123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430 |
- #!/bin/bash
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- MESH_CURRENT_PROTOCOL=/root/.mesh_protocol
- MESH_DEFAULT_PROTOCOL=/root/.mesh_protocol_default
-
- function mesh_protocol_init {
- if [[ $1 == "start" ]]; then
-
- sed -i "s|#host-name=.*|host-name=$(hostname)|g" /etc/avahi/avahi-daemon.conf
- sed -i "s|host-name=.*|host-name=$(hostname)|g" /etc/avahi/avahi-daemon.conf
- sed -i "s|use-ipv4=.*|use-ipv4=no|g" /etc/avahi/avahi-daemon.conf
- sed -i "s|use-ipv6=.*|use-ipv6=yes|g" /etc/avahi/avahi-daemon.conf
- sed -i "s|#disallow-other-stacks=.*|disallow-other-stacks=yes|g" /etc/avahi/avahi-daemon.conf
- sed -i "s|hosts:.*|hosts: files mdns4_minimal dns mdns4 mdns|g" /etc/nsswitch.conf
- fi
-
-
- WIFI_SSID='mesh'
- if [ -f $COMPLETION_FILE ]; then
- if grep -q "WIFI_SSID:" $COMPLETION_FILE; then
- WIFI_SSID=$(cat $COMPLETION_FILE | grep "WIFI_SSID:" | awk -F ':' '{print $2}')
- fi
- sed -i "s|WIFI_SSID:.*|WIFI_SSID:${WIFI_SSID}|g" $COMPLETION_FILE
- fi
- CELLID='any'
-
- CHANNEL=2
- HOTSPOT_CHANNEL=6
- if [ -f $COMPLETION_FILE ]; then
- if grep -q "Wifi channel:" $COMPLETION_FILE; then
- CHANNEL=$(cat $COMPLETION_FILE | grep "Wifi channel:" | awk -F ':' '{print $2}')
- fi
- sed -i "s|Wifi channel:.*|Wifi channel:${CHANNEL}|g" $COMPLETION_FILE
- fi
-
- ZERONET_PORT=15441
- IPFS_PORT=4001
- TOX_PORT=33445
- TRACKER_PORT=6969
- LIBREVAULT_PORT=42345
- TAHOELAFS_PORT=50213
- GIT_SSB_PORT=7718
- NGINX_GIT_SSB_PORT=7719
-
-
- BRIDGE=br-mesh
- BRIDGE_HOTSPOT=br-hotspot
- IFACE=
- IFACE_SECONDARY=
- EIFACE=eth0
- WLAN_ADAPTORS=$(count_wlan)
-
- if [ $WLAN_ADAPTORS -eq 0 ]; then
- echo $'No wlan adaptors found'
- exit 0
- fi
- }
-
- function get_ipv4_wlan {
- echo $(ip -o -f inet addr show dev "$IFACE" | awk '{print $4}' | awk 'END {print}' | awk -F '/' '{print $1}')
- }
-
- function mesh_hotspot_ip_address {
- echo $(ip -o -f inet addr show dev "${BRIDGE}" | awk '{print $4}' | awk 'END {print}' | awk -F '/' '{print $1}')
- }
-
- function global_rate_limit {
- if ! grep -q "tcp_challenge_ack_limit" /etc/sysctl.conf; then
- echo 'net.ipv4.tcp_challenge_ack_limit = 999999999' >> /etc/sysctl.conf
- echo 'net.ipv6.tcp_challenge_ack_limit = 999999999' >> /etc/sysctl.conf
- else
- sed -i 's|net.ipv4.tcp_challenge_ack_limit.*|net.ipv4.tcp_challenge_ack_limit = 999999999|g' /etc/sysctl.conf
- sed -i 's|net.ipv6.tcp_challenge_ack_limit.*|net.ipv6.tcp_challenge_ack_limit = 999999999|g' /etc/sysctl.conf
- fi
- sysctl -p -q
- }
-
- function assign_peer_address {
- for i in {1..6}; do
- number=$RANDOM
- let "number %= 255"
- octet=$(echo "obase=16;$number" | bc)
- if [ ${#octet} -lt 2 ]; then
- octet="0${octet}"
- fi
- if [ $i -gt 1 ]; then
- echo -n ":"
- fi
- echo -n "${octet}"
- done
- }
-
- function mesh_create_app_downloads_page {
- if [ ! -d /root/$PROJECT_NAME/image_build/mesh_apps ]; then
- return
- fi
- if [ ! -d /var/www/html ]; then
- return
- fi
-
- if [ -L /etc/nginx/sites-enabled/cryptpad ]; then
- rm /etc/nginx/sites-enabled/cryptpad
- ln -s /etc/nginx/sites-available/default /etc/nginx/sites-enabled/default
- if [ -d /etc/cryptpad ]; then
- systemctl stop cryptpad
- systemctl disable cryptpad
- fi
- systemctl restart nginx
- fi
-
- if [ -f /home/fbone/Desktop/cryptpad.desktop ]; then
- mv /home/fbone/Desktop/cryptpad.desktop /home/fbone/.cryptpad.desktop
- fi
-
- cp /root/$PROJECT_NAME/website/EN/meshindex.html /var/www/html/index.html
- if [ ! -f /var/www/html/ssb.apk ]; then
- cp /root/$PROJECT_NAME/image_build/mesh_apps/ssb.apk /var/www/html/ssb.apk
- fi
- if [ ! -f /var/www/html/trifa.apk ]; then
- cp /root/$PROJECT_NAME/image_build/mesh_apps/trifa.apk /var/www/html/trifa.apk
- fi
- if [ ! -d /var/www/html/images ]; then
- mkdir /var/www/html/images
- fi
- if [ ! -f /var/www/html/images/logo.png ]; then
- cp /root/$PROJECT_NAME/img/logo.png /var/www/html/images/logo.png
- fi
- if [ ! -f /var/www/html/images/ssb.png ]; then
- cp /root/$PROJECT_NAME/img/icon_patchwork.png /var/www/html/images/ssb.png
- fi
- if [ ! -f /var/www/html/images/trifa.png ]; then
- cp /root/$PROJECT_NAME/img/trifa.png /var/www/html/images/trifa.png
- fi
- if [ ! -f /var/www/html/freedombone.css ]; then
- cp /root/$PROJECT_NAME/website/freedombone.css /var/www/html/freedombone.css
- fi
- chown -R www-data:www-data /var/www/html/*
- }
-
- function enable_mesh_firewall {
- iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
- iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
- iptables -A INPUT -p tcp --dport $TRACKER_PORT -j ACCEPT
- iptables -A INPUT -p udp --dport $TRACKER_PORT -j ACCEPT
- iptables -A INPUT -p udp --dport 6240 -j ACCEPT
- iptables -A INPUT -p tcp --dport 6240 -j ACCEPT
- iptables -A INPUT -p tcp --dport 80 -j ACCEPT
- iptables -A INPUT -p udp --dport 80 -j ACCEPT
- iptables -A INPUT -p tcp --dport 548 -j ACCEPT
- iptables -A INPUT -p udp --dport 548 -j ACCEPT
- iptables -A INPUT -p tcp --dport 5353 -j ACCEPT
- iptables -A INPUT -p udp --dport 5353 -j ACCEPT
- iptables -A INPUT -p tcp --dport 5354 -j ACCEPT
- iptables -A INPUT -p udp --dport 5354 -j ACCEPT
- iptables -A INPUT -p tcp --dport $ZERONET_PORT -j ACCEPT
- iptables -A INPUT -p udp --dport $ZERONET_PORT -j ACCEPT
- iptables -A INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
- iptables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT
- iptables -A INPUT -p udp --dport $TOX_PORT -j ACCEPT
- iptables -A INPUT -p tcp --dport $LIBREVAULT_PORT -j ACCEPT
- iptables -A INPUT -p udp --dport $LIBREVAULT_PORT -j ACCEPT
- iptables -A INPUT -p tcp --dport $TAHOELAFS_PORT -j ACCEPT
-
- iptables -A INPUT -p tcp --dport $GIT_SSB_PORT -j ACCEPT
- iptables -A INPUT -p udp --dport 8008 -j ACCEPT
- iptables -A INPUT -p tcp --dport 8008 -j ACCEPT
- iptables -A INPUT -p udp --dport 8010 -j ACCEPT
- iptables -A INPUT -p tcp --dport 8010 -j ACCEPT
-
- iptables -A INPUT -p udp --dport 269 -j ACCEPT
- iptables -A INPUT -p tcp --dport 138 -j ACCEPT
-
-
- ip6tables -A INPUT -p ipv6-icmp -j ACCEPT
- ip6tables -A OUTPUT -p ipv6-icmp -j ACCEPT
- ip6tables -A INPUT -p tcp --dport $TRACKER_PORT -j ACCEPT
- ip6tables -A INPUT -p udp --dport $TRACKER_PORT -j ACCEPT
- ip6tables -A INPUT -p udp --dport 6240 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport 6240 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport 80 -j ACCEPT
- ip6tables -A INPUT -p udp --dport 80 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport 548 -j ACCEPT
- ip6tables -A INPUT -p udp --dport 548 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport 5353 -j ACCEPT
- ip6tables -A INPUT -p udp --dport 5353 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport 5354 -j ACCEPT
- ip6tables -A INPUT -p udp --dport 5354 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport $ZERONET_PORT -j ACCEPT
- ip6tables -A INPUT -p udp --dport $ZERONET_PORT -j ACCEPT
- ip6tables -A INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
- ip6tables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT
- ip6tables -A INPUT -p udp --dport $TOX_PORT -j ACCEPT
- ip6tables -A INPUT -p tcp --dport $LIBREVAULT_PORT -j ACCEPT
- ip6tables -A INPUT -p udp --dport $LIBREVAULT_PORT -j ACCEPT
- ip6tables -A INPUT -p tcp --dport $TAHOELAFS_PORT -j ACCEPT
-
- ip6tables -A INPUT -p tcp --dport $GIT_SSB_PORT -j ACCEPT
- ip6tables -A INPUT -p udp --dport 8008 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport 8008 -j ACCEPT
- ip6tables -A INPUT -p udp --dport 8010 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport 8010 -j ACCEPT
-
- ip6tables -A INPUT -p udp --dport 269 -j ACCEPT
- ip6tables -A INPUT -p tcp --dport 138 -j ACCEPT
-
-
-
-
-
- iptables -A INPUT -p tcp --dport 653 -j ACCEPT
- iptables -A INPUT -p udp --dport 653 -j ACCEPT
- iptables -A INPUT -i ${EIFACE} -m state --state NEW -p tcp --dport 1194 -j ACCEPT
- iptables -A INPUT -i tun+ -j ACCEPT
- iptables -A FORWARD -i tun+ -j ACCEPT
- iptables -A FORWARD -i tun+ -o ${EIFACE} -m state --state RELATED,ESTABLISHED -j ACCEPT
- iptables -A FORWARD -i ${EIFACE} -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
- iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o ${EIFACE} -j MASQUERADE
- iptables -A OUTPUT -o tun+ -j ACCEPT
- echo 1 > /proc/sys/net/ipv4/ip_forward
- sed -i 's|# net.ipv4.ip_forward|net.ipv4.ip_forward|g' /etc/sysctl.conf
- sed -i 's|#net.ipv4.ip_forward|net.ipv4.ip_forward|g' /etc/sysctl.conf
- sed -i 's|net.ipv4.ip_forward.*|net.ipv4.ip_forward=1|g' /etc/sysctl.conf
- }
-
- function disable_mesh_firewall {
- iptables -D INPUT -p tcp --dport $TRACKER_PORT -j ACCEPT
- iptables -D INPUT -p udp --dport $TRACKER_PORT -j ACCEPT
- iptables -D INPUT -p udp --dport 6240 -j ACCEPT
- iptables -D INPUT -p tcp --dport 6240 -j ACCEPT
- iptables -D INPUT -p tcp --dport 80 -j ACCEPT
- iptables -D INPUT -p udp --dport 80 -j ACCEPT
- iptables -D INPUT -p tcp --dport 548 -j ACCEPT
- iptables -D INPUT -p udp --dport 548 -j ACCEPT
- iptables -D INPUT -p tcp --dport 5353 -j ACCEPT
- iptables -D INPUT -p udp --dport 5353 -j ACCEPT
- iptables -D INPUT -p tcp --dport 5354 -j ACCEPT
- iptables -D INPUT -p udp --dport 5354 -j ACCEPT
- iptables -D INPUT -p tcp --dport $ZERONET_PORT -j ACCEPT
- iptables -D INPUT -p udp --dport $ZERONET_PORT -j ACCEPT
- iptables -D INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
- iptables -D INPUT -p udp --dport $IPFS_PORT -j ACCEPT
- iptables -D INPUT -p tcp --dport $TOX_PORT -j ACCEPT
- iptables -D INPUT -p udp --dport $TOX_PORT -j ACCEPT
- iptables -D INPUT -p tcp --dport $LIBREVAULT_PORT -j ACCEPT
- iptables -D INPUT -p udp --dport $LIBREVAULT_PORT -j ACCEPT
- iptables -D INPUT -p tcp --dport $TAHOELAFS_PORT -j ACCEPT
-
- iptables -D INPUT -p tcp --dport $GIT_SSB_PORT -j ACCEPT
- iptables -D INPUT -p udp --dport 8008 -j ACCEPT
- iptables -D INPUT -p tcp --dport 8008 -j ACCEPT
- iptables -D INPUT -p udp --dport 8010 -j ACCEPT
- iptables -D INPUT -p tcp --dport 8010 -j ACCEPT
-
- iptables -D INPUT -p udp --dport 269 -j ACCEPT
- iptables -D INPUT -p tcp --dport 138 -j ACCEPT
-
-
- ip6tables -D INPUT -p tcp --dport $TRACKER_PORT -j ACCEPT
- ip6tables -D INPUT -p udp --dport $TRACKER_PORT -j ACCEPT
- ip6tables -D INPUT -p udp --dport 6240 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport 6240 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport 80 -j ACCEPT
- ip6tables -D INPUT -p udp --dport 80 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport 548 -j ACCEPT
- ip6tables -D INPUT -p udp --dport 548 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport 5353 -j ACCEPT
- ip6tables -D INPUT -p udp --dport 5353 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport 5354 -j ACCEPT
- ip6tables -D INPUT -p udp --dport 5354 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport $ZERONET_PORT -j ACCEPT
- ip6tables -D INPUT -p udp --dport $ZERONET_PORT -j ACCEPT
- ip6tables -D INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
- ip6tables -D INPUT -p udp --dport $IPFS_PORT -j ACCEPT
- ip6tables -D INPUT -p tcp --dport $TOX_PORT -j ACCEPT
- ip6tables -D INPUT -p udp --dport $TOX_PORT -j ACCEPT
- ip6tables -D INPUT -p tcp --dport $LIBREVAULT_PORT -j ACCEPT
- ip6tables -D INPUT -p udp --dport $LIBREVAULT_PORT -j ACCEPT
- ip6tables -D INPUT -p tcp --dport $TAHOELAFS_PORT -j ACCEPT
-
- ip6tables -D INPUT -p tcp --dport $GIT_SSB_PORT -j ACCEPT
- ip6tables -D INPUT -p udp --dport 8008 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport 8008 -j ACCEPT
- ip6tables -D INPUT -p udp --dport 8010 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport 8010 -j ACCEPT
-
- ip6tables -D INPUT -p udp --dport 269 -j ACCEPT
- ip6tables -D INPUT -p tcp --dport 138 -j ACCEPT
-
-
-
- iptables -D INPUT -p tcp --dport 653 -j ACCEPT
- iptables -D INPUT -p udp --dport 653 -j ACCEPT
- iptables -D INPUT -i ${EIFACE} -m state --state NEW -p tcp --dport 1194 -j ACCEPT
- iptables -D INPUT -i tun+ -j ACCEPT
- iptables -D FORWARD -i tun+ -j ACCEPT
- iptables -D FORWARD -i tun+ -o ${EIFACE} -m state --state RELATED,ESTABLISHED -j ACCEPT
- iptables -D FORWARD -i ${EIFACE} -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
- iptables -t nat -D POSTROUTING -s 10.8.0.0/24 -o ${EIFACE} -j MASQUERADE
- iptables -D OUTPUT -o tun+ -j ACCEPT
-
- echo 0 > /proc/sys/net/ipv4/ip_forward
- sed -i 's|net.ipv4.ip_forward=.*|net.ipv4.ip_forward=0|g' /etc/sysctl.conf
- }
-
- function enable_mesh_scuttlebot {
- if [ -f /etc/scuttlebot/.ssb/config ]; then
- ethernet_connected=$(cat /sys/class/net/eth0/carrier)
- if [[ "$ethernet_connected" != "0" ]]; then
- sed -i "s|\"host\": .*|\"host\": \"$(get_ipv4_wlan)\",|g" /etc/scuttlebot/.ssb/config
- systemctl restart scuttlebot
- else
- if [ ! -f /etc/nginx/sites-available/git_ssb ]; then
- systemctl stop scuttlebot
- else
- systemctl restart scuttlebot
- fi
- fi
- fi
- sed -i "s|\"host\":.*|\"host\": \"${HOSTNAME}.local\",|g" /etc/scuttlebot/.ssb/config
- systemctl restart scuttlebot
- }
-
- function enable_mesh_tor {
-
-
- if [[ "$ethernet_connected" != "0" ]]; then
- systemctl enable tor
- systemctl start tor
- HIDDEN_SERVICE_PATH=/var/lib/tor/hidden_service_
- if [ ! -f ${HIDDEN_SERVICE_PATH}mesh/hostname ]; then
- echo "HiddenServiceDir ${HIDDEN_SERVICE_PATH}mesh/" >> /etc/tor/torrc
- echo "HiddenServicePort 653 127.0.0.1:653" >> /etc/tor/torrc
- systemctl restart tor
- fi
- else
- systemctl stop tor
- systemctl disable tor
- fi
- }
-
- function enable_mesh_seconary_wifi {
- if [ $secondary_wifi_available ]; then
- sed -i 's|#DAEMON_CONF=.*|DAEMON_CONF="/etc/hostapd/hostapd.conf"|g' /etc/default/hostapd
-
- mesh_hotspot_address=$(mesh_hotspot_ip_address)
- if [[ "$mesh_hotspot_address" == *'.'* ]]; then
- echo "interface=${IFACE_SECONDARY}" > /etc/hostapd/hostapd.conf
- echo "bridge=${BRIDGE}" >> /etc/hostapd/hostapd.conf
- echo 'driver=nl80211' >> /etc/hostapd/hostapd.conf
- echo "country_code=UK" >> /etc/hostapd/hostapd.conf
- echo "ssid=${WIFI_SSID}-${mesh_hotspot_address}" >> /etc/hostapd/hostapd.conf
- echo 'hw_mode=g' >> /etc/hostapd/hostapd.conf
- echo "channel=${HOTSPOT_CHANNEL}" >> /etc/hostapd/hostapd.conf
- echo 'wpa=2' >> /etc/hostapd/hostapd.conf
- echo "wpa_passphrase=$HOTSPOT_PASSPHRASE" >> /etc/hostapd/hostapd.conf
- echo 'wpa_key_mgmt=WPA-PSK' >> /etc/hostapd/hostapd.conf
- echo 'wpa_pairwise=TKIP' >> /etc/hostapd/hostapd.conf
- echo 'rsn_pairwise=CCMP' >> /etc/hostapd/hostapd.conf
- echo 'auth_algs=1' >> /etc/hostapd/hostapd.conf
- echo 'macaddr_acl=0' >> /etc/hostapd/hostapd.conf
-
- sed -i "s|#interface=.*|interface=${IFACE_SECONDARY}|g" /etc/dnsmasq.conf
- sed -i "s|interface=.*|interface=${IFACE_SECONDARY}|g" /etc/dnsmasq.conf
- sed -i "s|listen-address=.*|listen-address=127.0.0.1,$mesh_hotspot_address|g" /etc/dnsmasq.conf
- sed -i 's|#listen-address|listen-address|g' /etc/dnsmasq.conf
- systemctl enable dnsmasq
- systemctl restart dnsmasq
-
- systemctl enable hostapd
- systemctl restart hostapd
- mesh_create_app_downloads_page
- else
- secondary_wifi_available=
- echo $'WARNING: No IP address could be obtained for the hotspot'
- fi
- fi
-
- if [ ! $secondary_wifi_available ]; then
- systemctl stop hostapd
- systemctl disable hostapd
-
-
- if [ -f /etc/nginx/sites-available/cryptpad ]; then
- if [ -L /etc/nginx/sites-enabled/cryptpad ]; then
- rm /etc/nginx/sites-enabled/default
- fi
- systemctl enable cryptpad
- systemctl start cryptpad
-
- if [ ! -L /etc/nginx/sites-enabled/cryptpad ]; then
- ln -s /etc/nginx/sites-available/cryptpad /etc/nginx/sites-enabled/cryptpad
- systemctl restart nginx
- fi
- fi
- if [ -f /home/fbone/.cryptpad.desktop ]; then
- mv /home/fbone/.cryptpad.desktop /home/fbone/Desktop/cryptpad.desktop
- fi
- fi
- }
-
|