2 # Copyright (C) 2016 Ian Kelling
4 # This program is free software; you can redistribute it and/or
5 # modify it under the terms of the GNU General Public License
6 # as published by the Free Software Foundation; either version 2
7 # of the License, or (at your option) any later version.
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
14 # You should have received a copy of the GNU General Public License
15 # along with this program; if not, write to the Free Software
16 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
20 trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR
25 usage: ${0##*/} [-h] [-t 2|3|test|client] [-m WIRELESS_MAC] [hostname]
26 setup my router in general: dhcp, dns, etc.
28 Type 2 or 3 is for setting up a backup device, there are two kinds so
29 that you can switch the main device to a backup, then a backup to the
30 main. Type test is for setting up a testing device.
32 Passing an empty string for WIRELESS_MAC, or if none is defined in the
33 secrets file, will cause the device's native mac to be used.
43 if [[ -e /root
/zblock
]]; then
49 firewall_restart
=false
55 while getopts hm
:t
:yz opt
; do
62 libremanage_host
=$hostname
78 *) echo "$0: unexpected arg to -t: $*" >&2; usage
1 ;;
90 *) echo "$0: Internal error! unexpected args: $*" >&2 ; usage
1 ;;
93 shift "$((OPTIND-1))" # Discard the options and sentinel --
104 if [[ -e /root
/router-secrets
]]; then
106 source /root
/router-secrets
109 if [[ ! $mac ]] && ! $test && $secrets; then
110 # if we wanted to increment it
111 #mac=${mac:0: -1}$((${mac: -1} + 2))
115 if (( $# != 0 )); then
129 # background: upgrading all packages is not recommended because it
130 # doesn't go into the firmware. build new firmware if you want
131 # lots of upgrades. I think /tmp/opkg-lists is a pre openwrt 14 location.
132 f
=(/var
/opkg-lists
/*)
133 if ! (( $
(date -r $f +%s
) + 60*60*24 > $
(date +%s
) )); then
134 if ! opkg update
; then
135 echo "$0: warning: opkg update failed" >&2
146 if [[ ! $
(opkg list-installed
"$pname") ]]; then
151 if [[ $to_install ]]; then
152 opkg
install ${to_install[@]}
161 ######### uci example:#######
162 # # https://wiki.openwrt.org/doc/uci
163 # wan_index=$(uci show firewall | sed -rn 's/firewall\.@zone\[([0-9])+\]\.name=wan/\1/p')
164 # wan="firewall.@zone[$wan_index]"
165 # if [[ $(uci get firewall.@forwarding[0].dest) != $forward_dest ]]; then
167 # v uci set firewall.@forwarding[0].dest=$forward_dest
168 # uci commit firewall
169 # firewall_restart=true
171 ####### end uci example #####
174 printf "+ uset %s\n" "$*"
177 local service
="${key%%.*}"
178 restart_var
=${service}_restart
179 if [[ ! ${!restart_var} ]]; then
180 eval $restart_var=false
182 if [[ $
(uci get
"$key") != "$val" ]]; then
183 v uci
set "$key"="$val"
185 eval $restart_var=true
190 printf "+ udel %s\n" "$*"
193 local service
="${key%%.*}"
194 restart_var
=${service}_restart
195 if [[ ! ${!restart_var} ]]; then
196 eval $restart_var=false
198 if uci get
"$key" &>/dev
/null
; then
199 v uci
set "$key"="$val"
201 eval $restart_var=true
205 v
command cedit
-v "$@"
214 elif [[ $hostname == cmc
]]; then
232 : ${key:=pictionary49}
238 passwd
-l root ||
: #already locked fails
240 sed -ibak '/^root:/d' /etc
/shadow
241 # /root/router created by manually running passwd then copying the resulting
242 # line. We have no mkpasswd on wrt/librecmc, then we scp it in.
243 cat /root
/router
>>/etc
/shadow
244 # otherwise, serial console gets root login with no password
245 uset system.@system
[0].ttylogin
1
249 cat >/usr
/bin
/archlike-pxe-mount
<<'EOFOUTER'
251 # symlinks are collapsed for nfs mount points, so use a bind mount.
252 # tried putting this in /etc/config/fstab,
253 # then doing block mount, it didn't work. This doesn't persist across reboots,
254 # todo: figure that out
256 for d in /run/{arch,parabola}iso/bootmnt; do
257 cat >>/etc/fstab <<EOF
258 /mnt/usb/tftpboot $d none bind 0 0
260 mount | grep $d &>/dev/null || mount $d
262 /etc/init.d/nfsd restart
264 chmod +x
/usr
/bin
/archlike-pxe-mount
266 sed -i '/^root:/s,/bin/ash$,/bin/bash,' /etc
/passwd
270 uset dropbear.@dropbear
[0].PasswordAuth
0
271 uset dropbear.@dropbear
[0].RootPasswordAuth
0
272 uset dropbear.@dropbear
[0].Port
2220
273 if ! cmp -s /root
/dropbear_rsa_host_key
/etc
/dropbear
/dropbear_rsa_host_key
; then
274 cp /root
/dropbear_rsa_host_key
/etc
/dropbear
/dropbear_rsa_host_key
275 dropbear_restart
=true
278 if $dropbear_restart; then
279 v
/etc
/init.d
/dropbear restart
283 uset network.lan.ipaddr
$l.
$lanip
284 uset network.lan.netmask
$mask
285 if $dev2 ||
$client; then
287 uset network.lan.gateway
$l.1
288 uset network.wan.proto none
289 uset network.wan6.proto none
291 /etc
/init.d
/dnsmasq stop
292 /etc
/init.d
/dnsmasq disable
293 /etc
/init.d
/odhcpd stop
294 /etc
/init.d
/odhcpd disable
295 rm -f /etc
/resolv.conf
296 cat >/etc
/resolv.conf
<<'EOF'
301 # things i tried to keep dnsmasq running but not enabled except local dns,
302 # but it didnt work right and i dont need it anyways.
303 # uset dhcp.wan.ignore $dev2 # default is false
304 # uset dhcp.lan.ignore $dev2 # default is false
305 # uset dhcp.@dnsmasq[0].interface lo
306 # uset dhcp.@dnsmasq[0].localuse 0
307 # uset dhcp.@dnsmasq[0].resolvfile /etc/dnsmasq.conf
308 # uset dhcp.@dnsmasq[0].noresolv 1
309 # todo: populate /etc/resolv.conf with a static value
312 # these are the defaults
314 # this is not needed unless switching from the above condition.
315 # disabling just to debug
316 #uset network.lan.gateway ''
318 uset network.wan.proto dhcp
319 uset network.wan6.proto dhcpv6
320 /etc
/init.d
/dnsmasq start
321 # todo: figure out why this returns 1
322 /etc
/init.d
/dnsmasq
enable ||
:
323 /etc
/init.d
/odhcpd start
324 /etc
/init.d
/odhcpd
enable
327 wireless_restart
=false
330 uset wireless.default_radio0.network
'wwan'
331 uset wireless.default_radio0.ssid
${rclientssid[$h]}
332 uset wireless.default_radio0.encryption
'psk2'
333 uset wireless.default_radio0.device
'radio0'
334 uset wireless.default_radio0.mode
'sta'
335 uset wireless.default_radio0.bssid
${rclientbssid[$h]}
336 # todo: look into whether 5g network is available.
337 uset wireless.default_radio0.key
${rclientkey[$h]}
338 uset wireless.radio0.disabled false
339 uset wireless.radio1.disabled true
341 # defaults, just reseting in case client config ran
342 uset wireless.default_radio0.network lan
343 uset wireless.default_radio0.mode ap
345 uset wireless.default_radio
$x.ssid
"$ssid"
346 uset wireless.default_radio
$x.key
$key
347 uset wireless.default_radio
$x.encryption psk2
349 uset wireless.default_radio
$x.macaddr
$macpre$
((macsuf
+ 2*x
))
351 # secondary device has wireless disabled
352 uset wireless.radio
$x.disabled
$dev2
356 if grep '^OPENWRT_BOARD="mvebu/cortexa9"' /etc
/os-release
&>/dev
/null
; then
357 # todo, I also enabled irqbalance, didnt script it though
358 # https://forum.openwrt.org/t/wrt1900acs-wifi-issue-after-upgrade-from-19-07-to-21-02-vacuum-cleaner-legacy-rate-support/113311/28
359 cat >/etc
/rc.
local <<'EOF'
360 echo "0" >> /sys/kernel/debug/ieee80211/phy0/mwlwifi/tx_amsdu
361 echo "0" >> /sys/kernel/debug/ieee80211/phy1/mwlwifi/tx_amsdu
364 chmod +x
/etc
/rc.
local
366 uset wireless.radio0.disassoc_low_ack
0
367 uset wireless.radio1.disassoc_low_ack
0
371 # found with https://openwrt.org/docs/guide-user/network/wifi/iwchan
372 uset wireless.radio0.channel
11
377 # usb, screen, relay are for libremanage
380 # relay package temporarily disabled
381 # /root/relay_1.0-1_mips_24kc.ipk
383 # note: prometheus-node-exporter-lua-openwrt seems to be a dependency of
384 # prometheus-node-exporter-lua in practice.
385 v pi tcpdump screen rsync unbound-daemon unbound-checkconf \
386 kmod-usb-storage block-mount kmod-fs-ext4 \
387 prometheus-node-exporter-lua-openwrt \
388 prometheus-node-exporter-lua
389 # nfs-kernel-server \
390 # openvpn-openssl adblock libusb-compat \
391 # kmod-usb-serial-cp210x kmod-usb-serial-ftdi \
394 cat >/etc
/libremanage.conf
<<EOF
395 ${libremanage_host}_type=switch
396 ${libremanage_host}_channel=1
401 v
/etc
/init.d
/fstab
enable ||
:
403 # rebooting makes mounting work, but comparing lsmod,
404 # i'm guessing this will too. todo, test it.
405 # 255 == module already loaded
406 for mod
in scsi_mod sd_mod
; do v modprobe
$mod ||
[[ $?
== 255 ]]; done
408 # for archlike pxe. The default settings in the installer expect to find
409 # the NFS at one of these dirs
410 mkdir
-p /run
/archiso
/bootmnt
411 mkdir
-p /run
/parabolaiso
/bootmnt
413 # todo: at some later time, i found /mnt/usb not mounted, watch to see if
414 # that is the case after running this or rebooting.
415 # wiki says safe to do in case of fstab changes:
417 ## ian: usb broke on old router. if that happens, can just comment this to disable problems
418 # echo | cedit /etc/config/fstab ||:
419 cedit
/etc
/config
/fstab
<<EOF || { v block umount; v block mount; }
420 config global automount
425 # /overlay is an / overlay mount for installing extra packages, etc.
426 # https://openwrt.org/docs/guide-user/additional-software/extroot_configuration
427 option target /mnt/usb
428 # option target /overlay
429 option device /dev/sda1
431 option options rw,async,noatime,nodiratime
436 # ian: disabled because afaik I don't need it, no benefit.
437 # config global autoswap
438 # option from_fstab 1
442 # option device /dev/sda1
448 # exportfs -ra wont cut it when its the same path, but now a bind mount
449 # todo: restart nfs when nfs is enabled?
450 #cedit /etc/exports <<EOF || v /etc/init.d/nfsd restart ||:
451 cedit
/etc
/exports
<<EOF ||:
452 /mnt/usb $lan/$cidr(rw,no_root_squash,insecure,sync,no_subtree_check)
454 /run/archiso/bootmnt $lan/$cidr(rw,no_root_squash,insecure,sync,no_subtree_check)
455 /run/parabolaiso/bootmnt $lan/$cidr(rw,no_root_squash,insecure,sync,no_subtree_check)
459 # todo: enable nfs when we need it only.
460 # v /etc/init.d/portmap start
461 # v /etc/init.d/nfsd start
462 # v /etc/init.d/portmap enable
463 # v /etc/init.d/nfsd enable
466 cedit
/etc
/config
/prometheus-node-exporter-lua
<<'EOF' || /etc/init.d/prometheus-node-exporter-lua restart
467 config prometheus-node-exporter-lua 'main'
468 option listen_ipv6 '0'
469 option listen_interface 'lan'
470 option listen_port '9100
473 # default, as of this writing is:
474 # config prometheus-node-exporter-lua 'main'
475 # option listen_interface 'loopback'
476 # option listen_port '9100'
482 ########## openvpn exampl
483 ########## missing firewall settings for routing lan
485 # v /etc/init.d/openvpn start
486 # v /etc/init.d/openvpn enable
488 # # from https://wiki.openwrt.org/doc/uci/firewall
489 # # todo: not sure if /etc/init.d/network needs restarting.
490 # # I did, and I had to restart the vpn afterwards.
491 # # This maps a uci interface to a real interface which is
492 # # managed outside of uci.
493 # cedit /etc/config/network <<'EOF' ||:
494 # config interface 'tun0'
495 # option ifname 'tun0'
496 # option proto 'none'
498 # cedit /etc/config/openvpn <<'EOF' || v /etc/init.d/openvpn restart
499 # config openvpn my_client_config
501 # option config /etc/openvpn/client.conf
508 network_restart
=false
510 cedit wific
/etc
/config
/network
<<EOF || network_restart=true
511 # https://openwrt.org/docs/guide-user/network/wifi/connect_client_wifi
512 config interface 'wwan'
517 cedit
/etc
/config
/network
<<EOF || network_restart=true
518 config 'route' 'transmission'
519 option 'interface' 'lan'
520 option 'target' '10.173.0.0'
521 option 'netmask' '255.255.0.0'
522 option 'gateway' '$l.3'
524 option interface 'wg0'
525 option proto 'wireguard'
526 option private_key '$(cat /root/wg.key)'
527 option listen_port $wgport
528 list addresses '10.3.0.1/24'
529 list addresses 'fdfd::1/64'
532 config wireguard_wg0 'wgclient'
533 option public_key '3q+WJGrm85r59NgeXOIvppxoW4ux/+koSw6Fee1c1TI='
534 option preshared_key '$(cat /root/wg.psk)'
535 list allowed_ips '10.3.0.2/24'
536 list allowed_ips 'fdfd::2/64'
539 # Need to reload before we change dnsmasq to give out
540 # static ips in our new range.
541 if $network_restart; then
542 v
/etc
/init.d
/network reload
548 cedit wific
/etc
/config
/firewall
<<EOF
553 option forward REJECT
562 cedit
host /etc
/config
/firewall
<<EOF
572 cedit
host /etc
/config
/firewall
<<EOF
583 cedit
/etc
/config
/firewall
<<EOF
584 ## begin no external dns for ziva
587 option src_ip 10.2.0.23
595 option dest_ip 10.2.0.23
603 option src_ip 10.2.0.31
611 option dest_ip 10.2.0.31
619 option src_ip 10.2.0.32
627 option dest_ip 10.2.0.32
631 ## end no external dns for ziva
642 option src_dport 9091
643 option dest_port 9091
649 option dest_port 9091
655 option src_dport 2202
662 option dest_port 2202
668 option src_dport 8989
669 option dest_port 8989
675 option dest_port 8989
681 option src_dport 2205
688 option dest_port 2205
693 option src_dport 2207
700 option dest_port 2207
705 option src_dport 2208
712 option dest_port 2208
717 option src_dport 2209
724 option dest_port 2209
729 option src_dport 8000
730 option dest_port 8000
736 option dest_port 8000
742 option dest_port 2220
748 option dest_port $wgport
779 option name httpskd8448
781 option src_dport 8448
788 option dest_port 8448
792 option name syncthing
794 option src_dport 22001
800 option dest_port 22001
806 # option src_dport $i2pport
807 # option dest_ip $l.178
811 # option target ACCEPT
812 # option dest_port $i2pport
818 # note, using mac transform, we could allow all traffic to a host like this,
819 # replacing 1 as appropriate
820 #option dest_ip ::111:11ff:fe11:1111/::ffff:ffff:ffff:ffff
826 option name http-ipv6
834 option name https-ipv6
842 option name node-exporter
845 option dest_port 9101
850 option name mail587-ipv6
857 # include a file with users custom iptables rules
859 option path /etc/firewall.user
860 option type 'restore'
866 firewall-cedit || firewall_restart
=true
868 # not using wireguard for now
869 # if ! uci get firewall.@zone[1].network | grep wg0 &>/dev/null; then
870 # # cant mix cedit plus uci
871 # echo | cedit /etc/config/firewall ||:
872 # uci add_list firewall.@zone[1].network=wg0
873 # uci commit firewall
875 # firewall_restart=true
880 cedit
/etc
/hosts
<<EOF ||:
885 #mail_host=$(grep -F mail.iankelling.org /etc/hosts | awk '{print $1}')
886 # if [[ $mail_host ]]; then
887 # sed -i '/^$mail_host/a mail.iankelling.org' /etc/hosts
891 uset dhcp.@dnsmasq
[0].domain b8.nz
892 uset system.@system
[0].hostname
$hostname
893 uset dhcp.@dnsmasq
[0].
local
895 # uci doesnt seem to have a way to set an empty value,
896 # if you delete it, it goes back to the default. this seems
897 # to be a decent workaround.
898 # todo: setup /etc/resolv.conf to point to 127.0.0.1
899 # later note: disabled, I dunno why I set this.
900 # uset dhcp.@dnsmasq[0].resolvfile /dev/null
902 # if dnsmasq happens to not send out a dns server,
903 # odhcpd will send one out like this:
904 # NetworkManager[953]: <info> [1614982580.5192] dhcp6 (wlan0): option dhcp6_name_servers => 'fd58:5801:8e02::1'
905 # but i dont want ipv6 dns, just keep it simple to ipv4.
906 # I know my isp doesnt have ipv6 right now,
907 # so just stop this thing.
908 # note: tried this, it didn't do anything:
909 # uset dhcp.@odhcpd[0].dns 10.2.0.1
911 # iank, disabled while debugging.
912 #/etc/init.d/odhcpd stop
913 #/etc/init.d/odhcpd disable
915 # todo: make the above conditional on which server this is.
917 # avoid errors in log. current isp doesnt have ipv6
918 uset unbound.@unbound
[0].protocol ip4_only
920 # todo: im not sure all these are needed, but they all look
922 # https://blog.cloudflare.com/dns-over-tls-for-openwrt/
923 # https://gist.github.com/vqiu/7b32d3a19a7a09d32e108d998de166c2
924 #https://blog.thestateofme.com/2018/04/04/howto-secure-your-dns-with-a-raspberry-pi-unbound-and-cloudflare-1-1-1-1/
926 # # i found that the zone example was having no effect on the config
928 # https://github.com/openwrt/packages/blob/openwrt-19.07/net/unbound/files/README.md
930 # # todo: unbound-control, i'm not sure what the purpose of that thing is, some
931 # # kind of coordination with dhcp of dnsmasq, but what?
933 # note: for debugging, edit /etc/init.d/unbound, change
934 # procd_set_param command $PROG -d -c $UB_TOTAL_CONF
936 # procd_set_param command $PROG -vvv -d -c $UB_TOTAL_CONF
942 qname-minimisation: yes
943 rrset-roundrobin: yes
946 private-domain: b8.nz
947 local-zone: "10.in-addr.arpa." transparent
948 access-control-view: 10.2.0.31/32 "youtube"
953 # no sy until that dongle is used by ziva
956 #access-control-view: 10.2.0.7/32 "youtube"
958 access-control-view: 10.2.0.29/32 "youtube"
960 access-control-view: 10.2.0.32/32 "youtube"
963 } | cedit
/etc
/unbound
/unbound_srv.conf || restart_unbound
=true
966 # dns based blocking vs ip based. with ip, same
967 # server can have multiple domains. in dns,
968 # you have to make sure clients to use the local dns.
969 # https dns will need to be blocked by ip in
970 # order to be comprehensive
972 cedit
/etc
/unbound
/unbound_ext.conf
<<'EOF' || restart_unbound=true
973 local-data-ptr: "10.2.0.1 cmc.b8.nz"
974 local-data-ptr: "10.2.0.2 kd.b8.nz"
975 local-data-ptr: "10.2.0.3 sy.b8.nz"
976 local-data-ptr: "10.2.0.4 wrt2.b8.nz"
977 local-data-ptr: "10.2.0.5 x2.b8.nz"
978 local-data-ptr: "10.2.0.6 x2w.b8.nz"
979 local-data-ptr: "10.2.0.7 syw.b8.nz"
980 local-data-ptr: "10.2.0.8 amy.b8.nz"
981 local-data-ptr: "10.2.0.9 bb8.b8.nz"
982 local-data-ptr: "10.2.0.12 demohost.b8.nz"
983 local-data-ptr: "10.2.0.14 wrt3.b8.nz"
984 local-data-ptr: "10.2.0.19 brother.b8.nz"
985 local-data-ptr: "10.2.0.23 amyw.b8.nz"
986 local-data-ptr: "10.2.0.25 hp.b8.nz"
987 local-data-ptr: "10.2.0.31 amazontab.b8.nz"
988 local-data-ptr: "10.2.0.32 samsungtab.b8.nz"
989 local-data-ptr: "10.173.0.2 transmission.b8.nz"
990 local-data-ptr: "10.173.8.1 defaultnn.b8.nz"
991 local-data-ptr: "10.173.8.2 nn.b8.nz"
995 # forward-addr: 8.8.8.8
996 # forward-addr: 8.8.8.8
997 # https://developers.cloudflare.com/1.1.1.1/1.1.1.1-for-families/setup-instructions/dns-over-https
998 forward-addr: 1.1.1.3@853#family.cloudflare-dns.com
999 forward-addr: 1.0.0.3@853#family.cloudflare-dns.com
1000 forward-ssl-upstream: yes
1005 local-zone: "googlevideo.com." refuse
1006 local-zone: "video.google.com." refuse
1007 local-zone: "youtu.be." refuse
1008 local-zone: "youtube-nocookie.com." refuse
1009 local-zone: "youtube-ui.l.google.com." refuse
1010 local-zone: "youtube.com." refuse
1011 local-zone: "youtube.googleapis.com." refuse
1012 local-zone: "youtubeeducation.com." refuse
1013 local-zone: "youtubei.googleapis.com." refuse
1014 local-zone: "yt3.ggpht.com." refuse
1015 local-zone: "youtubekids.com." refuse
1016 # try global if no match in view
1021 if $restart_unbound; then
1022 /etc
/init.d
/unbound restart
1023 if ! unbound-checkconf
; then
1024 echo $0: error
: unbound-checkconf failed
>&2
1030 # # disabled for now. i want to selectively enable it
1031 # # for specific hosts.
1032 # if [[ $(uci get adblock.global.adb_enabled) != 0 ]]; then
1033 # v uci set adblock.global.adb_enabled=0
1034 # uci commit adblock
1035 # /etc/init.d/adblock restart
1037 # # https://github.com/openwrt/packages/tree/master/net/adblock/files
1038 # cat >/etc/crontabs/root <<'EOF'
1039 # 0 06 * * * /etc/init.d/adblock reload
1043 # useful: http://wiki.openwrt.org/doc/howto/dhcp.dnsmasq
1045 # sometimes /mnt/usb fails, cuz it's just a flash drive,
1046 # so make sure we have this dir or else dnsmasq will fail
1048 mkdir
-p /mnt
/usb
/tftpboot
1049 cedit
/etc
/dnsmasq.conf
<<EOF || dnsmasq_restart=true
1053 ptr-record=1.0.2.10.in-addr.arpa.,cmc.b8.nz
1055 # https://ret2got.wordpress.com/2018/01/19/how-your-ethereum-can-be-stolen-using-dns-rebinding/
1057 rebind-domain-ok=b8.nz
1059 # This says the ip of dns server.
1060 # It is default if dnsmasq is doing dns, otherwise, we have to specify it.
1061 # To see it in action, I ran this from a client machine:
1062 # sudo dhcpcd -o domain_name_servers -T
1063 dhcp-option=option:dns-server,$l.1
1065 # use this when doing fai to get the right timezone, its nfsroot is
1066 # setup to use this dhcp option only and call ntpdate.
1067 # generate ips with:
1068 # for h in 0.ubuntu.pool.ntp.org 1.ubuntu.pool.ntp.org ntp.ubuntu.com; do host -t a $h | awk '{print $NF}'; done | while read -r l; do printf ,$l; done
1069 dhcp-option=option:ntp-server,188.165.3.28,202.12.97.45,91.236.251.13,50.205.244.23,78.30.254.80,31.131.0.123,202.65.114.202,94.228.220.14,185.125.190.57,185.125.190.58,91.189.91.157,185.125.190.56,91.189.94.4
1072 # results from googling around dnsmasq optimizations
1073 # about 50k in memory. router has 62 megs.
1074 # in a browsing session, I probably won't ever do 5000 lookups
1075 # before the ttl expiration or whatever does expiration.
1078 # ask all servers, use the one which responds first.
1079 # http://ma.ttwagner.com/make-dns-fly-with-dnsmasq-all-servers/
1082 # namebench benchmarks dns servers. google's dns was only
1083 # slightly less fast than some others, and I trust it more
1084 # to give accurate results, stay relatively fast, and
1085 # not do anythin too malicious, so just use that.
1086 # download namebench and run it like this:
1087 # for x in all regional isp global preferred nearby; do ./namebench.py -s \$x -c US -i firefox -m weighted -J 10 -w; echo \$x; hr; done
1091 server=2606:4700:4700::1113
1092 server=2606:4700:4700::1003
1097 # server=2001:4860:4860::8888
1098 # server=2001:4860:4860::8844
1101 # to fixup existin ips, on the client you can do
1102 # sudo dhclient -r; sudo dhclient <interface-name>
1104 # /etc/init.d/dnsmasq stop
1105 # vi /tmp/dhcp.leases
1106 # /etc/init.d/dnsmasq start
1109 # default dhcp range is 100-150
1110 # bottom port, iPXE (PCI 03:00.0) in seabios boot menu
1111 dhcp-host=c8:60:00:31:6b:75,set:kd,$l.2,kd
1112 dhcp-host=94:05:bb:1e:2c:2e,set:sy,$l.3,sy
1113 #dhcp-host=94:05:bb:1e:2c:2e,set:bo,$l.38,bo
1114 # top port, iPXE (PCI 04:00.0) in seabios boot menu
1115 #dhcp-host=c8:60:00:2b:15:07,set:kd,$l.2,kd
1116 # 4 is reserved for a staticly configured host wrt2
1117 # old x2 with bad fan
1118 #dhcp-host=00:1f:16:16:39:24,set:x2,$l.5,x2
1119 dhcp-host=f0:de:f1:81:ec:88,set:x2,$l.5,x2
1120 dhcp-host=c4:8e:8f:44:f5:63,set:x2w,$l.6,x2w
1121 dhcp-host=70:a6:cc:34:09:22,set:syw,$l.7,syw
1122 dhcp-host=80:fa:5b:1c:6e:cf,set:amy,$l.8,amy
1123 # This is so fai can have an explicit name to use for testing,
1124 # or else any random machine which did a pxe boot would get
1125 # reformatted. The mac is from doing a virt-install, cancelling it,
1126 # and copying the generated mac, so it should be randomish.
1127 dhcp-host=52:54:00:9c:ef:ad,set:demohost,$l.12,demohost
1128 ## for using different dhcp server
1129 #dhcp-host=52:54:00:9c:ef:ad,ignore
1130 dhcp-host=62:03:cb:a8:3e:a3,set:trp,$1.13,trp
1132 dhcp-host=00:1f:16:14:01:d8,set:x3,$l.18,x3
1133 # BRN001BA98CA823 in dhcp logs
1134 dhcp-host=00:1b:a9:8c:a8:23,set:brother,$l.19,brother
1136 dhcp-host=00:26:b6:f7:d4:d8,set:amyw,$l.23,amyw
1137 dhcp-host=9a:c6:52:6f:ce:7c,set:onep9,$l.24,onep9
1138 dhcp-host=38:63:bb:07:5a:f9,set:hp,$l.25,hp
1139 dhcp-host=00:26:b6:f6:0f:e9,set:frodow,$l.28,frodow
1140 dhcp-host=70:a6:cc:3a:bb:b4,set:bow,$l.29,bow
1141 dhcp-host=6c:56:97:88:7b:74,set:amazontab,$l.31,amazontab
1142 dhcp-host=0a:8a:9b:cf:b5:ec,set:samsungtab,$l.32,samsungtab
1143 dhcp-host=b8:27:eb:78:21:1d,set:pi3b,$l.33,pi3b
1144 dhcp-host=e4:5f:01:07:50:3f,set:pi4,$l.38,pi4
1145 dhcp-host=e4:5f:01:07:50:40,set:pi4w,$l.39,pi4w
1147 dhcp-host=38:2c:4a:c9:33:13,set:bigs,$l.48,bigs
1151 #dhcp-host=52:54:00:56:09:f9,set:faiserver,$l.15,faiserver
1153 # This is the ip it picks by default if dhcp fails,
1154 # so might as well use it.
1155 # hostname is the name it uses according to telnet
1156 dhcp-host=b4:75:0e:94:29:ca,set:switch9429ca,$l.251,switch9429ca
1161 # pxe tftpboot for arch-like. todo: openwrt snapshot from 2022-01, it cant
1162 # access /mnt/usb/tftpboot due to ujail sandbox
1164 #tftp-root=/mnt/usb/tftpboot
1165 #tftp-root=/var/run/dnsmasq/tftpboot
1168 dhcp-optsfile=/var/run/dnsmasq/dhcpopts.conf
1170 # for debugging dhcp
1175 if $dnsmasq_restart && ! $dev2; then
1176 # todo: can our ptr records be put in /etc/hosts?
1177 # eg: user normal /etc/hosts records, and they wont be used for A resolution
1178 # due to the other settings, but will be used for ptr? then maybe
1179 # we dont have to restart dnsmasq for a dns update?
1182 # https://www.redpill-linpro.com/techblog/2019/08/27/evaluating-local-dnssec-validators.html#toggling-dnssec-validation-1
1183 # we could turn on dnssec validation when wrt gets dnsmasq > 2.80. currently at 2.80.
1184 # also we can turn off dnssec in systemd-resolved if we know the router is doing it.
1186 # Also, reload of dnsmasq seems to break things, wifi
1187 # clients were not getting internet connectivity.
1189 v
/etc
/init.d
/dnsmasq restart
1192 if $firewall_restart; then
1193 v
/etc
/init.d
/firewall restart
1196 # this may just restart the network and take care of the network_restart below.
1197 if $wireless_restart; then
1201 # todo: we should catch errors and still run this if needed
1202 if $network_restart; then