Changeset 10136 in hybrid for trunk/nanobsd/files/etc
- Timestamp:
- Mar 12, 2012, 6:32:43 AM (13 years ago)
- Location:
- trunk/nanobsd/files/etc
- Files:
-
- 2 added
- 5 edited
Legend:
- Unmodified
- Added
- Removed
-
TabularUnified trunk/nanobsd/files/etc/crontab ¶
r10135 r10136 28 28 # Write updates for ntp.drift to flash 29 29 0 12 * * * root /usr/local/bin/write_ntpdrift 30 # 31 # Nagios checks 32 30 * * * * root /usr/local/dense/dense.sh 33 */15 * * * * root /usr/local/sbin/check-inet-alive -
TabularUnified trunk/nanobsd/files/etc/ipfw.sh ¶
r10135 r10136 1 1 #!/bin/sh - 2 # Based on /etc/rc.firewall 3 # 4 # Credits: Richard van Mansom, Rick van der Zwet 2 5 3 # Based on /etc/rc.firewall 6 7 allowed2internet="80,443" 8 maxconnections="10" 9 10 RFC1918_nets="10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" 11 WLNET='172.16.0.0/12' 4 12 5 13 # Suck in the configuration variables. … … 34 42 esac 35 43 44 ########### 45 # Set Internal/External Interface 46 # 47 driver=`echo ${internalif} | sed 's/[0-9]*//g'` 48 seq=`echo ${internalif} | sed 's/[a-zA-Z]*//g'` 49 50 if [ ${seq} = 0 ]; then 51 seq=`expr ${seq} \+ 1` 52 else 53 seq=`expr ${seq} \- 1` 54 fi 55 56 externalif="$driver$seq" 57 58 # Get interface Addresses 59 externalip=`ifconfig $externalif | awk '/inet/ { print $2 }'` 60 internalip=`ifconfig $internalif | awk '/inet/ { print $2 }'` 36 61 ############ 37 62 # Flush out the list before we begin. … … 41 66 setup_loopback 42 67 43 ############44 45 # By default no firewalling46 ${fwcmd} add 65000 pass all from any to any47 48 # Transproxy/WLportal/Captive portal49 ${fwcmd} add 10000 allow tcp from any to localhost 8050 ${fwcmd} add 10001 allow tcp from any to me 8051 68 52 69 ############ 53 # Reserved: Whitelist rule numbers 54 # 10002 - 10009 55 NR=10002 56 for IP in $captive_portal_whitelist; do 57 ${fwcmd} add $NR allow tcp from $IP to not 172.16.0.0/12 dst-port 80 58 NR=`expr $NR + 1` 70 # Block the hosters network (and maybe others) 71 for IP in ${firewall_block} 72 do 73 ${fwcmd} add deny ip from any to ${IP} in via $internalif 59 74 done 60 75 61 76 ############ 62 # Reserved: WLPortal rule numbers63 # 10010 - 10099 77 # Statefull filewall in use 78 ${fwcmd} add check-state 64 79 65 # Forward rules work without a base address, so needed a loop over all inet4 adresses 66 for INF in $captive_portal_interfaces; do 67 ${fwcmd} add 10100 fwd 172.31.255.1,8081 tcp from any to not 172.16.0.0/12 80 in via ${INF} 68 done 80 # Allow anything originating from me 81 ${fwcmd} add allow ip from me to any keep-state 82 83 84 ############# 85 # Outbound NAT setup 86 # WL Net -> Internet 87 ${fwcmd} add nat 100 all from $WLNET to any out recv $internalif xmit $externalif 88 ${fwcmd} add nat 100 all from any to $externalip in recv $externalif 89 ${fwcmd} nat 100 config if $externalif 90 91 # Subnet Internet is allowed 92 ${fwcmd} add allow tcp from $WLNET to any $allowed2internet in via $internalif setup limit src-addr $maxconnections 93 94 95 ############# 96 # Internal Network -> WL Net 97 # Inbound NAT setup, to allow proxy device to be used gateway from Internal Network to WL 98 ${fwcmd} add nat 200 all from $RFC1918_nets to $WLNET out recv $externalif xmit $internalif 99 ${fwcmd} add nat 200 all from $WLNET to $internalip in recv $internalif 100 ${fwcmd} nat 200 config if $internalif 101 102 # Allow all traffic inbound 103 ${fwcmd} add allow all from $RFC1918_nets to $WLNET in recv $externalif keep-state 104 105 106 ############# 107 ## Services in use 108 ## Allow on external interface 109 external_allow_tcp="ssh" 110 ${fwcmd} add allow tcp from any to me $external_allow_tcp via $externalif setup keep-state 111 112 ## Allow on internal interface 113 internal_allow_tcp="ssh,domain,3128" 114 internal_allow_udp="ntp,domain,snmp,12345" 115 ${fwcmd} add allow udp from $WLNET to me ${internal_allow_udp} via $internalif keep-state 116 ${fwcmd} add allow tcp from $WLNET to me ${internal_allow_tcp} via $internalif setup keep-state 117 118 # Basic ICMP managment traffic 119 ${fwcmd} add allow icmp from any to me icmptype 8 120 ${fwcmd} add allow icmp from me to any icmptype 3,4,11 121 122 123 ############# 124 # Block anything else 125 ${fwcmd} add 65000 deny log logamount 500 ip from any to any 126 -
TabularUnified trunk/nanobsd/files/etc/ntp.conf ¶
r10135 r10136 1 1 #XXX: Might need to be dynamic 2 2 3 server 172.17.8.68 # proxy1 4 server 172.17.143.4 # proxy2 5 server 172.20.128.98 # proxy3 6 server 172.16.2.254 # proxy4 7 server 172.19.168.66 # proxy5 8 server 172.16.3.146 # proxy6 9 server 172.17.16.66 # proxy62 10 server 172.17.0.1 # proxy7 11 server 172.16.4.54 # proxy9 12 server 172.22.0.66 # proxy10 13 server 172.23.25.66 # proxy11 14 server 172.16.3.98 # proxy13 15 server 172.17.169.66 # proxy97 3 # server 172.17.8.68 # proxy1 4 # server 172.17.143.4 # proxy2 5 # server 172.20.128.98 # proxy3 6 # server 172.19.137.67 # proxy4 7 # server 172.19.168.66 # proxy5 8 9 #XXX: All it's local nighboor addresses 10 11 # server proxy1.wleiden.net # autokey 12 # server proxy2.wleiden.net # autokey 13 # server proxy3.wleiden.net # autokey 14 server 0.nl.pool.ntp.org 15 server 1.nl.pool.ntp.org 16 server 2.nl.pool.ntp.org 17 server 3.nl.pool.ntp.org 18 # In case machine get hooked to internet (and got working dns) 19 20 16 21 17 22 # and if all failes - use our local crummy clock -
TabularUnified trunk/nanobsd/files/etc/rc.conf ¶
r10135 r10136 2 2 dumpdev="NO" # No kernel dumps as we don't have a place to 3 3 # store them 4 gateway_enable=" YES" # Act like a gateway please4 gateway_enable="NO" # Do NOT act like a gateway 5 5 ipv6_enable="NO" # No IPv6 support for now, near feature... ;-) 6 7 # Firewall needed for port redirection (captive portal, splash screen)8 firewall_enable="YES"9 firewall_script="/etc/ipfw.sh"10 6 11 7 # NTP server needs working config with WL network or internet on boot … … 21 17 # Don't let syslog accept input from other remote hosts 22 18 syslogd_enable="YES" 23 syslogd_flags="-s -A -c "19 syslogd_flags="-s -A -c -b 127.0.0.1" 24 20 25 21 # Remote login without DNS checking as it might not also be functionable … … 34 30 update_nanobsd_motd="YES" 35 31 36 ## Port extentions37 # Serve our clients some pretty cool IP address to at least get connected38 # Also some low-memory footprint dns resolver39 dnsmasq_enable="YES"40 41 32 # Monitoring deamons 42 33 nrpe2_enable="YES" … … 44 35 snmpd_flags="-a -LF w /var/log/snmpd.log" 45 36 46 # Some nodes will serve asHTTP(S) proxy server47 tinyproxy_enable=" NO"37 # HTTP(S) proxy server 38 tinyproxy_enable="YES" 48 39 49 ## WL ports extentions 50 thttpd_enable="YES" 51 http302_enable="YES" 52 53 lvrouted_enable="YES" 54 lvrouted_flags="-u -s s00p3rs3kr3t -m 28 -z 172.16.2.254,172.17.0.1,172.23.25.66,172.17.169.66" 40 # Nameserver for internet and wleiden.net 41 maradns_enable="YES" 42 dnsmasq_enable="NO" 43 fetchzone_enable="YES" 55 44 56 45 # Make sure generated ssh keys are saved 57 46 nanobsd_save_sshkeys_enable="YES" 58 47 59 # Do some cool stuff with pen, like checking on best connections and reload, so60 # need a wrapper instead of the conventional startup script61 pen_wrapper_enable="YES"62 63 ## Initial (network) configuration64 #65 hostname="ChangeMe.example.org"66 # XXX: Maybe something cool (zero config) as initial configuration67 68 ## Iperf server mode69 #70 iperf_enable="YES" -
TabularUnified trunk/nanobsd/files/etc/sysctl.conf ¶
r10135 r10136 1 # Value depends on link radio with estimated range of 500m, which seems to be a 2 # maximum usage of our Omni Antenna's. Calculation used: 3 # (remember radio signals travel with 300m/s) 4 # acktimeout = 23 + (link_length * 2 / 300) 5 dev.ath.0.slottime=23 6 dev.ath.0.acktimeout=27 7 dev.ath.0.ctstimeout=27 8 net.link.ether.inet.max_age=300 1 #XXX: Might needs to be dynamic as value depends on link length 2 # Turned of since it is highly unlikely that a proxy will use a wlan interface 3 # dev.ath.0.acktimeout=35 4 # dev.ath.1.acktimeout=35 5 # dev.ath.2.acktimeout=35
Note:
See TracChangeset
for help on using the changeset viewer.