Benutzer:Peerco
Aus FunkFeuer Wiki
Version vom 4. Januar 2011, 16:16 Uhr von Peerco (Diskussion | Beiträge)
Inhaltsverzeichnis
Nodes
Servers
Hardware
- WRAP Wireless Router Application Platform
Software
- Nullsoft (Streaming|S as in Soft) Video
- The Winamp TV - NSV - NullSoft Video Streaming Resource
- MPeX.net - MP3 Software, Downloads, Hardware, Anleitungen, Winamp
- Qemu Manager
- Windows Mobile OLSR Daemon
- OLSR for Windows 2000 and Pocket PC
Docs
OpenVPN tunnel
- http://ipkg.funkfeuer.at/autoupdate/freifunk-openwrt-autoupdate-1.7.4.8-0xff-markit-full.trx
- http://ipkg.funkfeuer.at/ipkg/1.6/0xff-openvpn-webif_1.5.3_mipsel.ipk
leider ließ sich http://ipkg.funkfeuer.at/ipkg/1.7/0xff-openvpn-webif_1.7.1_mipsel.ipk nicht installieren
ipkg remove tcpdump
ipkg remove freifunk-tcpdump
ipkg install freifunk-tcpdump
root@gru3ost:~# cat /etc/init.d/S42openvpn [..] #create OpenVPN config cat>$CONFIG_DIR/$VPN_IF.conf<<EOM dev $VPN_IF proto $ff_openvpn_proto remote $ff_openvpn_host port $ff_openvpn_port ifconfig $ff_openvpn_ip $ff_openvpn_netmask route-up /etc/openvpn/openvpn-webif-route-up.sh up /etc/openvpn/openvpn-webif-if-up.sh down /etc/openvpn/openvpn-webif-if-down.sh up-restart
comp-lzo script-security 2
verb 3 EOM [..]
root@gru3ost:~# cat /etc/init.d/S45firewall
[..]
ins_nat() {
LANNAT=
case $WIFIDEV in "");;*)case $LANDEV in "");;*)if ! in_range $LANADR/$LA
NPRE;then
use_nat
# Setup alias and dest nat for an ethernet DMZ PC, e.g.
# 172.31.255.254 on WLAN -> DMZ PC which has 192.168.1.2
# Also add to olsrd.conf: "HNA4 172.31.255.254 255.255.255.255"
IFS=\;
devnum=0
for dmz in $(nvram get ff_dmz); do
src=${dmz%[:,]*}
dst=${dmz#*[:,]}
ip addr add dev $WIFIDEV $src/32 label $WIFIDEV:$devnum
iptables -t nat -I PREROUTING -d $src -j DNAT --to $dst
iptables -I FORWARD -s ! $LANNET/$LANPRE -d $dst -j ACCE
PT
iptables -I FORWARD -s $dst -d ! $LANNET/$LANPRE -j ACCE
PT
iptables -I OUTPUT -o lo -s $src -d $src -j ACCEPT
iptables -I INPUT -i lo -s $src -j ACCEPT
devnum=$(( $devnum + 1 ))
done
unset IFS
case $LANADR in "")
LANNAT=192.168.0.0/16
;;*)
LANNAT=$LANNET/$LANPRE
;;esac
iptables -t nat -I POSTROUTING -o $WIFIDEV -s $LANNAT -d ! $LANN
AT -j MASQUERADE
iptables -t nat -I POSTROUTING -o tap0 -s $LANNAT -d ! $LANNAT -
j MASQUERADE
fi;;esac;;esac
# Mask packets from these WLAN DHCP clients, so they can do
# inet w/o OLSR unless HNA4 is to be used to accomplish this
case $(nvram get ff_wldhcp_hna4) in 1);;*)
ff_wldhcp=$(nvram get ff_wldhcp)
case $ff_wldhcp in "");;*)
use_nat
IFS=\;
for wldhcp in $ff_wldhcp; do
iptables -t nat -I POSTROUTING -s ${wldhcp%[:,]*
} -j MASQUERADE
done
unset IFS
;;esac
;;esac
case $WANDEV in "");;*)if in_range $WANADR/$WANPRE;then
case $LANNAT in "");;*)
iptables -t nat -I POSTROUTING -o $WANDEV -s $LANNAT -d
! $LANNAT -j MASQUERADE
;;esac
else
use_nat
iptables -t nat -I POSTROUTING -o $WANDEV -j MASQUERADE
fi;;esac
}
[..]