firmtfstatus': '/api/firmware/autoupkg/status',

// DNS
'getdnsinfo': '/api/dns/get',
'setdnsinfo': '/api/dns/set',

// Ovpnclient
'ovpngetclientstatus': '/api/ovpn/client/status',
'ovpnGetClients': '/api/ovpn/client/list',
'ovpnsetclient': '/api/ovpn/client/set',
'ovpngetserverlist': '/api/ovpn/client/serverlist',
'ovpnremoveclient': '/api/ovpn/client/remove',
'ovpnrmall': '/api/ovpn/client/clear',
'ovpnuploadconfigpack': '/api/ovpn/client/upload',
'ovpncheckconfigpack': '/api/ovpn/client/uploadcheck',
'ovpngenerateclient': '/api/ovpn/client/addnew',
'ovpnmodifyclient': '/api/ovpn/client/modify',

// Ovpnserver
'getovpnconfig': '/api/ovpn/server/get',
'setovpnconfig': '/api/ovpn/server/set',
'createovpncertificate': '/api/ovpn/server/generate_cert',
'getovpnfilestatus': '/api/ovpn/server/cert/status',
'ovpnstatus': '/api/ovpn/server/status',
'ovpnstart': '/api/ovpn/server/start',
'ovpnstop': '/api/ovpn/server/stop',
'ovpnblock': '/api/ovpn/server/access',
"ovpnfile": '/api/router/file/download',
// shadowsocks Client
'ssclientstatus': '/api/shadowsocks/client/status',
'ssclientconfig': '/api/shadowsocks/client/get',
'ssmodifyclient': '/api/shadowsocks/client/modify',
'ssremoveclient': '/api/shadowsocks/client/remove',
'ssstopclient': '/api/shadowsocks/client/stop',
'startssclient': '/api/shadowsocks/client/start',
'ssaddclient': '/api/shadowsocks/client/add',

// shadowsocks Server
'getserverconfig': '/api/shadowsocks/server/get',
'getserverstatus': '/api/shadowsocks/server/status',
'startserver': '/api/shadowsocks/server/start',
'setserver': '/api/shadowsocks/server/set',
'stopserver': '/api/shadowsocks/server/stop',

// software
'software': '/api/software/list',
'installedsoftware': '/api/software/installed',
'updatesofeware': '/api/software/update',
'installsofeware': '/api/software/install',
'removesoftware': '/api/software/remove',
'findsoftwarebykey': '/api/software/keyword',
'findsoftwarebyletter': '/api/software/letter',

// wireguard server
'wgsCheckKey': '/api/wireguard/server/checkkey',
'wgsCreateKey': '/api/wireguard/server/createkey',
'wgsGetKey': '/api/wireguard/server/getkey',
'wgsifget': '/api/wireguard/server/get',
'wgsifset': '/api/wireguard/server/set',
'wgspadd': '/api/wireguard/server/peer/add',
'wgsplist': '/api/wireguard/server/peer/list',
'wgspset': '/api/wireguard/server/peer/modify',
'wgallow': '/api/wireguard/server/peer/allow',
'wgspremove': '/api/wireguard/server/peer/delete',
'wgspestatus': '/api/wireguard/server/peer/status',
'wgsstatus': '/api/wireguard/server/status',
'wgsstart': '/api/wireguard/server/start',
'wgsstop': '/api/wireguard/server/stop',
'wgsCopy': '/api/wireguard/server/peer/generate',

// wireguard client
'wgccheckKey': '/api/wireguard/client/checkkey',
'wgccreateKey': '/api/wireguard/client/createkey',
'wgcgetKey': '/api/wireguard/client/getkey',
'wgcset': '/api/wireguard/client/set',
'wgcadd': '/api/wireguard/client/add',
'wrthirdadd': '/api/wireguard/client/thirdadd',
'wgcremove': '/api/wireguard/client/delete',
"wgrmall": '/api/wireguard/client/alldelete',
'wgcstatus': '/api/wireguard/client/status',
'wgcstart': '/api/wireguard/client/start',
'wgcstop': '/api/wireguard/client/stop',
'wgclist': '/api/wireguard/client/list',

// samba share
'shareget': '/api/files/samba/get',
'shareset': '/api/files/samba/set',

// button settings
'switchset': '/api/router/switch/set',
'switchget': '/api/router/switch/get',

// Firewall port
"fwadd": "/api/firewall/port_forwarding/add",
"fwremove": "/api/firewall/port_forwarding/del",
"fwlist": "/api/firewall/port_forwarding/list",
"setfw": "/api/firewall/port_forwarding/set",
// Firewall port_opening
"fwadd_open": "/api/firewall/port_opening/add",
"fwremove_open": "/api/firewall/port_opening/del",
"fwlist_list": "/api/firewall/port_opening/list",
"setfw_open": "/api/firewall/port_opening/set",
"fwdel_all": "/api/firewall/port_all/del",
"fwapple": "/api/firewall/dmz/set",
"fwget": "/api/firewall/dmz/get",
//lan ip 
"leases_del": "/api/router/static_leases/del",
"leases_delall": "/api/router/static_leases/delall",
"leases_get": "/api/router/static_leases/get",
"leases_list": "/api/router/static_leases/list",
"leases_set": "/api/router/static_leases/set",
"cloudgets": "/api/cloud/goodcloud/get",
"cloudsets": "/api/cloud/goodcloud/set",
"cloudunbind": "/api/cloud/goodcloud/unbind",
"ddnsset": "/api/cloud/ddns/set",
"ddnsget": "/api/cloud/ddns/get",
"ddnscheck": "/api/cloud/ddns/check_status",
"cloudlog": "/api/cloud/goodcloud/log",

// zbee
'zbSetscan': '/api/smarthome/ble/setscan', //设置搜索区间
'zbStartscan': '/api/smarthome/ble/scan', // 开始蓝牙搜索
'zbStopscan': '/api/smarthome/ble/stopscan', // 停止蓝牙搜索
'zbGetscan': '/api/smarthome/ble/getscan', // 获取蓝牙列表
'zbSetconnpara': '/api/smarthome/ble/setconnpara', //设置连接蓝牙参数
'zbConnect': '/api/smarthome/ble/connect', // 连接蓝牙
'zbPrimary': '/api/smarthome/ble/primary', // 获取已连接蓝牙支持的服务
'zbGetservice': '/api/smarthome/ble/getservice', //已连接蓝牙支持的服务列表
'zbGetdev': '/api/smarthome/ble/getdev', //已连接蓝牙设备列表
'zbDisconnect': '/api/smarthome/ble/disconnect', // 断开蓝牙连接
'zbReadallchar': '/api/smarthome/ble/readallchar', // 读取uuid下所有对应的特征值
'zbReadchar': '/api/smarthome/ble/readchar', // 读取uuid下指定对应的特征值
'zbGetchar': '/api/smarthome/ble/getchar', //  获取uuid下对应的特征值列表
'zbGetcharval': '/api/smarthome/ble/getcharvalue', // 获取uuid下对应的特征值的value
'zbSettxpower': '/api/smarthome/ble/settxpower', // 设置蓝牙发射功率
'zbDescread': '/api/smarthome/ble/descread', // 获取uuid下对应的特征值的描述
'zbWritechar': '/api/smarthome/ble/writechar', // 写入特征值
'zbConnect_mipow': '/api/smarthome/ble/mipowconnect', // 连接mipow型号
'zbGetscan_mipow': '/api/smarthome/ble/mipowget', // 连接mipow型号
'zbWrite_mipow': '/api/smarthome/ble/mipowwrite', // 写入mipow型号-特征值
'zbgetStatus': '/api/smarthome/ble/getstatus', // 写入mipow型号-特征值
'zbReboot': '/api/smarthome/ble/reset', // 重启蓝牙模块

'gpsget': '/api/gps/info/get',
'reportget': '/api/gps/report/get',
'reportset': '/api/gps/report/set',

"gettopo": "/api/wifison/get_topo",

"getportal": "/api/router/portal/get",
"setportal": "/api/router/portal/set",
//policy router

@somedude @Sunny @limbot

Data security and Privacy are our first priority concern.

Now, only the functions on the Goodcloud UI is implemented, which means other APIs are not callable now. But of course those APIs can be implemented after further development.

Password, including Admin password and WiFi password is not sending to the cloud, or send via cloud. We just removed them from the APIs in the router.

You also have the log in the router to see which API is called.

But we understand your concern and we will do the following:

  • Two factor Auth for the cloud account
  • Enhance security features on the router so that a user can choose which API can be called.

The router and firmware should be owned by the user completely and we will do in this direction.

1 Like

Thank you @alzhao. When can we see this implementation?
And for the ssh implementation are you considering to use ssh keys?

If someone wants to download data from a router he should show what he is doing.

If you dont want to show your customers the code or what data you are transferring, I have to ask:

What are you hiding ?

It’s easy to use this cloudconnection as a giant backdoor !

You speak about “only basic setting” and afterwards @somedude finds this really big API-Collection.

This behaviour has nothing to do with data security and privacy and it’s not supporting confidence in your products.

I am really disappointed.

Other Question:

How can I delete this “Goodcloud” completely ?


I know what is your concern!

You can just turn off Cloud in your router’s UI and then no day is send to the cloud at all.

I have told you what data is transferred and that is what it is. Nothing hiding! The router even keeps the logs there and every api call is recorded. I have stated in one above post of that will be enhanced so you can choose to wait until these features are available to use the cloud.

Anyway, do no need to use the cloud at all if you do not need to. You can even flash firmware from openwrt directly and problem solved.

Sorry if I repeat my question:

What files must be deleted to get rid of this potential dangerous code

of this oxymoron “Goodcloud” ?

Thank you

If you don’t want to use the cloud then use the OpenWRT builds from here:

I will specify what I mean:

If I want to use glinet-software without the code for “GoodCloud”,

which files should I delete ?

I hope it’s understandible, thanks.

gl-mqtt, you can remove it.

1 Like

Thank you ,

this information will be of interest for a lot of people here who dont want

to give nearly all data and nearly admin-rights to a cloud.

Your website is AWESOME. Thank you!

Now, I wish you had a way to list all the routers VPN connection status.

Say, you have 100 routers and you are monitoring them via America Servers.

Would you please add a COLUMN that says VPN status?

VPN Status Column would should VPN server name and ON/OFF status for all 100 Routers.

In this way, I would NOT have to connect to each VPN router individually to see the status of my VPN. This is way too time consuming.

Again, not complaining. You have a great software.

Thank you.

Actually we are working to improve the S2S solution. At the same time, improve the user experience to manage vpn client and servers via the cloud.
Thanks for your suggestions and will keep it in mind.