freedombone-mesh-batman 20KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Used to enable or disable batman mesh protocol on wlanX
  12. #
  13. # License
  14. # =======
  15. #
  16. # Copyright (C) 2015-2017 Bob Mottram <bob@freedombone.net>
  17. #
  18. # This program is free software: you can redistribute it and/or modify
  19. # it under the terms of the GNU Affero General Public License as published by
  20. # the Free Software Foundation, either version 3 of the License, or
  21. # (at your option) any later version.
  22. #
  23. # This program is distributed in the hope that it will be useful,
  24. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. # GNU Affero General Public License for more details.
  27. #
  28. # You should have received a copy of the GNU Affero General Public License
  29. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  30. PROJECT_NAME='freedombone'
  31. COMPLETION_FILE=/root/${PROJECT_NAME}-completed.txt
  32. # hotspot passphrase must be 5 characters or longer
  33. HOTSPOT_PASSPHRASE="${PROJECT_NAME}"
  34. source /usr/share/${PROJECT_NAME}/utils/${PROJECT_NAME}-utils-wifi
  35. if [[ $1 == "start" ]]; then
  36. # install avahi
  37. sed -i "s|#host-name=.*|host-name=$(hostname)|g" /etc/avahi/avahi-daemon.conf
  38. sed -i "s|host-name=.*|host-name=$(hostname)|g" /etc/avahi/avahi-daemon.conf
  39. sed -i "s|use-ipv4=.*|use-ipv4=yes|g" /etc/avahi/avahi-daemon.conf
  40. sed -i "s|use-ipv6=.*|use-ipv6=no|g" /etc/avahi/avahi-daemon.conf
  41. sed -i "s|#disallow-other-stacks=.*|disallow-other-stacks=yes|g" /etc/avahi/avahi-daemon.conf
  42. sed -i "s|hosts:.*|hosts: files mdns4_minimal dns mdns4 mdns|g" /etc/nsswitch.conf
  43. fi
  44. # Mesh definition
  45. WIFI_SSID='mesh'
  46. if [ -f $COMPLETION_FILE ]; then
  47. if grep -q "WIFI_SSID:" $COMPLETION_FILE; then
  48. WIFI_SSID=$(cat $COMPLETION_FILE | grep "WIFI_SSID:" | awk -F ':' '{print $2}')
  49. fi
  50. sed -i "s|WIFI_SSID:.*|WIFI_SSID:${WIFI_SSID}|g" $COMPLETION_FILE
  51. fi
  52. CELLID='any'
  53. CHANNEL=2
  54. HOTSPOT_CHANNEL=6
  55. if [ -f $COMPLETION_FILE ]; then
  56. if grep -q "Wifi channel:" $COMPLETION_FILE; then
  57. CHANNEL=$(cat $COMPLETION_FILE | grep "Wifi channel:" | awk -F ':' '{print $2}')
  58. fi
  59. sed -i "s|Wifi channel:.*|Wifi channel:${CHANNEL}|g" $COMPLETION_FILE
  60. fi
  61. ZERONET_PORT=15441
  62. IPFS_PORT=4001
  63. TOX_PORT=33445
  64. TRACKER_PORT=6969
  65. LIBREVAULT_PORT=42345
  66. TAHOELAFS_PORT=50213
  67. GIT_SSB_PORT=7718
  68. NGINX_GIT_SSB_PORT=7719
  69. # Ethernet bridge definition (bridged to bat0)
  70. BRIDGE=br-mesh
  71. BRIDGE_HOTSPOT=br-hotspot
  72. IFACE=
  73. IFACE_SECONDARY=
  74. EIFACE=eth0
  75. WLAN_ADAPTORS=$(count_wlan)
  76. if [ $WLAN_ADAPTORS -eq 0 ]; then
  77. echo $'No wlan adaptors found'
  78. exit 0
  79. fi
  80. update_wifi_adaptors
  81. if [ ! $IFACE ]; then
  82. echo $'No wlan adaptor'
  83. exit 0
  84. fi
  85. if [ -e /etc/default/batctl ]; then
  86. . /etc/default/batctl
  87. fi
  88. function get_ipv4_wlan {
  89. echo $(ip -o -f inet addr show dev "$IFACE" | awk '{print $4}' | awk 'END {print}' | awk -F '/' '{print $1}')
  90. }
  91. function mesh_hotspot_ip_address {
  92. echo $(ip -o -f inet addr show dev "${BRIDGE}" | awk '{print $4}' | awk 'END {print}' | awk -F '/' '{print $1}')
  93. }
  94. function global_rate_limit {
  95. if ! grep -q "tcp_challenge_ack_limit" /etc/sysctl.conf; then
  96. echo 'net.ipv4.tcp_challenge_ack_limit = 999999999' >> /etc/sysctl.conf
  97. else
  98. sed -i 's|net.ipv4.tcp_challenge_ack_limit.*|net.ipv4.tcp_challenge_ack_limit = 999999999|g' /etc/sysctl.conf
  99. fi
  100. sysctl -p -q
  101. }
  102. function status {
  103. batctl o
  104. }
  105. function stop {
  106. if [ -z "$IFACE" ]; then
  107. echo 'error: unable to find wifi interface, not enabling batman-adv mesh'
  108. return
  109. fi
  110. systemctl stop dnsmasq
  111. systemctl disable dnsmasq
  112. if [ "$EIFACE" ]; then
  113. brctl delif $BRIDGE bat0
  114. ifconfig $BRIDGE down || true
  115. ethernet_connected=$(cat /sys/class/net/$EIFACE/carrier)
  116. if [[ "$ethernet_connected" != "0" ]]; then
  117. systemctl stop hostapd
  118. brctl delif $BRIDGE $EIFACE
  119. ifconfig $EIFACE down -promisc
  120. fi
  121. brctl delbr $BRIDGE
  122. fi
  123. avahi-autoipd -k $BRIDGE
  124. avahi-autoipd -k $IFACE
  125. ifconfig bat0 down -promisc
  126. batctl if del $IFACE
  127. ifconfig $IFACE mtu 1500
  128. ifconfig $IFACE down
  129. iwconfig $IFACE mode managed
  130. if [ $IFACE_SECONDARY ]; then
  131. systemctl stop hostapd
  132. systemctl disable hostapd
  133. batctl if del $IFACE_SECONDARY
  134. ifconfig $IFACE_SECONDARY mtu 1500
  135. ifconfig $IFACE_SECONDARY down
  136. iwconfig $IFACE_SECONDARY mode managed
  137. fi
  138. rmmod batman-adv
  139. iptables -D INPUT -p tcp --dport $TRACKER_PORT -j ACCEPT
  140. iptables -D INPUT -p udp --dport $TRACKER_PORT -j ACCEPT
  141. iptables -D INPUT -p tcp --dport 80 -j ACCEPT
  142. iptables -D INPUT -p udp --dport 80 -j ACCEPT
  143. iptables -D INPUT -p tcp --dport 548 -j ACCEPT
  144. iptables -D INPUT -p udp --dport 548 -j ACCEPT
  145. iptables -D INPUT -p tcp --dport 5353 -j ACCEPT
  146. iptables -D INPUT -p udp --dport 5353 -j ACCEPT
  147. iptables -D INPUT -p tcp --dport 5354 -j ACCEPT
  148. iptables -D INPUT -p udp --dport 5354 -j ACCEPT
  149. iptables -D INPUT -p tcp --dport $ZERONET_PORT -j ACCEPT
  150. iptables -D INPUT -p udp --dport $ZERONET_PORT -j ACCEPT
  151. iptables -D INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
  152. iptables -D INPUT -p udp --dport $IPFS_PORT -j ACCEPT
  153. iptables -D INPUT -p tcp --dport $TOX_PORT -j ACCEPT
  154. iptables -D INPUT -p udp --dport $TOX_PORT -j ACCEPT
  155. iptables -D INPUT -p tcp --dport $LIBREVAULT_PORT -j ACCEPT
  156. iptables -D INPUT -p udp --dport $LIBREVAULT_PORT -j ACCEPT
  157. iptables -D INPUT -p tcp --dport $TAHOELAFS_PORT -j ACCEPT
  158. # SSB/Scuttlebot/Patchwork
  159. iptables -D INPUT -p tcp --dport $GIT_SSB_PORT -j ACCEPT
  160. iptables -D INPUT -p udp --dport 8008 -j ACCEPT
  161. iptables -D INPUT -p tcp --dport 8008 -j ACCEPT
  162. iptables -D INPUT -p udp --dport 8010 -j ACCEPT
  163. iptables -D INPUT -p tcp --dport 8010 -j ACCEPT
  164. # vpn over the internet
  165. iptables -D INPUT -p tcp --dport 653 -j ACCEPT
  166. iptables -D INPUT -p udp --dport 653 -j ACCEPT
  167. iptables -D INPUT -i ${EIFACE} -m state --state NEW -p tcp --dport 1194 -j ACCEPT
  168. iptables -D INPUT -i tun+ -j ACCEPT
  169. iptables -D FORWARD -i tun+ -j ACCEPT
  170. iptables -D FORWARD -i tun+ -o ${EIFACE} -m state --state RELATED,ESTABLISHED -j ACCEPT
  171. iptables -D FORWARD -i ${EIFACE} -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
  172. iptables -t nat -D POSTROUTING -s 10.8.0.0/24 -o ${EIFACE} -j MASQUERADE
  173. iptables -D OUTPUT -o tun+ -j ACCEPT
  174. echo 0 > /proc/sys/net/ipv4/ip_forward
  175. sed -i 's|net.ipv4.ip_forward=.*|net.ipv4.ip_forward=0|g' /etc/sysctl.conf
  176. systemctl restart network-manager
  177. }
  178. function verify {
  179. tempfile="$(mktemp)"
  180. batctl o > $tempfile
  181. if grep -q "disabled" $tempfile; then
  182. echo $'B.A.T.M.A.N. not enabled'
  183. rm $tempfile
  184. stop
  185. exit 726835
  186. fi
  187. echo $'B.A.T.M.A.N. is running'
  188. rm $tempfile
  189. }
  190. function assign_peer_address {
  191. for i in {1..6}; do
  192. number=$RANDOM
  193. let "number %= 255"
  194. octet=$(echo "obase=16;$number" | bc)
  195. if [ ${#octet} -lt 2 ]; then
  196. octet="0${octet}"
  197. fi
  198. if [ $i -gt 1 ]; then
  199. echo -n ":"
  200. fi
  201. echo -n "${octet}"
  202. done
  203. }
  204. function add_wifi_interface {
  205. ifname=$1
  206. ifssid=$WIFI_SSID
  207. if [ $2 ]; then
  208. ifssid=$2
  209. fi
  210. ifmode=ad-hoc
  211. if [ $3 ]; then
  212. ifmode=$3
  213. fi
  214. ifchannel=$CHANNEL
  215. if [ $4 ]; then
  216. ifchannel=$4
  217. fi
  218. ifconfig $ifname down
  219. ifconfig $ifname mtu 1532
  220. peermac=$(assign_peer_address)
  221. if [ ! $peermac ]; then
  222. echo $"Unable to obtain MAC address for $peermac on $ifname"
  223. return
  224. fi
  225. ifconfig $ifname hw ether $peermac
  226. echo $"$ifname assigned MAC address $peermac"
  227. iwconfig $ifname enc off
  228. iwconfig $ifname mode $ifmode essid $ifssid channel $ifchannel
  229. batctl if add $ifname
  230. ifconfig $ifname up
  231. }
  232. function mesh_create_app_downloads_page {
  233. if [ ! -d /root/$PROJECT_NAME/image_build/mesh_apps ]; then
  234. return
  235. fi
  236. if [ ! -d /var/www/html ]; then
  237. return
  238. fi
  239. # Don't go straight to cryptpad when navigating to the peer's IP address
  240. if [ -L /etc/nginx/sites-enabled/cryptpad ]; then
  241. rm /etc/nginx/sites-enabled/cryptpad
  242. ln -s /etc/nginx/sites-available/default /etc/nginx/sites-enabled/default
  243. if [ -d /etc/cryptpad ]; then
  244. systemctl stop cryptpad
  245. systemctl disable cryptpad
  246. fi
  247. systemctl restart nginx
  248. fi
  249. # Don't show the cryptpad icon on the desktop
  250. if [ -f /home/fbone/Desktop/cryptpad.desktop ]; then
  251. mv /home/fbone/Desktop/cryptpad.desktop /home/fbone/.cryptpad.desktop
  252. fi
  253. cp /root/$PROJECT_NAME/website/EN/meshindex.html /var/www/html/index.html
  254. if [ ! -f /var/www/html/ssb.apk ]; then
  255. cp /root/$PROJECT_NAME/image_build/mesh_apps/ssb.apk /var/www/html/ssb.apk
  256. fi
  257. if [ ! -f /var/www/html/trifa.apk ]; then
  258. cp /root/$PROJECT_NAME/image_build/mesh_apps/trifa.apk /var/www/html/trifa.apk
  259. fi
  260. if [ ! -d /var/www/html/images ]; then
  261. mkdir /var/www/html/images
  262. fi
  263. if [ ! -f /var/www/html/images/logo.png ]; then
  264. cp /root/$PROJECT_NAME/img/logo.png /var/www/html/images/logo.png
  265. fi
  266. if [ ! -f /var/www/html/images/ssb.png ]; then
  267. cp /root/$PROJECT_NAME/img/icon_patchwork.png /var/www/html/images/ssb.png
  268. fi
  269. if [ ! -f /var/www/html/images/trifa.png ]; then
  270. cp /root/$PROJECT_NAME/img/trifa.png /var/www/html/images/trifa.png
  271. fi
  272. if [ ! -f /var/www/html/freedombone.css ]; then
  273. cp /root/$PROJECT_NAME/website/freedombone.css /var/www/html/freedombone.css
  274. fi
  275. chown -R www-data:www-data /var/www/html/*
  276. }
  277. function start {
  278. update_wifi_adaptors
  279. if [ -z "$IFACE" ] ; then
  280. echo 'error: unable to find wifi interface, not enabling batman-adv mesh'
  281. exit 723657
  282. fi
  283. echo "info: enabling batman-adv mesh network $WIFI_SSID on $IFACE"
  284. systemctl stop network-manager
  285. sleep 5
  286. systemctl stop dnsmasq
  287. systemctl disable dnsmasq
  288. # remove an avahi service which isn't used
  289. if [ -f /etc/avahi/services/udisks.service ]; then
  290. sudo rm /etc/avahi/services/udisks.service
  291. fi
  292. global_rate_limit
  293. # Might have to re-enable wifi
  294. rfkill unblock $(rfkill list|awk -F: "/phy/ {print $1}") || true
  295. secondary_wifi_available=
  296. if [ $IFACE_SECONDARY ]; then
  297. if [[ $IFACE != $IFACE_SECONDARY ]]; then
  298. if [ -d /etc/hostapd ]; then
  299. if [ ${#HOTSPOT_PASSPHRASE} -gt 4 ]; then
  300. secondary_wifi_available=1
  301. else
  302. echo $'Hotspot passphrase is too short'
  303. fi
  304. fi
  305. fi
  306. fi
  307. modprobe batman-adv
  308. add_wifi_interface $IFACE $WIFI_SSID ad-hoc $CHANNEL
  309. avahi-autoipd --force-bind --daemonize --wait $IFACE
  310. # NOTE: Don't connect the secondary wifi device. hostapd will handle that by itself
  311. ifconfig bat0 up promisc
  312. brctl addbr $BRIDGE
  313. brctl addif $BRIDGE bat0
  314. ifconfig bat0 0.0.0.0
  315. ethernet_connected='0'
  316. if [ "$EIFACE" ] ; then
  317. ethernet_connected=$(cat /sys/class/net/$EIFACE/carrier)
  318. if [[ "$ethernet_connected" != "0" ]]; then
  319. echo $'Trying ethernet bridge to the internet'
  320. brctl addif $BRIDGE $EIFACE
  321. ifconfig $EIFACE 0.0.0.0
  322. ifconfig $EIFACE up promisc
  323. echo $'End of ethernet bridge'
  324. else
  325. echo $"$EIFACE is not connected"
  326. fi
  327. fi
  328. ifconfig $BRIDGE up
  329. dhclient $BRIDGE
  330. if [ $secondary_wifi_available ]; then
  331. sed -i 's|#DAEMON_CONF=.*|DAEMON_CONF="/etc/hostapd/hostapd.conf"|g' /etc/default/hostapd
  332. mesh_hotspot_address=$(mesh_hotspot_ip_address)
  333. if [[ "$mesh_hotspot_address" == *'.'* ]]; then
  334. echo "interface=${IFACE_SECONDARY}" > /etc/hostapd/hostapd.conf
  335. echo "bridge=${BRIDGE}" >> /etc/hostapd/hostapd.conf
  336. echo 'driver=nl80211' >> /etc/hostapd/hostapd.conf
  337. echo "country_code=UK" >> /etc/hostapd/hostapd.conf
  338. echo "ssid=${WIFI_SSID}-${mesh_hotspot_address}" >> /etc/hostapd/hostapd.conf
  339. echo 'hw_mode=g' >> /etc/hostapd/hostapd.conf
  340. echo "channel=${HOTSPOT_CHANNEL}" >> /etc/hostapd/hostapd.conf
  341. echo 'wpa=2' >> /etc/hostapd/hostapd.conf
  342. echo "wpa_passphrase=$HOTSPOT_PASSPHRASE" >> /etc/hostapd/hostapd.conf
  343. echo 'wpa_key_mgmt=WPA-PSK' >> /etc/hostapd/hostapd.conf
  344. echo 'wpa_pairwise=TKIP' >> /etc/hostapd/hostapd.conf
  345. echo 'rsn_pairwise=CCMP' >> /etc/hostapd/hostapd.conf
  346. echo 'auth_algs=1' >> /etc/hostapd/hostapd.conf
  347. echo 'macaddr_acl=0' >> /etc/hostapd/hostapd.conf
  348. sed -i "s|#interface=.*|interface=${IFACE_SECONDARY}|g" /etc/dnsmasq.conf
  349. sed -i "s|interface=.*|interface=${IFACE_SECONDARY}|g" /etc/dnsmasq.conf
  350. sed -i "s|listen-address=.*|listen-address=127.0.0.1,$mesh_hotspot_address|g" /etc/dnsmasq.conf
  351. sed -i 's|#listen-address|listen-address|g' /etc/dnsmasq.conf
  352. systemctl enable dnsmasq
  353. systemctl restart dnsmasq
  354. systemctl enable hostapd
  355. systemctl restart hostapd
  356. mesh_create_app_downloads_page
  357. else
  358. secondary_wifi_available=
  359. echo $'WARNING: No IP address could be obtained for the hotspot'
  360. fi
  361. fi
  362. if [ ! $secondary_wifi_available ]; then
  363. systemctl stop hostapd
  364. systemctl disable hostapd
  365. # Recreate the cryptpad symlink
  366. if [ -f /etc/nginx/sites-available/cryptpad ]; then
  367. if [ -L /etc/nginx/sites-enabled/cryptpad ]; then
  368. rm /etc/nginx/sites-enabled/default
  369. fi
  370. systemctl enable cryptpad
  371. systemctl start cryptpad
  372. if [ ! -L /etc/nginx/sites-enabled/cryptpad ]; then
  373. ln -s /etc/nginx/sites-available/cryptpad /etc/nginx/sites-enabled/cryptpad
  374. systemctl restart nginx
  375. fi
  376. fi
  377. if [ -f /home/fbone/.cryptpad.desktop ]; then
  378. mv /home/fbone/.cryptpad.desktop /home/fbone/Desktop/cryptpad.desktop
  379. fi
  380. fi
  381. iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
  382. iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
  383. iptables -A INPUT -p tcp --dport $TRACKER_PORT -j ACCEPT
  384. iptables -A INPUT -p udp --dport $TRACKER_PORT -j ACCEPT
  385. iptables -A INPUT -p tcp --dport 80 -j ACCEPT
  386. iptables -A INPUT -p udp --dport 80 -j ACCEPT
  387. iptables -A INPUT -p tcp --dport 548 -j ACCEPT
  388. iptables -A INPUT -p udp --dport 548 -j ACCEPT
  389. iptables -A INPUT -p tcp --dport 5353 -j ACCEPT
  390. iptables -A INPUT -p udp --dport 5353 -j ACCEPT
  391. iptables -A INPUT -p tcp --dport 5354 -j ACCEPT
  392. iptables -A INPUT -p udp --dport 5354 -j ACCEPT
  393. iptables -A INPUT -p tcp --dport $ZERONET_PORT -j ACCEPT
  394. iptables -A INPUT -p udp --dport $ZERONET_PORT -j ACCEPT
  395. iptables -A INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
  396. iptables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT
  397. iptables -A INPUT -p udp --dport $TOX_PORT -j ACCEPT
  398. iptables -A INPUT -p tcp --dport $LIBREVAULT_PORT -j ACCEPT
  399. iptables -A INPUT -p udp --dport $LIBREVAULT_PORT -j ACCEPT
  400. iptables -A INPUT -p tcp --dport $TAHOELAFS_PORT -j ACCEPT
  401. # SSB/Scuttlebot/Patchwork
  402. iptables -A INPUT -p tcp --dport $GIT_SSB_PORT -j ACCEPT
  403. iptables -A INPUT -p udp --dport 8008 -j ACCEPT
  404. iptables -A INPUT -p tcp --dport 8008 -j ACCEPT
  405. iptables -A INPUT -p udp --dport 8010 -j ACCEPT
  406. iptables -A INPUT -p tcp --dport 8010 -j ACCEPT
  407. # vpn over the internet
  408. # Note: the vpn firewall settings are needed in order for Patchwork
  409. # to discover local peers
  410. iptables -A INPUT -p tcp --dport 653 -j ACCEPT
  411. iptables -A INPUT -p udp --dport 653 -j ACCEPT
  412. iptables -A INPUT -i ${EIFACE} -m state --state NEW -p tcp --dport 1194 -j ACCEPT
  413. iptables -A INPUT -i tun+ -j ACCEPT
  414. iptables -A FORWARD -i tun+ -j ACCEPT
  415. iptables -A FORWARD -i tun+ -o ${EIFACE} -m state --state RELATED,ESTABLISHED -j ACCEPT
  416. iptables -A FORWARD -i ${EIFACE} -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
  417. iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o ${EIFACE} -j MASQUERADE
  418. iptables -A OUTPUT -o tun+ -j ACCEPT
  419. echo 1 > /proc/sys/net/ipv4/ip_forward
  420. sed -i 's|# net.ipv4.ip_forward|net.ipv4.ip_forward|g' /etc/sysctl.conf
  421. sed -i 's|#net.ipv4.ip_forward|net.ipv4.ip_forward|g' /etc/sysctl.conf
  422. sed -i 's|net.ipv4.ip_forward.*|net.ipv4.ip_forward=1|g' /etc/sysctl.conf
  423. systemctl restart avahi-daemon
  424. if [ -f /etc/scuttlebot/.ssb/config ]; then
  425. ethernet_connected=$(cat /sys/class/net/eth0/carrier)
  426. if [[ "$ethernet_connected" != "0" ]]; then
  427. sed -i "s|\"host\": .*|\"host\": \"$(get_ipv4_wlan)\",|g" /etc/scuttlebot/.ssb/config
  428. systemctl restart scuttlebot
  429. else
  430. if [ ! -f /etc/nginx/sites-available/git_ssb ]; then
  431. systemctl stop scuttlebot
  432. else
  433. systemctl restart scuttlebot
  434. fi
  435. fi
  436. fi
  437. # if we have an ethernet connection to an internet router then create
  438. # an onion address for this peer
  439. if [[ "$ethernet_connected" != "0" ]]; then
  440. systemctl enable tor
  441. systemctl start tor
  442. HIDDEN_SERVICE_PATH=/var/lib/tor/hidden_service_
  443. if [ ! -f ${HIDDEN_SERVICE_PATH}mesh/hostname ]; then
  444. echo "HiddenServiceDir ${HIDDEN_SERVICE_PATH}mesh/" >> /etc/tor/torrc
  445. echo "HiddenServicePort 653 127.0.0.1:653" >> /etc/tor/torrc
  446. systemctl restart tor
  447. fi
  448. else
  449. systemctl stop tor
  450. systemctl disable tor
  451. fi
  452. sed -i "s|\"host\":.*|\"host\": \"${HOSTNAME}.local\",|g" /etc/scuttlebot/.ssb/config
  453. sed -i "s|server_name .*|server_name ${HOSTNAME}.local;|g" /etc/nginx/sites-available/git_ssb
  454. systemctl restart scuttlebot
  455. systemctl restart nginx
  456. verify
  457. }
  458. function monitor {
  459. if [ -z "$IFACE" ] ; then
  460. echo 'error: unable to find wifi interface, not enabling batman-adv mesh'
  461. exit 723657
  462. fi
  463. clear
  464. echo ''
  465. echo $'*** Stopping network ***'
  466. echo ''
  467. stop
  468. echo "info: monitoring mesh network $WIFI_SSID on $IFACE"
  469. systemctl stop network-manager
  470. sleep 5
  471. clear
  472. echo ''
  473. echo $'*** Setting firewall rate limit ***'
  474. echo ''
  475. global_rate_limit
  476. clear
  477. echo ''
  478. echo $'*** Enabling wifi adaptor in monitor mode ***'
  479. echo ''
  480. # Might have to re-enable wifi
  481. rfkill unblock $(rfkill list|awk -F: "/phy/ {print $1}") || true
  482. ifconfig $IFACE down
  483. ifconfig $IFACE mtu 1532
  484. ifconfig $IFACE hw ether $(assign_peer_address)
  485. iwconfig $IFACE enc off
  486. iwconfig $IFACE mode monitor channel $CHANNEL
  487. sleep 1
  488. iwconfig $IFACE ap $CELLID
  489. modprobe batman-adv
  490. batctl if add $IFACE
  491. ifconfig $IFACE up
  492. horst -i $IFACE
  493. clear
  494. echo ''
  495. echo $'*** Restarting the network daemon. This may take a while. ***'
  496. echo ''
  497. start
  498. }
  499. if ! grep -q "$IFACE" /proc/net/dev; then
  500. echo 'Interface $IFACE was not found'
  501. stop
  502. exit 1
  503. fi
  504. case "$1" in
  505. start|stop|status|monitor)
  506. $1
  507. ;;
  508. restart)
  509. clear
  510. echo ''
  511. echo $'*** Stopping mesh network connection ***'
  512. echo ''
  513. stop
  514. sleep 10
  515. clear
  516. echo ''
  517. echo $'*** Starting mesh network connection ***'
  518. echo ''
  519. start
  520. ;;
  521. ping)
  522. batctl ping $2
  523. ;;
  524. data)
  525. watch -n1 "batctl s | grep mgmt | grep bytes"
  526. ;;
  527. ls|list)
  528. avahi-browse -atl
  529. ;;
  530. *)
  531. echo "error: invalid parameter $1"
  532. echo 'usage: $0 {start|stop|restart|status|ping|ls|list}'
  533. exit 2
  534. ;;
  535. esac
  536. exit 0