|
@@ -958,6 +958,273 @@ EOF
|
958
|
958
|
}
|
959
|
959
|
|
960
|
960
|
##############################################################################
|
|
961
|
+# setup_utils
|
|
962
|
+##############################################################################
|
|
963
|
+
|
|
964
|
+function image_install_inadyn {
|
|
965
|
+ if [ $INSTALLING_MESH ]; then
|
|
966
|
+ return
|
|
967
|
+ fi
|
|
968
|
+ if [ ! -d $rootdir/root/build ]; then
|
|
969
|
+ mkdir -p $rootdir/root/build
|
|
970
|
+ fi
|
|
971
|
+ chroot "$rootdir" apt-get -yq install build-essential curl libgnutls28-dev automake1.11
|
|
972
|
+ git clone $INADYN_REPO $rootdir/root/build/inadyn
|
|
973
|
+ if [ ! -d $rootdir/root/build/inadyn ]; then
|
|
974
|
+ echo 'Failed to clone inadyn'
|
|
975
|
+ exit 728252
|
|
976
|
+ fi
|
|
977
|
+ cd $rootdir/root/build/inadyn
|
|
978
|
+ git checkout $INADYN_COMMIT -b $INADYN_COMMIT
|
|
979
|
+
|
|
980
|
+ chroot "$rootdir" cd /root/build/inadyn && ./configure
|
|
981
|
+ chroot "$rootdir" cd /root/build/inadyn && USE_OPENSSL=1 make
|
|
982
|
+ chroot "$rootdir" cd /root/build/inadyn && make install
|
|
983
|
+ if [ ! -f $rootdir/usr/local/sbin/inadyn ]; then
|
|
984
|
+ echo 'Failed to build inadyn'
|
|
985
|
+ exit 6209356
|
|
986
|
+ fi
|
|
987
|
+
|
|
988
|
+ # create a configuration file
|
|
989
|
+ echo 'background' > $rootdir/etc/inadyn.conf
|
|
990
|
+ echo 'verbose 1' >> $rootdir/etc/inadyn.conf
|
|
991
|
+ echo 'period 300' >> $rootdir/etc/inadyn.conf
|
|
992
|
+ echo 'startup-delay 60' >> $rootdir/etc/inadyn.conf
|
|
993
|
+ echo 'cache-dir /run/inadyn' >> $rootdir/etc/inadyn.conf
|
|
994
|
+ echo 'logfile /dev/null' >> $rootdir/etc/inadyn.conf
|
|
995
|
+ chmod 600 $rootdir/etc/inadyn.conf
|
|
996
|
+
|
|
997
|
+ echo '[Unit]' > $rootdir/etc/systemd/system/inadyn.service
|
|
998
|
+ echo 'Description=inadyn (DynDNS updater)' >> $rootdir/etc/systemd/system/inadyn.service
|
|
999
|
+ echo 'After=network.target' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1000
|
+ echo '' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1001
|
+ echo '[Service]' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1002
|
+ echo 'ExecStart=/usr/local/sbin/inadyn --config /etc/inadyn.conf' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1003
|
+ echo 'Restart=always' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1004
|
+ echo 'Type=forking' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1005
|
+ echo '' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1006
|
+ echo '[Install]' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1007
|
+ echo 'WantedBy=multi-user.target' >> $rootdir/etc/systemd/system/inadyn.service
|
|
1008
|
+ chroot "$rootdir" systemctl enable inadyn
|
|
1009
|
+ echo "inadyn commit:$INADYN_COMMIT" >> $rootdir/root/freedombone-completed.txt
|
|
1010
|
+}
|
|
1011
|
+
|
|
1012
|
+function image_setup_utils {
|
|
1013
|
+ if [ $INSTALLING_MESH ]; then
|
|
1014
|
+ return
|
|
1015
|
+ fi
|
|
1016
|
+ chroot "$rootdir" apt-get -yq install nfs-kernel-server
|
|
1017
|
+
|
|
1018
|
+ if [[ $ARCHITECTURE == 'amd64' ]]; then
|
|
1019
|
+ chroot "$rootdir" apt-get -yq install linux-image-amd64 -t jessie-backports
|
|
1020
|
+ fi
|
|
1021
|
+
|
|
1022
|
+ chroot "$rootdir" apt-get -yq install locales locales-all debconf
|
|
1023
|
+
|
|
1024
|
+ # basic firewall
|
|
1025
|
+ chroot "$rootdir" iptables -P INPUT ACCEPT
|
|
1026
|
+ chroot "$rootdir" ip6tables -P INPUT ACCEPT
|
|
1027
|
+ chroot "$rootdir" iptables -F
|
|
1028
|
+ chroot "$rootdir" ip6tables -F
|
|
1029
|
+ chroot "$rootdir" iptables -t nat -F
|
|
1030
|
+ chroot "$rootdir" ip6tables -t nat -F
|
|
1031
|
+ chroot "$rootdir" iptables -X
|
|
1032
|
+ chroot "$rootdir" ip6tables -X
|
|
1033
|
+ chroot "$rootdir" iptables -P INPUT DROP
|
|
1034
|
+ chroot "$rootdir" ip6tables -P INPUT DROP
|
|
1035
|
+ chroot "$rootdir" iptables -P FORWARD DROP
|
|
1036
|
+ chroot "$rootdir" ip6tables -P FORWARD DROP
|
|
1037
|
+ chroot "$rootdir" iptables -A INPUT -i lo -j ACCEPT
|
|
1038
|
+ chroot "$rootdir" iptables -A INPUT -m conntrack --ctstate ESTABLISHED -j ACCEPT
|
|
1039
|
+ chroot "$rootdir" iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP
|
|
1040
|
+ chroot "$rootdir" iptables -A INPUT -f -j DROP
|
|
1041
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --tcp-flags ALL ALL -j DROP
|
|
1042
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --tcp-flags ALL FIN,PSH,URG -j DROP
|
|
1043
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP
|
|
1044
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP
|
|
1045
|
+ chroot "$rootdir" iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
|
|
1046
|
+ chroot "$rootdir" iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
|
|
1047
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --dport 548 -j ACCEPT
|
|
1048
|
+ chroot "$rootdir" iptables -A INPUT -p udp --dport 548 -j ACCEPT
|
|
1049
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --dport 5353 -j ACCEPT
|
|
1050
|
+ chroot "$rootdir" iptables -A INPUT -p udp --dport 5353 -j ACCEPT
|
|
1051
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --dport 5354 -j ACCEPT
|
|
1052
|
+ chroot "$rootdir" iptables -A INPUT -p udp --dport 5354 -j ACCEPT
|
|
1053
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --dport $SSH_PORT -j ACCEPT
|
|
1054
|
+ chroot "$rootdir" iptables -A INPUT -p udp -m udp --dport 1024:65535 --sport 53 -j ACCEPT
|
|
1055
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --dport 80 -j ACCEPT
|
|
1056
|
+ chroot "$rootdir" iptables -A INPUT -p tcp --dport 443 -j ACCEPT
|
|
1057
|
+
|
|
1058
|
+ # save the firewall
|
|
1059
|
+ chroot "$rootdir" iptables-save > /etc/firewall.conf
|
|
1060
|
+ chroot "$rootdir" ip6tables-save > /etc/firewall6.conf
|
|
1061
|
+ printf '#!/bin/sh\n' > $rootdir/etc/network/if-up.d/iptables
|
|
1062
|
+ printf 'iptables-restore < /etc/firewall.conf\n' >> $rootdir/etc/network/if-up.d/iptables
|
|
1063
|
+ printf 'ip6tables-restore < /etc/firewall6.conf\n' >> $rootdir/etc/network/if-up.d/iptables
|
|
1064
|
+ if [ -f $rootdir/etc/network/if-up.d/iptables ]; then
|
|
1065
|
+ chmod +x $rootdir/etc/network/if-up.d/iptables
|
|
1066
|
+ fi
|
|
1067
|
+
|
|
1068
|
+ SYSCTL_FILE=$rootdir/etc/sysctl.conf
|
|
1069
|
+ if [ ! -f $SYSCTL_FILE ]; then
|
|
1070
|
+ touch $SYSCTL_FILE
|
|
1071
|
+ fi
|
|
1072
|
+ cp $SYSCTL_FILE $rootdir/root/sysctl.conf
|
|
1073
|
+ chown $CURR_USER:$CURR_GROUP $rootdir/root/sysctl.conf
|
|
1074
|
+ if ! grep -q "tcp_challenge_ack_limit" $rootdir/root/sysctl.conf; then
|
|
1075
|
+ echo 'net.ipv4.tcp_challenge_ack_limit = 999999999' >> $rootdir/root/sysctl.conf
|
|
1076
|
+ else
|
|
1077
|
+ sed -i 's|net.ipv4.tcp_challenge_ack_limit.*|net.ipv4.tcp_challenge_ack_limit = 999999999|g' $rootdir/root/sysctl.conf
|
|
1078
|
+ fi
|
|
1079
|
+ cp $rootdir/root/sysctl.conf $SYSCTL_FILE
|
|
1080
|
+ rm $rootdir/root/sysctl.conf
|
|
1081
|
+
|
|
1082
|
+ # all the packages
|
|
1083
|
+ chroot "$rootdir" apt-get -yq install apt-transport-https
|
|
1084
|
+ chroot "$rootdir" apt-get -yq remove --purge apache*
|
|
1085
|
+ chroot "$rootdir" apt-get -yq dist-upgrade
|
|
1086
|
+ chroot "$rootdir" apt-get -yq install ca-certificates
|
|
1087
|
+ chroot "$rootdir" apt-get -yq install apt-utils
|
|
1088
|
+ chroot "$rootdir" apt-get -yq install cryptsetup libgfshare-bin obnam sshpass wget avahi-daemon
|
|
1089
|
+ chroot "$rootdir" apt-get -yq install avahi-utils avahi-discover connect-proxy openssh-server
|
|
1090
|
+ chroot "$rootdir" apt-get -yq install sudo git dialog build-essential avahi-daemon avahi-utils
|
|
1091
|
+ chroot "$rootdir" apt-get -yq install avahi-discover avahi-autoipd iptables dnsutils net-tools
|
|
1092
|
+ chroot "$rootdir" apt-get -yq install network-manager iputils-ping libnss-mdns libnss-myhostname
|
|
1093
|
+ chroot "$rootdir" apt-get -yq install libnss-gw-name nano man ntp locales locales-all debconf
|
|
1094
|
+ chroot "$rootdir" apt-get -yq install wireless-tools wpasupplicant usbutils cryptsetup zsh
|
|
1095
|
+ chroot "$rootdir" apt-get -yq install pinentry-curses eatmydata iotop bc grub2 hostapd haveged
|
|
1096
|
+ chroot "$rootdir" apt-get -yq install cpulimit screen elinks
|
|
1097
|
+ chroot "$rootdir" apt-get -yq install libpam-cracklib
|
|
1098
|
+
|
|
1099
|
+ # Tor and ssh over tor
|
|
1100
|
+ chroot "$rootdir" apt-get -yq install tor connect-proxy
|
|
1101
|
+ sed -i 's|#Log notice file.*|Log notice file /dev/null|g' $rootdir/etc/tor/torrc
|
|
1102
|
+ sed -i 's|Log notice file.*|Log notice file /dev/null|g' $rootdir/etc/tor/torrc
|
|
1103
|
+ if ! grep -q 'Host *.onion' $rootdir/root/.ssh/config; then
|
|
1104
|
+ if [ ! -d $rootdir/root/.ssh ]; then
|
|
1105
|
+ mkdir $rootdir/root/.ssh
|
|
1106
|
+ fi
|
|
1107
|
+ echo 'Host *.onion' >> $rootdir/root/.ssh/config
|
|
1108
|
+ echo 'ProxyCommand connect -R remote -5 -S 127.0.0.1:9050 %h %p' >> $rootdir/root/.ssh/config
|
|
1109
|
+ fi
|
|
1110
|
+ if ! grep -q 'Host *.onion' $rootdir/etc/skel/.ssh/config; then
|
|
1111
|
+ if [ ! -d $rootdir/etc/skel/.ssh ]; then
|
|
1112
|
+ mkdir $rootdir/etc/skel/.ssh
|
|
1113
|
+ fi
|
|
1114
|
+ echo 'Host *.onion' >> $rootdir/etc/skel/.ssh/config
|
|
1115
|
+ echo 'ProxyCommand connect -R remote -5 -S 127.0.0.1:9050 %h %p' >> $rootdir/etc/skel/.ssh/config
|
|
1116
|
+ fi
|
|
1117
|
+
|
|
1118
|
+ # Install golang
|
|
1119
|
+ chroot "$rootdir" adduser --disabled-login --gecos 'go' go
|
|
1120
|
+ GOARCH=
|
|
1121
|
+ if [[ $ARCHITECTURE == *"386" || $ARCHITECTURE == *"686" ]]; then
|
|
1122
|
+ GOARCH=386
|
|
1123
|
+ fi
|
|
1124
|
+ if [[ $ARCHITECTURE == *"amd64" || $ARCHITECTURE == "x86_64" ]]; then
|
|
1125
|
+ GOARCH=amd64
|
|
1126
|
+ fi
|
|
1127
|
+ if [[ $ARCHITECTURE == *"arm"* ]]; then
|
|
1128
|
+ GOARCH=armv6l
|
|
1129
|
+ fi
|
|
1130
|
+ GO_SOURCE=https://storage.googleapis.com/golang/go${GO_VERSION}.linux-${GOARCH}.tar.gz
|
|
1131
|
+
|
|
1132
|
+ if [ ! -d ${rootdir}/root/build ]; then
|
|
1133
|
+ mkdir -p $rootdir/root/build
|
|
1134
|
+ fi
|
|
1135
|
+ cd $rootdir/root/build
|
|
1136
|
+ wget ${GO_SOURCE}
|
|
1137
|
+ if [ ! -f ${rootdir}/root/build/go${GO_VERSION}.linux-${GOARCH}.tar.gz ]; then
|
|
1138
|
+ exit 26524
|
|
1139
|
+ fi
|
|
1140
|
+ chroot "$rootdir" tar -C /home/go -xzf ${INSTALL_DIR}/go${GO_VERSION}.linux-${GOARCH}.tar.gz
|
|
1141
|
+ if [ ! -d ${rootdir}/home/go/go/bin ]; then
|
|
1142
|
+ echo 'Go binary not installed'
|
|
1143
|
+ exit 763562
|
|
1144
|
+ fi
|
|
1145
|
+ mv ${rootdir}/home/go/go ${rootdir}/home/go/go${GO_VERSION}
|
|
1146
|
+ echo "export GOROOT=/home/go" >> ${rootdir}/root/.bashrc
|
|
1147
|
+ echo "export GOROOT=/home/go" >> ${rootdir}/etc/skel/.bashrc
|
|
1148
|
+ echo "export GOROOT=/home/go" >> ${rootdir}/home/go/.bashrc
|
|
1149
|
+ echo "export GOPATH=\$GOROOT/go${GO_VERSION}/bin" >> ${rootdir}/root/.bashrc
|
|
1150
|
+ echo "export GOPATH=\$GOROOT/go${GO_VERSION}/bin" >> ${rootdir}/etc/skel/.bashrc
|
|
1151
|
+ echo "export GOPATH=\$GOROOT/go${GO_VERSION}/bin" >> ${rootdir}/home/go/.bashrc
|
|
1152
|
+ echo 'export PATH=$PATH:$GOPATH' >> ${rootdir}/root/.bashrc
|
|
1153
|
+ echo 'export PATH=$PATH:$GOPATH' >> ${rootdir}/etc/skel/.bashrc
|
|
1154
|
+ echo 'export PATH=$PATH:$GOPATH' >> ${rootdir}/home/go/.bashrc
|
|
1155
|
+ chroot "$rootdir" chown -R go:go /home/go
|
|
1156
|
+ cp ${rootdir}/home/go/go${GO_VERSION}/bin/* ${rootdir}/usr/bin
|
|
1157
|
+
|
|
1158
|
+ # Tomb
|
|
1159
|
+ chroot "$rootdir" apt-get -yq install zsh pinentry-curses
|
|
1160
|
+ git clone $TOMB_REPO $rootdir/root/build/tomb
|
|
1161
|
+ cd $rootdir/root/build/tomb
|
|
1162
|
+ git checkout $TOMB_COMMIT -b $TOMB_COMMIT
|
|
1163
|
+ chroot "$rootdir" make install
|
|
1164
|
+ echo "tomb commit:$TOMB_COMMIT" >> $rootdir/root/freedombone-completed.txt
|
|
1165
|
+
|
|
1166
|
+ if ! grep '* hard maxsyslogins' $rootdir/etc/security/limits.conf; then
|
|
1167
|
+ echo '* hard maxsyslogins 10' >> $rootdir/etc/security/limits.conf
|
|
1168
|
+ else
|
|
1169
|
+ sed -i 's|hard maxsyslogins.*|hard maxsyslogins 10|g' $rootdir/etc/security/limits.conf
|
|
1170
|
+ fi
|
|
1171
|
+
|
|
1172
|
+ # Max logins for each user
|
|
1173
|
+ if ! grep '* hard maxlogins' $rootdir/etc/security/limits.conf; then
|
|
1174
|
+ echo '* hard maxlogins 2' >> $rootdir/etc/security/limits.conf
|
|
1175
|
+ else
|
|
1176
|
+ sed -i 's|hard maxlogins.*|hard maxlogins 2|g' $rootdir/etc/security/limits.conf
|
|
1177
|
+ fi
|
|
1178
|
+
|
|
1179
|
+ # Email
|
|
1180
|
+ chroot "$rootdir" apt-get -yq remove postfix
|
|
1181
|
+ chroot "$rootdir" apt-get -yq install exim4-daemon-heavy sasl2-bin swaks libnet-ssleay-perl procmail
|
|
1182
|
+ chroot "$rootdir" apt-get -yq install spamassassin
|
|
1183
|
+ chroot "$rootdir" apt-get -yq install dovecot-imapd
|
|
1184
|
+
|
|
1185
|
+ #backup
|
|
1186
|
+ chroot "$rootdir" apt-get -yq install obnam gnupg
|
|
1187
|
+
|
|
1188
|
+ # monkeysphere
|
|
1189
|
+ chroot "$rootdir" apt-get -yq install monkeysphere msva-perl
|
|
1190
|
+
|
|
1191
|
+ # encrypting email
|
|
1192
|
+ chroot "$rootdir" apt-get -yq install libmail-gnupg-perl
|
|
1193
|
+ git clone $GPGIT_REPO $rootdir/root/build/gpgit
|
|
1194
|
+ cd $rootdir/root/build/gpgit
|
|
1195
|
+ git checkout $GPGIT_COMMIT -b $GPGIT_COMMIT
|
|
1196
|
+ cp gpgit.pl $rootdir/usr/bin
|
|
1197
|
+ echo "gpgit commit:$GPGIT_COMMIT" >> $rootdir/root/freedombone-completed.txt
|
|
1198
|
+
|
|
1199
|
+ # email client
|
|
1200
|
+ chroot "$rootdir" apt-get -yq install mutt-patched lynx abook urlview
|
|
1201
|
+
|
|
1202
|
+ git clone $CLEANUP_MAILDIR_REPO $rootdir/root/build/cleanup-maildir
|
|
1203
|
+ cd $rootdir/root/build/cleanup-maildir
|
|
1204
|
+ git checkout $CLEANUP_MAILDIR_COMMIT -b $CLEANUP_MAILDIR_COMMIT
|
|
1205
|
+ cp $rootdir/root/build/cleanup-maildir/cleanup-maildir $rootdir/usr/bin
|
|
1206
|
+ echo "cleanup-maildir commit:$CLEANUP_MAILDIR_COMMIT" >> $rootdir/root/freedombone-completed.txt
|
|
1207
|
+
|
|
1208
|
+ # web server
|
|
1209
|
+ chroot "$rootdir" apt-get -yq remove --purge apache2
|
|
1210
|
+ chroot "$rootdir" apt-get -yq install nginx php5-fpm
|
|
1211
|
+ git clone $$NGINX_ENSITE_REPO $rootdir/root/build/nginx_ensite
|
|
1212
|
+ cd $rootdir/root/build/nginx_ensite
|
|
1213
|
+ git checkout $NGINX_ENSITE_COMMIT -b $NGINX_ENSITE_COMMIT
|
|
1214
|
+ echo "nginx-ensite commit:$NGINX_ENSITE_COMMIT" >> $rootdir/root/freedombone-completed.txt
|
|
1215
|
+ chroot "$rootdir" make install
|
|
1216
|
+ chroot "$rootdir" nginx_dissite default
|
|
1217
|
+ if [ ! -f $rootdir/etc/pam.d/nginx ]; then
|
|
1218
|
+ echo '#%PAM-1.0' > $rootdir/etc/pam.d/nginx
|
|
1219
|
+ echo '@include common-auth' >> $rootdir/etc/pam.d/nginx
|
|
1220
|
+ echo '@include common-account' >> $rootdir/etc/pam.d/nginx
|
|
1221
|
+ echo '@include common-session' >> $rootdir/etc/pam.d/nginx
|
|
1222
|
+ fi
|
|
1223
|
+ chroot "$rootdir" apt-get -yq install tripwire
|
|
1224
|
+}
|
|
1225
|
+
|
|
1226
|
+
|
|
1227
|
+##############################################################################
|
961
|
1228
|
|
962
|
1229
|
|
963
|
1230
|
# Set to true/false to control if eatmydata is used during build
|
|
@@ -1100,8 +1367,11 @@ continue_installation
|
1100
|
1367
|
initialise_mesh
|
1101
|
1368
|
configure_wifi
|
1102
|
1369
|
configure_user_interface
|
|
1370
|
+image_setup_utils
|
|
1371
|
+image_install_inadyn
|
1103
|
1372
|
|
1104
|
1373
|
# remove downloaded packages
|
|
1374
|
+chroot $rootdir apt-get -y autoremove
|
1105
|
1375
|
chroot $rootdir apt-get clean
|
1106
|
1376
|
|
1107
|
1377
|
cd /
|