| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463 | 
							- #!/bin/bash
 - #  _____               _           _
 - # |   __|___ ___ ___ _| |___ _____| |_ ___ ___ ___
 - # |   __|  _| -_| -_| . | . |     | . | . |   | -_|
 - # |__|  |_| |___|___|___|___|_|_|_|___|___|_|_|___|
 - #
 - #                              Freedom in the Cloud
 - #
 - # mesh utilities used by the batman and bmx commands
 - #
 - # License
 - # =======
 - #
 - # Copyright (C) 2018 Bob Mottram <bob@freedombone.net>
 - #
 - # This program is free software: you can redistribute it and/or modify
 - # it under the terms of the GNU Affero General Public License as published by
 - # the Free Software Foundation, either version 3 of the License, or
 - # (at your option) any later version.
 - #
 - # This program is distributed in the hope that it will be useful,
 - # but WITHOUT ANY WARRANTY; without even the implied warranty of
 - # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 - # GNU Affero General Public License for more details.
 - #
 - # You should have received a copy of the GNU Affero General Public License
 - # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 - 
 - # File which contains the current protocol in use
 - MESH_CURRENT_PROTOCOL=/root/.mesh_protocol
 - MESH_DEFAULT_PROTOCOL=/root/.mesh_protocol_default
 - 
 - function mesh_generate_ipv6_address {
 -     network=fd66:66:66
 - 
 -     if [ "$1" ]; then
 -         search_ipv6=$(ifconfig "$1" | grep "$network")
 -         if [ "$search_ipv6" ]; then
 -             result=$(ifconfig "$1" | grep "$network" | awk -F ' ' '{print $2}')
 -             ip -6 addr add "${result}/128" dev "$1"
 -             return
 -         fi
 -     fi
 - 
 -     ipv6_array=( 1 2 3 4 5 6 7 8 9 0 a b c d e f )
 -     a=${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}
 -     b=${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}
 -     c=${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}
 -     d=${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}
 -     e=${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}${ipv6_array[$RANDOM%16]}
 -     result=$network:$a:$b:$c:$d:$e
 -     ip -6 addr add "${result}/128" dev "$1"
 - }
 - 
 - function mesh_protocol_init {
 -     if [[ $1 == "start" ]]; then
 -         # install avahi
 -         sed -i "s|#host-name=.*|host-name=$(hostname)|g" /etc/avahi/avahi-daemon.conf
 -         sed -i "s|host-name=.*|host-name=$(hostname)|g" /etc/avahi/avahi-daemon.conf
 -         sed -i "s|use-ipv4=.*|use-ipv4=no|g" /etc/avahi/avahi-daemon.conf
 -         sed -i "s|use-ipv6=.*|use-ipv6=yes|g" /etc/avahi/avahi-daemon.conf
 -         sed -i "s|#disallow-other-stacks=.*|disallow-other-stacks=yes|g" /etc/avahi/avahi-daemon.conf
 -         sed -i "s|hosts:.*|hosts:          files mdns4_minimal dns mdns4 mdns|g" /etc/nsswitch.conf
 -     fi
 - 
 -     # Mesh definition
 -     WIFI_SSID='mesh'
 -     if [ -f "$COMPLETION_FILE" ]; then
 -         if grep -q "WIFI_SSID:" "$COMPLETION_FILE"; then
 -             WIFI_SSID=$(grep "WIFI_SSID:" "$COMPLETION_FILE" | awk -F ':' '{print $2}')
 -         fi
 -         sed -i "s|WIFI_SSID:.*|WIFI_SSID:${WIFI_SSID}|g" "$COMPLETION_FILE"
 -     fi
 -     CELLID='any'
 - 
 -     CHANNEL=2
 -     HOTSPOT_CHANNEL=6
 -     if [ -f "$COMPLETION_FILE" ]; then
 -         if grep -q "Wifi channel:" "$COMPLETION_FILE"; then
 -             CHANNEL=$(grep "Wifi channel:" "$COMPLETION_FILE" | awk -F ':' '{print $2}')
 -         fi
 -         sed -i "s|Wifi channel:.*|Wifi channel:${CHANNEL}|g" "$COMPLETION_FILE"
 -     fi
 - 
 -     ZERONET_PORT=15441
 -     IPFS_PORT=4001
 -     TOX_PORT=33445
 -     TRACKER_PORT=6969
 -     LIBREVAULT_PORT=42345
 -     TAHOELAFS_PORT=50213
 -     GIT_SSB_PORT=7718
 -     NGINX_GIT_SSB_PORT=7719
 - 
 -     # Ethernet bridge definition (bridged to bat0)
 -     BRIDGE=br-mesh
 -     BRIDGE_HOTSPOT=br-hotspot
 -     IFACE=
 -     IFACE_SECONDARY=
 -     EIFACE=eth0
 -     if [[ "$MESH_INTERFACE_TYPE" == 'wlan'* ]]; then
 -         WLAN_ADAPTORS=$(count_wlan)
 - 
 -         if [ "$WLAN_ADAPTORS" -eq 0 ]; then
 -             echo $'No wlan adaptors found'
 -             exit 0
 -         fi
 -     fi
 - }
 - 
 - function get_ipv6_wlan {
 -     ifconfig "${IFACE}" | grep inet6 | awk -F ' ' '{print $2}'
 - }
 - 
 - function mesh_hotspot_ip_address {
 -     ifconfig "${BRIDGE}" | grep inet6 | awk -F ' ' '{print $2}'
 - }
 - 
 - function global_rate_limit {
 -     if ! grep -q "tcp_challenge_ack_limit" /etc/sysctl.conf; then
 -         echo 'net.ipv4.tcp_challenge_ack_limit = 999999999' >> /etc/sysctl.conf
 -         echo 'net.ipv6.tcp_challenge_ack_limit = 999999999' >> /etc/sysctl.conf
 -     else
 -         sed -i 's|net.ipv4.tcp_challenge_ack_limit.*|net.ipv4.tcp_challenge_ack_limit = 999999999|g' /etc/sysctl.conf
 -         sed -i 's|net.ipv6.tcp_challenge_ack_limit.*|net.ipv6.tcp_challenge_ack_limit = 999999999|g' /etc/sysctl.conf
 -     fi
 -     sysctl -p -q
 - }
 - 
 - function assign_peer_address {
 -     for i in {1..6}; do
 -         number=$RANDOM
 -         (( "number %= 255" ))
 -         octet=$(echo "obase=16;$number" | bc)
 -         if [ ${#octet} -lt 2 ]; then
 -             octet="0${octet}"
 -         fi
 -         if [ $i -gt 1 ]; then
 -             echo -n ":"
 -         fi
 -         echo -n "${octet}"
 -     done
 - }
 - 
 - function mesh_create_app_downloads_page {
 -     if [ ! -d "/root/$PROJECT_NAME/image_build/mesh_apps" ]; then
 -         return
 -     fi
 -     if [ ! -d /var/www/html ]; then
 -         return
 -     fi
 -     # Don't go straight to cryptpad when navigating to the peer's IP address
 -     if [ -L /etc/nginx/sites-enabled/cryptpad ]; then
 -         rm /etc/nginx/sites-enabled/cryptpad
 -         ln -s /etc/nginx/sites-available/default /etc/nginx/sites-enabled/default
 -         if [ -d /etc/cryptpad ]; then
 -             systemctl stop cryptpad
 -             systemctl disable cryptpad
 -         fi
 -         systemctl restart nginx
 -     fi
 -     # Don't show the cryptpad icon on the desktop
 -     if [ -f /home/fbone/Desktop/cryptpad.desktop ]; then
 -         mv /home/fbone/Desktop/cryptpad.desktop /home/fbone/.cryptpad.desktop
 -     fi
 - 
 -     cp "/root/$PROJECT_NAME/website/EN/meshindex.html" /var/www/html/index.html
 -     if [ ! -f /var/www/html/ssb.apk ]; then
 -         cp "/root/$PROJECT_NAME/image_build/mesh_apps/ssb.apk" /var/www/html/ssb.apk
 -     fi
 -     if [ ! -f /var/www/html/trifa.apk ]; then
 -         cp "/root/$PROJECT_NAME/image_build/mesh_apps/trifa.apk" /var/www/html/trifa.apk
 -     fi
 -     if [ ! -d /var/www/html/images ]; then
 -         mkdir /var/www/html/images
 -     fi
 -     if [ ! -f /var/www/html/images/logo.png ]; then
 -         cp "/root/$PROJECT_NAME/img/logo.png" /var/www/html/images/logo.png
 -     fi
 -     if [ ! -f /var/www/html/images/ssb.png ]; then
 -         cp "/root/$PROJECT_NAME/img/icon_patchwork.png" /var/www/html/images/ssb.png
 -     fi
 -     if [ ! -f /var/www/html/images/trifa.png ]; then
 -         cp "/root/$PROJECT_NAME/img/trifa.png" /var/www/html/images/trifa.png
 -     fi
 -     if [ ! -f "/var/www/html/${PROJECT_NAME}.css" ]; then
 -         cp "/root/$PROJECT_NAME/website/${PROJECT_NAME}.css" "/var/www/html/${PROJECT_NAME}.css"
 -     fi
 -     chown -R www-data:www-data /var/www/html/*
 - }
 - 
 - function enable_mesh_firewall {
 -     iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
 -     iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
 -     iptables -A INPUT -p tcp --dport "$TRACKER_PORT" -j ACCEPT
 -     iptables -A INPUT -p udp --dport "$TRACKER_PORT" -j ACCEPT
 -     iptables -A INPUT -p udp --dport 6240 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport 6240 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport 80 -j ACCEPT
 -     iptables -A INPUT -p udp --dport 80 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport 548 -j ACCEPT
 -     iptables -A INPUT -p udp --dport 548 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport 5353 -j ACCEPT
 -     iptables -A INPUT -p udp --dport 5353 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport 5354 -j ACCEPT
 -     iptables -A INPUT -p udp --dport 5354 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport "$ZERONET_PORT" -j ACCEPT
 -     iptables -A INPUT -p udp --dport "$ZERONET_PORT" -j ACCEPT
 -     iptables -A INPUT -p tcp --dport "$IPFS_PORT" -j ACCEPT
 -     iptables -A INPUT -p tcp --dport "$TOX_PORT" -j ACCEPT
 -     iptables -A INPUT -p udp --dport "$TOX_PORT" -j ACCEPT
 -     iptables -A INPUT -p tcp --dport "$LIBREVAULT_PORT" -j ACCEPT
 -     iptables -A INPUT -p udp --dport "$LIBREVAULT_PORT" -j ACCEPT
 -     iptables -A INPUT -p tcp --dport "$TAHOELAFS_PORT" -j ACCEPT
 -     # SSB/Scuttlebot/Patchwork
 -     iptables -A INPUT -p tcp --dport "$GIT_SSB_PORT" -j ACCEPT
 -     iptables -A INPUT -p udp --dport 8008 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport 8008 -j ACCEPT
 -     iptables -A INPUT -p udp --dport 8010 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport 8010 -j ACCEPT
 -     # OLSR2/MANET
 -     iptables -A INPUT -p udp --dport 269 -j ACCEPT
 -     iptables -A INPUT -p tcp --dport 138 -j ACCEPT
 -     # Babel
 -     iptables -A INPUT -p udp --dport 6696 -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 6696 -j ACCEPT
 - 
 - 
 -     ip6tables -A INPUT -p ipv6-icmp -j ACCEPT
 -     ip6tables -A OUTPUT -p ipv6-icmp -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport "$TRACKER_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport "$TRACKER_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 6240 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport 6240 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport 80 -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 80 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport 548 -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 548 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport 5353 -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 5353 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport 5354 -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 5354 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport "$ZERONET_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport "$ZERONET_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport "$IPFS_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport "$TOX_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport "$TOX_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport "$LIBREVAULT_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport "$LIBREVAULT_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport "$TAHOELAFS_PORT" -j ACCEPT
 -     # SSB/Scuttlebot/Patchwork
 -     ip6tables -A INPUT -p tcp --dport "$GIT_SSB_PORT" -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 8008 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport 8008 -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 8010 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport 8010 -j ACCEPT
 -     # OLSR2/MANET
 -     ip6tables -A INPUT -p udp --dport 269 -j ACCEPT
 -     ip6tables -A INPUT -p tcp --dport 138 -j ACCEPT
 -     # Babel
 -     iptables -A INPUT -p udp --dport 6696 -j ACCEPT
 -     ip6tables -A INPUT -p udp --dport 6696 -j ACCEPT
 - 
 - 
 -     # vpn over the internet
 -     # Note: the vpn firewall settings are needed in order for Patchwork
 -     # to discover local peers
 -     iptables -A INPUT -p tcp --dport 653 -j ACCEPT
 -     iptables -A INPUT -p udp --dport 653 -j ACCEPT
 -     iptables -A INPUT -i "${EIFACE}" -m state --state NEW -p tcp --dport 1194 -j ACCEPT
 -     iptables -A INPUT -i tun+ -j ACCEPT
 -     iptables -A FORWARD -i tun+ -j ACCEPT
 -     iptables -A FORWARD -i tun+ -o "${EIFACE}" -m state --state RELATED,ESTABLISHED -j ACCEPT
 -     iptables -A FORWARD -i "${EIFACE}" -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
 -     iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o "${EIFACE}" -j MASQUERADE
 -     iptables -A OUTPUT -o tun+ -j ACCEPT
 -     echo 1 > /proc/sys/net/ipv4/ip_forward
 -     sed -i 's|# net.ipv4.ip_forward|net.ipv4.ip_forward|g' /etc/sysctl.conf
 -     sed -i 's|#net.ipv4.ip_forward|net.ipv4.ip_forward|g' /etc/sysctl.conf
 -     sed -i 's|net.ipv4.ip_forward.*|net.ipv4.ip_forward=1|g' /etc/sysctl.conf
 - }
 - 
 - function disable_mesh_firewall {
 -     iptables -D INPUT -p tcp --dport "$TRACKER_PORT" -j ACCEPT
 -     iptables -D INPUT -p udp --dport "$TRACKER_PORT" -j ACCEPT
 -     iptables -D INPUT -p udp --dport 6240 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport 6240 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport 80 -j ACCEPT
 -     iptables -D INPUT -p udp --dport 80 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport 548 -j ACCEPT
 -     iptables -D INPUT -p udp --dport 548 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport 5353 -j ACCEPT
 -     iptables -D INPUT -p udp --dport 5353 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport 5354 -j ACCEPT
 -     iptables -D INPUT -p udp --dport 5354 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport "$ZERONET_PORT" -j ACCEPT
 -     iptables -D INPUT -p udp --dport "$ZERONET_PORT" -j ACCEPT
 -     iptables -D INPUT -p tcp --dport "$IPFS_PORT" -j ACCEPT
 -     iptables -D INPUT -p udp --dport "$IPFS_PORT" -j ACCEPT
 -     iptables -D INPUT -p tcp --dport "$TOX_PORT" -j ACCEPT
 -     iptables -D INPUT -p udp --dport "$TOX_PORT" -j ACCEPT
 -     iptables -D INPUT -p tcp --dport "$LIBREVAULT_PORT" -j ACCEPT
 -     iptables -D INPUT -p udp --dport "$LIBREVAULT_PORT" -j ACCEPT
 -     iptables -D INPUT -p tcp --dport "$TAHOELAFS_PORT" -j ACCEPT
 -     # SSB/Scuttlebot/Patchwork
 -     iptables -D INPUT -p tcp --dport "$GIT_SSB_PORT" -j ACCEPT
 -     iptables -D INPUT -p udp --dport 8008 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport 8008 -j ACCEPT
 -     iptables -D INPUT -p udp --dport 8010 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport 8010 -j ACCEPT
 -     # OLSR2/MANET
 -     iptables -D INPUT -p udp --dport 269 -j ACCEPT
 -     iptables -D INPUT -p tcp --dport 138 -j ACCEPT
 -     # Babel
 -     iptables -D INPUT -p udp --dport 6696 -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 6696 -j ACCEPT
 - 
 - 
 -     ip6tables -D INPUT -p tcp --dport "$TRACKER_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport "$TRACKER_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 6240 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport 6240 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport 80 -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 80 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport 548 -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 548 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport 5353 -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 5353 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport 5354 -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 5354 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport "$ZERONET_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport "$ZERONET_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport "$IPFS_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport "$IPFS_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport "$TOX_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport "$TOX_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport "$LIBREVAULT_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport "$LIBREVAULT_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport "$TAHOELAFS_PORT" -j ACCEPT
 -     # SSB/Scuttlebot/Patchwork
 -     ip6tables -D INPUT -p tcp --dport "$GIT_SSB_PORT" -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 8008 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport 8008 -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 8010 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport 8010 -j ACCEPT
 -     # OLSR2/MANET
 -     ip6tables -D INPUT -p udp --dport 269 -j ACCEPT
 -     ip6tables -D INPUT -p tcp --dport 138 -j ACCEPT
 -     # Babel
 -     iptables -D INPUT -p udp --dport 6696 -j ACCEPT
 -     ip6tables -D INPUT -p udp --dport 6696 -j ACCEPT
 - 
 -     # vpn over the internet
 -     iptables -D INPUT -p tcp --dport 653 -j ACCEPT
 -     iptables -D INPUT -p udp --dport 653 -j ACCEPT
 -     iptables -D INPUT -i "${EIFACE}" -m state --state NEW -p tcp --dport 1194 -j ACCEPT
 -     iptables -D INPUT -i tun+ -j ACCEPT
 -     iptables -D FORWARD -i tun+ -j ACCEPT
 -     iptables -D FORWARD -i tun+ -o "${EIFACE}" -m state --state RELATED,ESTABLISHED -j ACCEPT
 -     iptables -D FORWARD -i "${EIFACE}" -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
 -     iptables -t nat -D POSTROUTING -s 10.8.0.0/24 -o "${EIFACE}" -j MASQUERADE
 -     iptables -D OUTPUT -o tun+ -j ACCEPT
 - 
 -     echo 0 > /proc/sys/net/ipv4/ip_forward
 -     sed -i 's|net.ipv4.ip_forward=.*|net.ipv4.ip_forward=0|g' /etc/sysctl.conf
 - }
 - 
 - function enable_mesh_scuttlebot {
 -     if [ -f /etc/scuttlebot/.ssb/config ]; then
 -         ethernet_connected=$(cat /sys/class/net/eth0/carrier)
 -         if [[ "$ethernet_connected" != "0" ]]; then
 -             sed -i "s|\"host\": .*|\"host\": \"$(get_ipv6_wlan)\",|g" /etc/scuttlebot/.ssb/config
 -             systemctl restart scuttlebot
 -         else
 -             if [ ! -f /etc/nginx/sites-available/git_ssb ]; then
 -                 systemctl stop scuttlebot
 -             else
 -                 systemctl restart scuttlebot
 -             fi
 -         fi
 -     fi
 -     sed -i "s|\"host\":.*|\"host\": \"${HOSTNAME}.local\",|g" /etc/scuttlebot/.ssb/config
 -     systemctl restart scuttlebot
 - }
 - 
 - function enable_mesh_tor {
 -     # if we have an ethernet connection to an internet router then create
 -     # an onion address for this peer
 -     if [[ "$ethernet_connected" != "0" ]]; then
 -         systemctl enable tor
 -         systemctl start tor
 -         HIDDEN_SERVICE_PATH=/var/lib/tor/hidden_service_
 -         if [ ! -f ${HIDDEN_SERVICE_PATH}mesh/hostname ]; then
 -             echo "HiddenServiceDir ${HIDDEN_SERVICE_PATH}mesh/" >> /etc/tor/torrc
 -             echo "HiddenServicePort 653 127.0.0.1:653" >> /etc/tor/torrc
 -             systemctl restart tor
 -         fi
 -     else
 -         systemctl stop tor
 -         systemctl disable tor
 -     fi
 - }
 - 
 - function enable_mesh_seconary_wifi {
 -     if [ "$secondary_wifi_available" ]; then
 -         sed -i 's|#DAEMON_CONF=.*|DAEMON_CONF="/etc/hostapd/hostapd.conf"|g' /etc/default/hostapd
 - 
 -         mesh_hotspot_address=$(mesh_hotspot_ip_address)
 -         if [[ "$mesh_hotspot_address" == *'.'* ]]; then
 -             { echo "interface=${IFACE_SECONDARY}";
 -               echo "bridge=${BRIDGE}";
 -               echo 'driver=nl80211';
 -               echo "country_code=UK";
 -               echo "ssid=${WIFI_SSID}-${mesh_hotspot_address}";
 -               echo 'hw_mode=g';
 -               echo "channel=${HOTSPOT_CHANNEL}";
 -               echo 'wpa=2';
 -               echo "wpa_passphrase=$HOTSPOT_PASSPHRASE";
 -               echo 'wpa_key_mgmt=WPA-PSK';
 -               echo 'wpa_pairwise=TKIP';
 -               echo 'rsn_pairwise=CCMP';
 -               echo 'auth_algs=1';
 -               echo 'macaddr_acl=0'; } > /etc/hostapd/hostapd.conf
 - 
 -             sed -i "s|#interface=.*|interface=${IFACE_SECONDARY}|g" /etc/dnsmasq.conf
 -             sed -i "s|interface=.*|interface=${IFACE_SECONDARY}|g" /etc/dnsmasq.conf
 -             sed -i "s|listen-address=.*|listen-address=127.0.0.1,$mesh_hotspot_address|g" /etc/dnsmasq.conf
 -             sed -i 's|#listen-address|listen-address|g' /etc/dnsmasq.conf
 -             systemctl enable dnsmasq
 -             systemctl restart dnsmasq
 - 
 -             systemctl enable hostapd
 -             systemctl restart hostapd
 -             mesh_create_app_downloads_page
 -         else
 -             secondary_wifi_available=
 -             echo $'WARNING: No IP address could be obtained for the hotspot'
 -         fi
 -     fi
 - 
 -     if [ ! "$secondary_wifi_available" ]; then
 -         systemctl stop hostapd
 -         systemctl disable hostapd
 - 
 -         # Recreate the cryptpad symlink
 -         if [ -f /etc/nginx/sites-available/cryptpad ]; then
 -             if [ -L /etc/nginx/sites-enabled/cryptpad ]; then
 -                 rm /etc/nginx/sites-enabled/default
 -             fi
 -             systemctl enable cryptpad
 -             systemctl start cryptpad
 - 
 -             if [ ! -L /etc/nginx/sites-enabled/cryptpad ]; then
 -                 ln -s /etc/nginx/sites-available/cryptpad /etc/nginx/sites-enabled/cryptpad
 -                 systemctl restart nginx
 -             fi
 -         fi
 -         if [ -f /home/fbone/.cryptpad.desktop ]; then
 -             mv /home/fbone/.cryptpad.desktop /home/fbone/Desktop/cryptpad.desktop
 -         fi
 -     fi
 - }
 - 
 - # NOTE: deliberately there is no "exit 0"
 
 
  |