2 # Copyright (C) 2016 Ian Kelling
4 # This program is free software; you can redistribute it and/or
5 # modify it under the terms of the GNU General Public License
6 # as published by the Free Software Foundation; either version 2
7 # of the License, or (at your option) any later version.
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
14 # You should have received a copy of the GNU General Public License
15 # along with this program; if not, write to the Free Software
16 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
20 trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR
25 usage: ${0##*/} [-h] [-t 2|3|test|client] [-m WIRELESS_MAC]
26 setup my router in general: dhcp, dns, etc.
28 Type 2 or 3 is for setting up a backup device, there are two kinds so
29 that you can switch the main device to a backup, then a backup to the
30 main. Type test is for setting up a testing device.
32 Passing an empty string for WIRELESS_MAC, or if none is defined in the
33 secrets file, will cause the device's native mac to be used.
45 if [[ -e /root
/router-secrets
]]; then
47 source /root
/router-secrets
49 rmac
=$
(cat /sys
/class
/net
/eth
0/address
)
51 hostname
=${rhost[$rmac]}
57 firewall_restart
=false
63 while getopts hm
:t
: opt
; do
70 libremanage_host
=$hostname
86 *) echo "$0: unexpected arg to -t: $*" >&2; usage
1 ;;
90 *) echo "$0: Internal error! unexpected args: $*" >&2 ; usage
1 ;;
93 shift "$((OPTIND-1))" # Discard the options and sentinel --
95 if [[ ! $mac ]] && ! $test && $secrets; then
96 # if we wanted to increment it
97 #mac=${mac:0: -1}$((${mac: -1} + 2))
101 if (( $# != 0 )); then
115 # background: upgrading all packages is not recommended because it
116 # doesn't go into the firmware. build new firmware if you want
117 # lots of upgrades. I think /tmp/opkg-lists is a pre openwrt 14 location.
118 f
=(/var
/opkg-lists
/*)
119 if ! (( $
(date -r $f +%s
) + 60*60*24 > $
(date +%s
) )); then
120 if ! opkg update
; then
121 echo "$0: warning: opkg update failed" >&2
132 if [[ ! $
(opkg list-installed
"$pname") ]]; then
137 if [[ $to_install ]]; then
138 opkg
install ${to_install[@]}
147 ######### uci example:#######
148 # # https://wiki.openwrt.org/doc/uci
149 # wan_index=$(uci show firewall | sed -rn 's/firewall\.@zone\[([0-9])+\]\.name=wan/\1/p')
150 # wan="firewall.@zone[$wan_index]"
151 # if [[ $(uci get firewall.@forwarding[0].dest) != $forward_dest ]]; then
153 # v uci set firewall.@forwarding[0].dest=$forward_dest
154 # uci commit firewall
155 # firewall_restart=true
157 ####### end uci example #####
160 printf "+ uset %s\n" "$*"
163 local service
="${key%%.*}"
164 restart_var
=${service}_restart
165 if [[ ! ${!restart_var} ]]; then
166 eval $restart_var=false
168 if [[ $
(uci get
"$key") != "$val" ]]; then
169 v uci
set "$key"="$val"
171 eval $restart_var=true
176 printf "+ udel %s\n" "$*"
179 local service
="${key%%.*}"
180 restart_var
=${service}_restart
181 if [[ ! ${!restart_var} ]]; then
182 eval $restart_var=false
184 if uci get
"$key" &>/dev
/null
; then
185 v uci
set "$key"="$val"
187 eval $restart_var=true
198 elif [[ $hostname == cmc
]]; then
216 : ${key:=pictionary49}
222 passwd
-l root ||
: #already locked fails
224 sed -ibak '/^root:/d' /etc
/shadow
225 # /root/router created by manually running passwd then copying the resulting
226 # line. We have no mkpasswd on wrt/librecmc, then we scp it in.
227 cat /root
/router
>>/etc
/shadow
228 # otherwise, serial console gets root login with no password
229 uset system.@system
[0].ttylogin
1
233 cat >/usr
/bin
/archlike-pxe-mount
<<'EOFOUTER'
235 # symlinks are collapsed for nfs mount points, so use a bind mount.
236 # tried putting this in /etc/config/fstab,
237 # then doing block mount, it didn't work. This doesn't persist across reboots,
238 # todo: figure that out
240 for d in /run/{arch,parabola}iso/bootmnt; do
241 cat >>/etc/fstab <<EOF
242 /mnt/usb/tftpboot $d none bind 0 0
244 mount | grep $d &>/dev/null || mount $d
246 /etc/init.d/nfsd restart
248 chmod +x
/usr
/bin
/archlike-pxe-mount
250 sed -i '/^root:/s,/bin/ash$,/bin/bash,' /etc
/passwd
254 uset dropbear.@dropbear
[0].PasswordAuth
0
255 uset dropbear.@dropbear
[0].RootPasswordAuth
0
256 uset dropbear.@dropbear
[0].Port
2220
257 if ! cmp -s /root
/dropbear_rsa_host_key
/etc
/dropbear
/dropbear_rsa_host_key
; then
258 cp /root
/dropbear_rsa_host_key
/etc
/dropbear
/dropbear_rsa_host_key
259 dropbear_restart
=true
262 if $dropbear_restart; then
263 v
/etc
/init.d
/dropbear restart
267 uset network.lan.ipaddr
$l.
$lanip
268 uset network.lan.netmask
$mask
269 if $dev2 ||
$client; then
271 uset network.lan.gateway
$l.1
272 uset network.wan.proto none
273 uset network.wan6.proto none
275 /etc
/init.d
/dnsmasq stop
276 /etc
/init.d
/dnsmasq disable
277 /etc
/init.d
/odhcpd stop
278 /etc
/init.d
/odhcpd disable
279 rm -f /etc
/resolv.conf
280 cat >/etc
/resolv.conf
<<'EOF'
285 # things i tried to keep dnsmasq running but not enabled except local dns,
286 # but it didnt work right and i dont need it anyways.
287 # uset dhcp.wan.ignore $dev2 # default is false
288 # uset dhcp.lan.ignore $dev2 # default is false
289 # uset dhcp.@dnsmasq[0].interface lo
290 # uset dhcp.@dnsmasq[0].localuse 0
291 # uset dhcp.@dnsmasq[0].resolvfile /etc/dnsmasq.conf
292 # uset dhcp.@dnsmasq[0].noresolv 1
293 # todo: populate /etc/resolv.conf with a static value
296 # these are the defaults
297 uset network.lan.gateway
''
298 uset network.wan.proto dhcp
299 uset network.wan6.proto dhcpv6
300 /etc
/init.d
/dnsmasq start
301 # todo: figure out why this returns 1
302 /etc
/init.d
/dnsmasq
enable ||
:
303 /etc
/init.d
/odhcpd start
304 /etc
/init.d
/odhcpd
enable
307 wireless_restart
=false
310 uset wireless.default_radio0.network
'wwan'
311 uset wireless.default_radio0.ssid
${rclientssid[$rmac]}
312 uset wireless.default_radio0.encryption
'psk2'
313 uset wireless.default_radio0.device
'radio0'
314 uset wireless.default_radio0.mode
'sta'
315 uset wireless.default_radio0.bssid
${rclientbssid[$rmac]}
316 # todo: look into whether 5g network is available.
317 uset wireless.default_radio0.key
${rclientkey[$rmac]}
318 uset wireless.radio0.disabled false
319 uset wireless.radio1.disabled true
321 # defaults, just reseting in case client config ran
322 uset wireless.default_radio0.network lan
323 uset wireless.default_radio0.mode ap
325 uset wireless.default_radio
$x.ssid
"$ssid"
326 uset wireless.default_radio
$x.key
$key
327 uset wireless.default_radio
$x.encryption psk2
329 uset wireless.default_radio
$x.macaddr
$macpre$
((macsuf
+ 2*x
))
331 # secondary device has wireless disabled
332 uset wireless.radio
$x.disabled
$dev2
340 # usb, screen, relay are for libremanage
343 # relay package temporarily disabled
344 # /root/relay_1.0-1_mips_24kc.ipk
345 v pi kmod-usb-storage block-mount kmod-fs-ext4 nfs-kernel-server \
346 tcpdump openvpn-openssl adblock libusb-compat \
347 screen kmod-usb-serial-cp210x kmod-usb-serial-ftdi rsync
349 cat >/etc
/libremanage.conf
<<EOF
350 ${libremanage_host}_type=switch
351 ${libremanage_host}_channel=1
356 v
/etc
/init.d
/fstab
enable ||
:
358 # rebooting makes mounting work, but comparing lsmod,
359 # i'm guessing this will too. todo, test it.
360 # 255 == module already loaded
361 for mod
in scsi_mod sd_mod
; do v modprobe
$mod ||
[[ $?
== 255 ]]; done
363 # for archlike pxe. The default settings in the installer expect to find
364 # the NFS at one of these dirs
365 mkdir
-p /run
/archiso
/bootmnt
366 mkdir
-p /run
/parabolaiso
/bootmnt
368 # todo: at some later time, i found /mnt/usb not mounted, watch to see if
369 # that is the case after running this or rebooting.
370 # wiki says safe to do in case of fstab changes:
372 ## ian: usb broke on old router. if that happens, can just comment this to disable problems
373 # echo | cedit /etc/config/fstab ||:
374 v cedit
/etc
/config
/fstab
<<EOF || { v block umount; v block mount; }
375 config global automount
380 # /overlay is an / overlay mount for installing extra packages, etc.
381 # https://openwrt.org/docs/guide-user/additional-software/extroot_configuration
382 option target /mnt/usb
383 # option target /overlay
384 option device /dev/sda1
386 option options rw,async,noatime,nodiratime
391 # ian: disabled because afaik I don't need it, no benefit.
392 # config global autoswap
393 # option from_fstab 1
397 # option device /dev/sda1
403 # exportfs -ra wont cut it when its the same path, but now a bind mount
404 # todo: restart nfs when nfs is enabled?
405 #cedit /etc/exports <<EOF || v /etc/init.d/nfsd restart ||:
406 cedit
/etc
/exports
<<EOF ||:
407 /mnt/usb $lan/$cidr(rw,no_root_squash,insecure,sync,no_subtree_check)
409 /run/archiso/bootmnt $lan/$cidr(rw,no_root_squash,insecure,sync,no_subtree_check)
410 /run/parabolaiso/bootmnt $lan/$cidr(rw,no_root_squash,insecure,sync,no_subtree_check)
414 # todo: enable nfs when we need it only.
415 # v /etc/init.d/portmap start
416 # v /etc/init.d/nfsd start
417 # v /etc/init.d/portmap enable
418 # v /etc/init.d/nfsd enable
427 ########## openvpn exampl
428 ########## missing firewall settings for routing lan
430 # v /etc/init.d/openvpn start
431 # v /etc/init.d/openvpn enable
433 # # from https://wiki.openwrt.org/doc/uci/firewall
434 # # todo: not sure if /etc/init.d/network needs restarting.
435 # # I did, and I had to restart the vpn afterwards.
436 # # This maps a uci interface to a real interface which is
437 # # managed outside of uci.
438 # v cedit /etc/config/network <<'EOF' ||:
439 # config interface 'tun0'
440 # option ifname 'tun0'
441 # option proto 'none'
443 # v cedit /etc/config/openvpn <<'EOF' || v /etc/init.d/openvpn restart
444 # config openvpn my_client_config
446 # option config /etc/openvpn/client.conf
453 network_restart
=false
455 v cedit wific
/etc
/config
/network
<<EOF || network_restart=true
456 # https://openwrt.org/docs/guide-user/network/wifi/connect_client_wifi
457 config interface 'wwan'
462 v cedit
/etc
/config
/network
<<EOF || network_restart=true
463 config 'route' 'transmission'
464 option 'interface' 'lan'
465 option 'target' '10.173.0.0'
466 option 'netmask' '255.255.0.0'
467 option 'gateway' '$l.3'
469 option interface 'wg0'
470 option proto 'wireguard'
471 option private_key '$(cat /root/wg.key)'
472 option listen_port $wgport
473 list addresses '10.3.0.1/24'
474 list addresses 'fdfd::1/64'
477 config wireguard_wg0 'wgclient'
478 option public_key '3q+WJGrm85r59NgeXOIvppxoW4ux/+koSw6Fee1c1TI='
479 option preshared_key '$(cat /root/wg.psk)'
480 list allowed_ips '10.3.0.2/24'
481 list allowed_ips 'fdfd::2/64'
484 if $network_restart; then
485 v
/etc
/init.d
/network reload
491 v cedit wific
/etc
/config
/firewall
<<EOF
496 option forward REJECT
505 v cedit
host /etc
/config
/firewall
<<EOF
515 v cedit
host /etc
/config
/firewall
<<EOF
526 v cedit
/etc
/config
/firewall
<<EOF
535 option src_dport 2202
542 option dest_port 2202
547 option src_dport 2205
554 option dest_port 2205
559 option src_dport 2207
566 option dest_port 2207
571 option src_dport 2208
578 option dest_port 2208
583 option src_dport 2209
590 option dest_port 2209
595 option src_dport 8000
596 option dest_port 8000
602 option dest_port 8000
608 option dest_port 2220
614 option dest_port $wgport
645 option name syncthing
647 option src_dport 22001
653 option dest_port 22001
660 # note, using mac transform, we could allow all traffic to a host like this,
661 # replacing 1 as appropriate
662 #option dest_ip ::111:11ff:fe11:1111/::ffff:ffff:ffff:ffff
668 option name http-ipv6
676 option name https-ipv6
684 option name node-exporter
687 option dest_port 9101
692 option name mail587-ipv6
701 firewall-cedit || firewall_restart
=true
703 # not using wireguard for now
704 # if ! uci get firewall.@zone[1].network | grep wg0 &>/dev/null; then
705 # # cant mix cedit plus uci
706 # echo | cedit /etc/config/firewall ||:
707 # uci add_list firewall.@zone[1].network=wg0
708 # uci commit firewall
710 # firewall_restart=true
715 v cedit
/etc
/hosts
<<EOF || dnsmasq_restart=true
718 # not sure this case statement is needed
721 v cedit
host /etc
/hosts
<<EOF || dnsmasq_restart=true
728 #mail_host=$(grep -F mail.iankelling.org /etc/hosts | awk '{print $1}')
729 # if [[ $mail_host ]]; then
730 # sed -i '/^$mail_host/a mail.iankelling.org' /etc/hosts
734 uset dhcp.@dnsmasq
[0].domain b8.nz
735 uset system.@system
[0].hostname
$hostname
736 uset dhcp.@dnsmasq
[0].
local
738 # uci doesnt seem to have a way to set an empty value,
739 # if you delete it, it goes back to the default. this seems
740 # to be a decent workaround.
741 # todo: setup /etc/resolv.conf to point to 127.0.0.1
742 uset dhcp.@dnsmasq
[0].resolvfile
=/dev
/null
744 # disabled for now. i want to selectively enable it
745 # for specific hosts.
746 if [[ $
(uci get adblock.global.adb_enabled
) != 0 ]]; then
747 v uci
set adblock.global.adb_enabled
=0
749 /etc
/init.d
/adblock restart
751 # https://github.com/openwrt/packages/tree/master/net/adblock/files
752 cat >/etc
/crontabs
/root
<<'EOF'
753 0 06 * * * /etc/init.d/adblock reload
757 # useful: http://wiki.openwrt.org/doc/howto/dhcp.dnsmasq
759 # sometimes /mnt/usb fails, cuz it's just a flash drive,
760 # so make sure we have this dir or else dnsmasq will fail
762 mkdir
-p /mnt
/usb
/tftpboot
763 v cedit
/etc
/dnsmasq.conf
<<EOF || dnsmasq_restart=true
765 ptr-record=1.0.2.10.in-addr.arpa.,cmc.b8.nz
766 ptr-record=2.0.2.10.in-addr.arpa.,kd.b8.nz
767 ptr-record=3.0.2.10.in-addr.arpa.,sy.b8.nz
768 ptr-record=4.0.2.10.in-addr.arpa.,wrt2.b8.nz
769 ptr-record=5.0.2.10.in-addr.arpa.,x2.b8.nz
770 ptr-record=6.0.2.10.in-addr.arpa.,xw2.b8.nz
771 ptr-record=7.0.2.10.in-addr.arpa.,syw.b8.nz
772 ptr-record=8.0.2.10.in-addr.arpa.,tp.b8.nz
773 ptr-record=9.0.2.10.in-addr.arpa.,bb8.b8.nz
774 ptr-record=12.0.2.10.in-addr.arpa.,demohost.b8.nz
775 ptr-record=14.0.2.10.in-addr.arpa.,wrt3.b8.nz
776 ptr-record=19.0.2.10.in-addr.arpa.,brother.b8.nz
777 ptr-record=25.0.2.10.in-addr.arpa.,hp.b8.nz
778 ptr-record=.0.2.10.in-addr.arpa.,transmission.b8.nz
780 # https://ret2got.wordpress.com/2018/01/19/how-your-ethereum-can-be-stolen-using-dns-rebinding/
782 rebind-domain-ok=b8.nz
784 # this says the ip of default gateway and dns server,
785 # but I think they are unneded and default
791 # results from googling around dnsmasq optimizations
792 # about 50k in memory. router has 62 megs.
793 # in a browsing session, I probably won't ever do 5000 lookups
794 # before the ttl expiration or whatever does expiration.
797 # ask all servers, use the one which responds first.
798 # http://ma.ttwagner.com/make-dns-fly-with-dnsmasq-all-servers/
801 # namebench benchmarks dns servers. google's dns was only
802 # slightly less fast than some others, and I trust it more
803 # to give accurate results, stay relatively fast, and
804 # not do anythin too malicious, so just use that.
805 # download namebench and run it like this:
806 # for x in all regional isp global preferred nearby; do ./namebench.py -s \$x -c US -i firefox -m weighted -J 10 -w; echo \$x; hr; done
810 server=2001:4860:4860::8888
811 server=2001:4860:4860::8844
814 # to fixup existin ips, on the client you can do
815 # sudo dhclient -r; sudo dhclient <interface-name>
817 # default dhcp range is 100-150
818 # bottom port, iPXE (PCI 03:00.0) in seabios boot menu
819 dhcp-host=c8:60:00:31:6b:75,set:kd,$l.2,kd
820 dhcp-host=94:05:bb:1e:2c:2e,set:sy,$l.3,sy
821 # top port, iPXE (PCI 04:00.0) in seabios boot menu
822 #dhcp-host=c8:60:00:2b:15:07,set:kd,$l.2,kd
823 # 4 is reserved for a staticly configured host wrt2
824 # old x2 with bad fan
825 #dhcp-host=00:1f:16:16:39:24,set:x2,$l.5,x2
826 dhcp-host=f0:de:f1:81:ec:88,set:x2,$l.5,x2
827 dhcp-host=c4:8e:8f:44:f5:63,set:x2w,$l.6,x2w
828 dhcp-host=34:7d:f6:ed:ec:07,set:syw,$l.7,syw
829 dhcp-host=80:fa:5b:1c:6e:cf,set:tp,$l.8,tp
830 # This is so fai can have an explicit name to use for testing,
831 # or else any random machine which did a pxe boot would get
832 # reformatted. The mac is from doing a virt-install, cancelling it,
833 # and copying the generated mac, so it should be randomish.
834 dhcp-host=52:54:00:9c:ef:ad,set:demohost,$l.12,demohost
835 dhcp-host=62:03:cb:a8:3e:a3,set:trp,$1.13,trp
836 dhcp-host=00:1f:16:14:01:d8,set:x3,$l.18,x3
837 # BRN001BA98CA823 in dhcp logs
838 dhcp-host=00:1b:a9:8c:a8:23,set:brother,$l.19,brother
839 dhcp-host=38:63:bb:07:5a:f9,set:hp,$l.25,hp
840 dhcp-host=00:26:b6:f6:0f:e9,set:frodow,$l.28,frodow
841 dhcp-host=00:26:18:97:bb:16,set:frodo,$l.29,frodo
845 dhcp-host=52:54:00:56:09:f9,set:faiserver,$l.15,faiserver
847 # This is the ip it picks by default if dhcp fails,
848 # so might as well use it.
849 # hostname is the name it uses according to telnet
850 dhcp-host=b4:75:0e:94:29:ca,set:switch9429ca,$l.251,switch9429ca
855 # Just leave the tftp server up even if we aren't doing pxe boot.
856 # It has no sensitive info.
858 tftp-root=/mnt/usb/tftpboot
859 dhcp-optsfile=/etc/dnsmasq-dhcpopts.conf
865 if $dnsmasq_restart && ! $dev2; then
866 # todo: can our ptr records be put in /etc/hosts?
867 # eg: user normal /etc/hosts records, and they wont be used for A resolution
868 # due to the other settings, but will be used for ptr? then maybe
869 # we dont have to restart dnsmasq for a dns update?
871 # todo: according to this
872 # https://www.redpill-linpro.com/techblog/2019/08/27/evaluating-local-dnssec-validators.html#toggling-dnssec-validation-1
873 # we should turn on dnssec validation when wrt gets version > 2.80. currently at 2.80.
874 # todo: download https://downloads.openwrt.org/snapshots/packages/mipsel_24kc/base/dnsmasq-full_2.84-1_mipsel_24kc.ipk
875 # and install it. then we can turn off dnssec in systemd-resolved
877 # Also, reload of dnsmasq seems to break things, wifi
878 # clients were not getting internet connectivity.
879 v
/etc
/init.d
/dnsmasq restart
882 if $firewall_restart; then
883 v
/etc
/init.d
/firewall restart
886 # this may just restart the network and take care of the network_restart below.
887 if $wireless_restart; then
891 # todo: we should catch errors and still run this if needed
892 if $network_restart; then