Changeset 10417 in hybrid for branches/releng-9.0/nanobsd/files
- Timestamp:
- Apr 10, 2012, 2:51:13 PM (13 years ago)
- Location:
- branches/releng-9.0/nanobsd/files
- Files:
-
- 6 added
- 4 deleted
- 8 edited
- 1 copied
- 2 moved
Legend:
- Unmodified
- Added
- Removed
-
branches/releng-9.0/nanobsd/files/FILE_LISTING.txt
r10416 r10417 2 2 ./boot.config # Serial console output 3 3 ./boot/loader.conf # Serial console output 4 ./conf/default/etc/.work_around_till_fix_of_pr_1345135 ./conf/default/var/.work_around_till_fix_of_pr_1345136 4 ./etc/crontab # Extra calls for pen & ntp 7 5 ./etc/namedb/named.conf # Custom named configuration … … 9 7 ./etc/rc.conf # Highly customized rc.conf 10 8 ./etc/syslog.conf # Remote syslogging enabing 11 ./etc/ttys-nanobsd.patch # Serial console output12 9 ./root/.ssh # Template directory for authorized_keys file 13 10 ./tools/change_password # Allow persistent changing of root password 14 ./tools/dhcpd_snmp.sh # XXX15 11 ./tools/save_sshkeys # Allow persistent saving of host ssh keys 16 ./tools/syslogd_flags.sh # XXX17 12 ./tools/updatep1 # phk image on slice 1 update script 18 13 ./tools/updatep2 # phk image on slice 2 update script … … 20 15 ./tools/wl-version # Version debug tool, gather statistics for debugging 21 16 ./usr/lib/aout/.keep_me # Little hack to have /etc/rc.d/ldconfig stop nagging about missing (pruned) dir 22 ./usr/local/bin/ssh-copy-id # XXX23 ./usr/local/bin/write_ntpdrift # XXX24 17 ./usr/local/etc/dhcpd-snmp.conf # dhcp-snmp cofiguration 25 18 ./usr/local/etc/dhcpd.conf # Initial custom dhcpd.conf 26 ./usr/local/etc/nrpe.cfg # XXX27 ./usr/local/etc/ntp.drift # XXX28 19 ./usr/local/etc/rc.d/lvrouted.sh # lvrouted startup script 29 ./usr/local/etc/rc.d/nanobsd-motd # Allow updating motd with persistent save30 20 ./usr/local/etc/rc.d/nanobsd-save-sshkeys # Allow saving ssh-keys after generation 31 ./usr/local/etc/rc.d/pen # Pen startup script32 ./usr/local/etc/rc.d/sort-proxies # Pen optimizer script33 ./usr/local/etc/rc.d/wlweb # WLweb configuration webinterface startup script34 ./usr/local/sbin/dhcpd-snmp # dhcp-snmp 'binary'35 ./usr/local/sbin/lvrouted.opt # lvrouted 'binary'36 21 ./usr/local/share/snmp/mibs/IEEE802dot11-MIB.txt # Draft MIB 37 22 ./usr/local/share/snmp/snmpd.conf # Custom snmpd configuration 38 ./usr/local/wlweb # WLweb configuration webinterface program -
branches/releng-9.0/nanobsd/files/etc/crontab
r10136 r10417 26 26 1,31 0-5 * * * root adjkerntz -a 27 27 # 28 # WL NanoBSD Custom Rules 29 # 28 30 # Write updates for ntp.drift to flash 29 0 12 * * * root /usr/local/ bin/write_ntpdrift31 0 12 * * * root /usr/local/sbin/store-ntpdrift 30 32 # 31 33 # Nagios checks 32 30 * * * * root /usr/local/dense/dense.sh33 34 */15 * * * * root /usr/local/sbin/check-inet-alive -
branches/releng-9.0/nanobsd/files/etc/newsyslog.conf
r10416 r10417 37 37 /var/log/wtmp 644 3 * @01T05 B 38 38 /var/log/xferlog 600 7 100 * JC 39 # 40 # WL NanoBSD Custom Log Files. As-rule-of-thumb, use syslog(4) instead custom 41 # created logfile because of locking issues. 42 # 43 /var/log/wlportal.log 664 3 100 * J /var/run/wlportal.pid 44 /var/log/snmpd.log 644 3 100 * J /var/run/snmpd.pid 45 /var/log/thttpd.log 644 3 100 * J 39 46 /var/log/pen_wrapper.log 644 3 100 * J 40 /var/log/wlportal.log 664 3 100 * J /var/run/wlportal.pid41 /var/log/wlweb-access.log 644 3 100 * J42 /var/log/wlweb-error.log 644 3 100 * J43 /var/log/snmpd.log 644 3 100 * J /var/run/snmpd.pid44 /var/log/thttpd.log 644 3 100 * J /var/run/thttpd.pid45 46 -
branches/releng-9.0/nanobsd/files/etc/pf.conf
r10242 r10417 1 wifi_if="wlan0"2 1 all_node="172.31.255.1/32" 3 4 2 wl_net="172.16.0.0/12" 5 vpn_net="172.17.64.0/28"6 3 allow_ext_tcp="{22}" 7 4 allow_ext_udp="{161}" 8 allow_int_tcp="{22, 53,80,3128}"9 allow_int_udp="{53,1 31,161,12345}"5 allow_int_tcp="{22,3128}" 6 allow_int_udp="{53,161,12345}" 10 7 allow_int_udp_any="{67}" 11 8 … … 18 15 nat on $int_if from $private to $wl_net -> ($int_if) 19 16 17 # Redirection, needs source natting and allow rules 18 #rdr on $ext_if inet proto tcp from any to $ext_if port 1022 -> 192.168.84.1 port 22 19 20 20 # Block all 21 block in on $ext_if 22 pass in on$int_if21 block in on $ext_if from any to $ext_if 22 block in on $int_if from any to $int_if 23 23 24 # Allow wl access from access point (not yet reversed) 25 pass on $wifi_if from $wl_net to $wl_net 26 27 # Block this device from wifi 28 block in on $wifi_if inet from any to $wifi_if 29 block inet from any to $all_node 30 24 # Allow private to private 31 25 # Enable me to access anything 32 pass out on {$ext_if, $int_if , $wifi_if} keep state26 pass out on {$ext_if, $int_if} keep state 33 27 34 28 # Allow internet access from the network 35 pass in on $wifi_if inet proto tcp from $wl_net to any port $publicnat keep state 36 block in on $wifi_if inet proto tcp from $wl_net to $wifi_if port $publicnat 37 block in on $wifi_if inet proto tcp from $wl_net to $all_node port $publicnat 29 pass in on $int_if inet proto tcp from $wl_net to any port $publicnat keep state 30 block in on $int_if inet proto tcp from $wl_net to $int_if port $publicnat 38 31 39 32 # Allow directives … … 41 34 pass in on $ext_if inet proto udp from any to $ext_if port $allow_ext_udp keep state 42 35 43 pass in on $int_if inet proto tcp from $wl_net to $vpn_net port $allow_int_tcp keep state 44 pass in on $int_if inet proto udp from $wl_net to $vpn_net port $allow_int_udp keep state 45 pass in on $int_if inet proto icmp from $wl_net to $vpn_net keep state 46 pass in on $int_if inet proto udp from any to any port $allow_int_udp_any keep state 47 48 pass in on $wifi_if inet proto tcp from $wl_net to $wl_net port $allow_int_tcp keep state 49 pass in on $wifi_if inet proto udp from $wl_net to $wl_net port $allow_int_udp keep state 50 pass in on $wifi_if inet proto icmp from $wl_net to $wl_net keep state 51 pass in on $wifi_if inet proto udp from any to any port $allow_int_udp_any keep state 36 pass in on $int_if inet proto tcp from $wl_net to $int_if port $allow_int_tcp keep state 37 pass in on $int_if inet proto udp from $wl_net to $int_if port $allow_int_udp keep state 38 pass in on $int_if inet proto icmp from $wl_net to $int_if keep state 52 39 53 40 # Allow wl access from local network … … 55 42 56 43 # Make sure to block local network access from wl 57 block on $wifi_if from $wl_net to $private58 44 block on $int_if from $wl_net to $private 59 45 46 # Otherwise lvrouted breaks: 47 pass in on $int_if -
branches/releng-9.0/nanobsd/files/etc/rc.conf
r10382 r10417 1 # # Building options2 dumpdev="NO" # No kernel dumps as we don't have a place to3 # store them 4 ipv6_network_interfaces="NONE" # No IPv6 support for now, near feature... ;-) 1 # No kernel dumps as we don't have a place to store them 2 dumpdev="NO" 3 # We are an router/gateway (wireless to be precise) 4 gateway_enable="YES" 5 5 6 6 # NTP server needs working config with WL network or internet on boot … … 24 24 sshd_flags="-u0" 25 25 26 # Don't update the motd as it not writeable, the update_nanobsd_motd is a27 # simple wrapper found at /usr/local/etc/rc.d supporting this featureg28 update_motd="NO"29 update_nanobsd_motd="YES"30 31 26 # Monitoring deamons 32 27 nrpe2_enable="YES" … … 40 35 nanobsd_save_sshkeys_enable="YES" 41 36 42 ## Port extentions 43 # Serve our clients some pretty cool IP address to at least get connected 44 # Also some low-memory footprint dns resolver 37 # low-memory footprint DHCP and non-autoritive recursive DNS resolver 45 38 dnsmasq_enable="YES" 39 40 # Explicitly disable the memory-hungry alternatives 41 dhcpd_enable="NO" 42 named_enable="NO" 46 43 named_auto_forward="YES" 47 named_enable="NO"48 44 49 # # WL ports extentions45 # WL Captive Portal and WL Web Config Overview 50 46 thttpd_enable="YES" 51 47 http302_enable="YES" 52 48 53 # Make sure generated ssh keys are saved 54 nanobsd_save_sshkeys_enable="YES" 49 # Hybrid setup, requires outgoing VPN Server 50 openvpn_enable="NO" 51 openvpn_if="tap" 55 52 56 #Hybrid 57 openvpn_enable="YES" 58 openvpn_if="tap" 53 # Enable the firewall by default 54 pf_enable="YES" 55 pf_rules="/etc/pf.default.conf" 56 pf_flags="-D ext_if=vr0 -D int_if=vr1 -D publicnat={80,443}" -
branches/releng-9.0/nanobsd/files/etc/syslog.conf
r10416 r10417 31 31 !ppp 32 32 *.* /var/log/ppp.log 33 !thttpd 34 *.* /var/log/thttpd.log -
branches/releng-9.0/nanobsd/files/usr/local/etc/snmp/snmpd.conf
r10247 r10417 40 40 # System contact information 41 41 42 sysLocation Somewhere in or near Leiden43 sysContact Stichting Wireless Leiden <beheer@wirelessleiden.nl> / +31 71 513981742 sysLocation "Somewhere in or near Leiden" 43 sysContact "Stichting Wireless Leiden <beheer@lijst.wirelessleiden.nl> / +31 71 5139817" 44 44 45 45 … … 77 77 78 78 # miboid exec-command 79 pass .1.3.6.1.4.1.2021.50 /usr/local/nagios/bin/processor80 81 pass_persist .1.3.6.1.4.1.21695.1.2 /usr/local/sbin/dhcpd-snmp /usr/local/etc/dhcpd-snmp.conf82 83 extend .1.3.6.1.4.1.2021.61 nagios-www /usr/local/sbin/proxy-test.sh84 extend .1.3.6.1.4.1.2021.62 nagios-routing /usr/local/sbin/lvrouted-test.sh85 86 79 extend .1.3.6.1.4.1.2021.70 dhcp-users /bin/sh -c "cat /var/db/dnsmasq.leases \| awk '{ print $1,$2,$3 }'" 87 80 extend .1.3.6.1.4.1.2021.71 portal-users /bin/sh -c "cat /var/db/clients \| awk '{ print $1,$2,$3 }'" -
branches/releng-9.0/nanobsd/files/usr/local/etc/thttpd.conf
r10416 r10417 3 3 cgipat=** 4 4 nochroot 5 logfile=/var/log/thttpd.log6 5 pidfile=/var/run/thttpd.pid
Note:
See TracChangeset
for help on using the changeset viewer.