freedomboneeee/src/freedombone-client

187 lines
7.0 KiB
Plaintext
Raw Normal View History

2015-01-24 21:02:39 +01:00
#!/bin/bash
#
# .---. . .
# | | |
# |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
# | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
# ' ' --' --' -' - -' ' ' -' -' -' ' - --'
#
# Freedom in the Cloud
#
# License
# =======
#
# Copyright (C) 2015 Bob Mottram <bob@robotics.uk.to>
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
CURR_USER=$USER
# Version number of this script
2015-07-09 19:59:43 +02:00
VERSION="1.01"
2015-01-24 21:02:39 +01:00
# mesh networking settings
2015-07-19 20:59:21 +02:00
BRIDGE_BATMAN_IPV6=
PEER_BATMAN_IPV6=
2015-01-24 21:02:39 +01:00
# ssh (from https://stribika.github.io/2015/01/04/secure-secure-shell.html)
SSH_CIPHERS="chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr"
SSH_MACS="hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-ripemd160-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,umac-128@openssh.com"
SSH_KEX="curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256"
SSH_HOST_KEY_ALGORITHMS="ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-ed25519,ssh-rsa"
# see https://stribika.github.io/2015/01/04/secure-secure-shell.html
function ssh_remove_small_moduli {
sudo awk '$5 > 2000' /etc/ssh/moduli > /home/$CURR_USER/moduli
sudo mv /home/$CURR_USER/moduli /etc/ssh/moduli
}
function configure_ssh_client {
#sudo sed -i 's/# PasswordAuthentication.*/ PasswordAuthentication no/g' /etc/ssh/ssh_config
#sudo sed -i 's/# ChallengeResponseAuthentication.*/ ChallengeResponseAuthentication no/g' /etc/ssh/ssh_config
sudo sed -i "s/# HostKeyAlgorithms.*/ HostKeyAlgorithms $SSH_HOST_KEY_ALGORITHMS/g" /etc/ssh/ssh_config
sudo sed -i "s/# Ciphers.*/ Ciphers $SSH_CIPHERS/g" /etc/ssh/ssh_config
sudo sed -i "s/# MACs.*/ MACs $SSH_MACS/g" /etc/ssh/ssh_config
if ! grep -q "HostKeyAlgorithms" /etc/ssh/ssh_config; then
sudo echo " HostKeyAlgorithms $SSH_HOST_KEY_ALGORITHMS" >> /etc/ssh/ssh_config
fi
sudo sed -i "s/Ciphers.*/Ciphers $SSH_CIPHERS/g" /etc/ssh/ssh_config
if ! grep -q "Ciphers " /etc/ssh/ssh_config; then
sudo echo " Ciphers $SSH_CIPHERS" >> /etc/ssh/ssh_config
fi
sudo sed -i "s/MACs.*/MACs $SSH_MACS/g" /etc/ssh/ssh_config
if ! grep -q "MACs " /etc/ssh/ssh_config; then
sudo echo " MACs $SSH_MACS" >> /etc/ssh/ssh_config
fi
# Create ssh keys
if [ ! -f /home/$CURR_USER/.ssh/id_ed25519 ]; then
ssh-keygen -t ed25519 -o -a 100
fi
if [ ! -f /home/$CURR_USER/.ssh/id_rsa ]; then
ssh-keygen -t rsa -b 4096 -o -a 100
fi
ssh_remove_small_moduli
echo ''
echo 'Copy the following into a file called /home/username/.ssh/authorized_keys on the Freedombone server'
echo ''
echo $(cat /home/$CURR_USER/.ssh/id_rsa.pub)
echo $(cat /home/$CURR_USER/.ssh/id_ed25519.pub)
echo ''
}
function mesh_batman {
2015-07-19 20:59:21 +02:00
if [ ! $BRIDGE_BATMAN_IPV6 ]; then
return
fi
sudo apt-get -y install iproute bridge-utils libnetfilter-conntrack3 batctl
sudo apt-get -y install python-dev libevent-dev ebtables python-pip git
sudo modprobe batman-adv
[ $? -ne 0 ] && echo "B.A.T.M.A.N module not available" && exit 76482
if ! grep -q "batman_adv" /etc/modules; then
sudo echo 'batman_adv' >> /etc/modules
fi
2015-07-19 20:59:21 +02:00
# If no address has been given then create a ramdom one
if [ ! $PEER_BATMAN_IPV6 ]; then
hexarray=( 1 2 3 4 5 6 7 8 9 0 a b c d e f )
a=${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}
b=${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}
c=${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}
d=${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}${hexarray[$RANDOM%16]}
PEER_BATMAN_IPV6="$IPV6_NETWORK:$a:$b:$c:$d"
fi
sudo cp /etc/network/interfaces ~/interfaces
if ! grep -q "# Mesh Networking (B.A.T.M.A.N)" ~/interfaces; then
echo '' >> ~/interfaces
echo '# Mesh Networking (B.A.T.M.A.N)' >> ~/interfaces
echo 'iface bat0 inet6 static' >> ~/interfaces
echo ' pre-up modprobe ipv6' >> ~/interfaces
echo " address $PEER_BATMAN_IPV6" >> ~/interfaces
echo ' netmask 64' >> ~/interfaces
sudo mv ~/interfaces /etc/network/interfaces
else
sudo rm ~/interfaces
fi
echo '#!/bin/bash' > /tmp/freedombone_mesh
echo '' > /tmp/freedombone_mesh
echo '# stop network manager to make the mesh network work' >> /tmp/freedombone_mesh
echo 'service networking stop' >> /tmp/freedombone_mesh
echo '' >> /tmp/freedombone_mesh
echo -n '# configure the wlan interface to operate with ' >> /tmp/freedombone_mesh
echo 'mtus of 1532(batman requires it) and turn enc off ' >> /tmp/freedombone_mesh
echo 'to ensure it works' >> /tmp/freedombone_mesh
echo 'ifconfig wlan0 down' >> /tmp/freedombone_mesh
echo 'ifconfig wlan0 mtu 1532' >> /tmp/freedombone_mesh
echo 'iwconfig wlan0 enc off' >> /tmp/freedombone_mesh
echo '' >> /tmp/freedombone_mesh
echo '# add the interface to the ad-hoc network - or create it.' >> /tmp/freedombone_mesh
echo -n "iwconfig wlan0 mode ad-hoc essid mesh ap " >> /tmp/freedombone_mesh
2015-07-19 20:59:21 +02:00
echo "$BRIDGE_BATMAN_IPV6 channel 2" >> /tmp/freedombone_mesh
echo '' >> /tmp/freedombone_mesh
echo -n '# add wlan0 to the batman-adv virtual interface(so it can ' >> /tmp/freedombone_mesh
echo 'communicate with other batman-adv nodes)' >> /tmp/freedombone_mesh
echo 'batctl if add wlan0' >> /tmp/freedombone_mesh
echo 'ifconfig wlan0 up' >> /tmp/freedombone_mesh
echo 'ifconfig bat0 up' >> /tmp/freedombone_mesh
echo '' >> /tmp/freedombone_mesh
echo '# get the ip address for the node from the bridge connected to the dhcp server' >> /tmp/freedombone_mesh
echo 'dhclient bat0' >> /tmp/freedombone_mesh
echo '' >> /tmp/freedombone_mesh
echo 'exit 0' >> /tmp/freedombone_mesh
chmod +x /tmp/freedombone_mesh
sudo mv /tmp/freedombone_mesh /usr/bin/mesh
}
function show_help {
echo ''
2015-07-19 20:59:21 +02:00
echo 'freedombone-client --bridge-ip [mesh bridge IPv6 address]'
echo ''
exit 0
}
while [[ $# > 1 ]]
do
key="$1"
case $key in
-h|--help)
show_help
;;
2015-07-19 20:59:21 +02:00
--bridge-ip)
shift
2015-07-19 20:59:21 +02:00
BRIDGE_BATMAN_IPV6="$1"
;;
*)
# unknown option
;;
esac
shift
done
2015-01-24 21:02:39 +01:00
echo 'Configuring client'
configure_ssh_client
mesh_batman
2015-01-24 21:02:39 +01:00
echo 'Configuration complete'
2015-07-19 20:59:21 +02:00
if [[ $BRIDGE_BATMAN_IPV6 ]]; then
echo ''
echo 'Type "sudo mesh" to connect to the mesh network'
fi
exit 0