blob: 01a606c32110617930807b21230f9560f6ede667 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
|
#!/bin/sh /etc/rc.common
START=70
EXTRA_COMMANDS=clear_leases
LIMIT_DOWN=0
LIMIT_DOWN_BURST=0
LIMIT_UP=0
TC=/usr/sbin/tc
IPT=/usr/sbin/iptables
IPT6=/usr/sbin/ip6tables
IPT_REPLAY=/var/run/luci_splash.iptlog
LOCK=/var/run/luci_splash.lock
[ -x $IPT6 ] && [ -f /proc/net/ipv6_route ] && HAS_IPV6=1
silent() {
"$@" 2>/dev/null
}
ipt_log() {
$IPT -I "$@"
echo $IPT -D "$@" >> $IPT_REPLAY
}
ipt6_log() {
[ "$HAS_IPV6" = 1 ] || return
$IPT6 -I "$@"
echo $IPT6 -D "$@" >> $IPT_REPLAY
}
iface_add() {
local cfg="$1"
config_get zone "$cfg" zone
[ -n "$zone" ] || return 0
config_get net "$cfg" network
[ -n "$net" ] || return 0
config_get ifname "$net" ifname
[ -n "$ifname" ] || return 0
config_get ipaddr "$net" ipaddr
[ -n "$ipaddr" ] || return 0
config_get netmask "$net" netmask
[ -n "$netmask" ] || return 0
config_get ip6addr "$net" ip6addr
config_get type "$net" type
parentiface="$(uci -q get network.${net}.ifname)"
[ -n "$parentiface" ] && [ ! "$type" = "bridge" ] && {
parentiface=${parentiface#@}
config_get parentproto "$parentiface" proto
config_get parentipaddr "$parentiface" ipaddr
config_get parentnetmask "$parentiface" netmask
}
eval "$(ipcalc.sh $ipaddr $netmask)"
logger -s -p info -t splash "Add $NETWORK/$PREFIX ($ifname) to splashed networks."
### Add interface specific chain entry rules
ipt_log "prerouting_${zone}_rule" -i "${ifname%:*}" -s "$NETWORK/$PREFIX" -j luci_splash_prerouting -t nat
ipt_log "forwarding_${zone}_rule" -i "${ifname%:*}" -s "$NETWORK/$PREFIX" -j luci_splash_forwarding -t filter
if [ "$HAS_IPV6" = 1 ] && [ -n "$ip6addr" ]; then
ipt6_log "forwarding_${zone}_rule" -i "${ifname%:*}" -s "$ip6addr" -j luci_splash_forwarding -t filter
fi
### Allow traffic to the same subnet
$IPT -t nat -I luci_splash_prerouting -d "$ipaddr/${netmask:-32}" -j RETURN
$IPT -t filter -I luci_splash_forwarding -d "$ipaddr/${netmask:-32}" -j RETURN
### Allow traffic to the mesh subnet
[ "$parentproto" = "static" -a -n "$parentipaddr" ] && {
$IPT -t nat -I luci_splash_prerouting -d "$parentipaddr/${parentnetmask:-32}" -j RETURN
$IPT -t filter -I luci_splash_forwarding -d "$parentipaddr/${parentnetmask:-32}" -j RETURN
}
qos_iface_add "$ifname" "$NETWORK" "$PREFIX"
}
iface_del() {
config_get zone "$1" zone
[ -n "$zone" ] || return 0
config_get net "$1" network
[ -n "$net" ] || return 0
config_get ifname "$net" ifname
[ -n "$ifname" ] || return 0
# Clear interface specific rules
[ -s $IPT_REPLAY ] && {
logger -s -p info -t splash "Remove $ifname from splashed networks."
grep -- "-i ${ifname%:*}" $IPT_REPLAY | while read ln; do silent $ln; done
sed -ie "/-i ${ifname%:*}/d" $IPT_REPLAY
}
qos_iface_del "$ifname"
}
mac_add() {
config_get mac "$1" mac
append MACS "$mac"
}
whitelist_add() {
config_get mac "$1" mac
iface=$2
$TC filter add dev "$iface" parent ffff: protocol ip prio 1 u32 match ether src $mac police pass
$TC filter add dev "$iface" parent 1:0 protocol ip prio 1 u32 match ether dst $mac classid 1:1
}
subnet_add() {
local cfg="$1"
config_get ipaddr "$cfg" ipaddr
config_get netmask "$cfg" netmask
[ -n "$ipaddr" ] && {
$IPT -t nat -I luci_splash_prerouting -d "$ipaddr/${netmask:-32}" -j RETURN
$IPT -t filter -I luci_splash_forwarding -d "$ipaddr/${netmask:-32}" -j RETURN
}
}
qos_iface_add() {
local iface="$1"
local network="$2"
local prefix="$3"
# 77 -> download root qdisc
# ffff -> upload root qdisc
silent $TC qdisc del dev "$iface" root handle 1:
silent $TC class del dev "$iface" parent 1: classid 1:ffff
silent $TC class del dev "$iface" parent 1: classid 1:1
silent $TC filter del dev "$iface" parent ffff: protocol ip prio 1 u32
silent $TC filter del dev "$iface" parent ffff: protocol ip prio 2 u32
silent $TC filter del dev "$iface" parent ffff: protocol ip prio 3 u32
if [ "$LIMIT_UP" -gt 0 -a "$LIMIT_DOWN" -gt 0 ]; then
# Setup qdiscs
$TC qdisc add dev "$iface" root handle 1: htb default 1
silent $TC qdisc add dev "$iface" ingress
# Default class - all clients which are not otherwise handled are put in that class
# and share that bandwidth.
$TC class add dev "$iface" parent 1: classid 1:ffff htb rate ${LIMIT_DOWN}kbit
# default class and class for whitelisted clients = unlimited
$TC class add dev "$iface" parent 1: classid 1:1 htb rate 100mbit
# All traffic to the dhcp subnet is put into the limited class
$TC filter add dev "$iface" parent 1:0 protocol ip prio 3 u32 match ip dst $network/$prefix classid 1:ffff
$TC qdisc add dev "$iface" parent 1:ffff sfq perturb 10
$TC filter add dev "$iface" parent ffff: protocol ip prio 3 u32 match ip src $network/$prefix police rate ${LIMIT_UP}kbit mtu 6k burst 6k drop
# classify packets by their iptables MARK set in luci_splash_mark_in (mangle table)
# every client gets his own class and so his own bandwidth limit
$TC filter add dev "$iface" parent 1:0 protocol ip prio 2 fw
config_foreach whitelist_add whitelist $iface
fi
}
qos_iface_del() {
local iface="$1"
silent $TC qdisc del dev "$iface" root handle 77:
}
boot() {
### Setup splash-relay
uci get uhttpd.splash 2>/dev/null || {
uci batch <<EOF
set uhttpd.splash=uhttpd
set uhttpd.splash.home="/www/cgi-bin/splash/"
set uhttpd.splash.interpreter=".sh=/bin/ash"
set uhttpd.splash.listen_http="8082"
set uhttpd.splash.index_page="splash.sh"
set uhttpd.splash.error_page="/splash.sh"
set uhttpd.splash.http_keepalive='0'
commit uhttpd
EOF
}
### We are started by the firewall include
exit 0
}
start() {
lock $LOCK
logger -s -p info -t splash "Starting luci-splash"
include /lib/network
. /lib/functions/network.sh
scan_interfaces
config_load luci_splash
### Find QoS limits
config_get LIMIT_UP general limit_up
config_get LIMIT_DOWN general limit_down
config_get LIMIT_DOWN_BURST general limit_down_burst
LIMIT_UP="$((8*${LIMIT_UP:-0}))"
LIMIT_DOWN="$((8*${LIMIT_DOWN:-0}))"
LIMIT_DOWN_BURST="${LIMIT_DOWN_BURST:+$((8*$LIMIT_DOWN_BURST))}"
LIMIT_DOWN_BURST="${LIMIT_DOWN_BURST:-$(($LIMIT_DOWN / 5 * 6))}"
### Load required modules
[ "$LIMIT_UP" -gt 0 -a "$LIMIT_DOWN" -gt 0 ] && {
silent insmod act_police
silent insmod cls_fw
silent insmod cls_u32
silent insmod sch_htb
silent insmod sch_sfq
silent insmod sch_ingress
}
### Create subchains
$IPT -t nat -N luci_splash_prerouting
$IPT -t nat -N luci_splash_leases
$IPT -t filter -N luci_splash_forwarding
$IPT -t filter -N luci_splash_filter
if [ "$HAS_IPV6" = 1 ]; then
$IPT6 -t filter -N luci_splash_forwarding
$IPT6 -t filter -N luci_splash_filter
fi
### Clear iptables replay log
[ -s $IPT_REPLAY ] && . $IPT_REPLAY
echo -n > $IPT_REPLAY
### Add interface independent prerouting rules
$IPT -t nat -A luci_splash_prerouting -j luci_splash_leases
$IPT -t nat -A luci_splash_leases -p udp --dport 53 -j REDIRECT --to-ports 53
$IPT -t nat -A luci_splash_leases -p tcp --dport 80 -j REDIRECT --to-ports 8082
### Add interface independent forwarding rules
$IPT -t filter -A luci_splash_forwarding -j luci_splash_filter
$IPT -t filter -A luci_splash_filter -p tcp -j REJECT --reject-with tcp-reset
$IPT -t filter -A luci_splash_filter -j REJECT --reject-with icmp-net-prohibited
if [ "$HAS_IPV6" = 1 ]; then
$IPT6 -t filter -A luci_splash_forwarding -j luci_splash_filter
$IPT6 -t filter -A luci_splash_filter -p tcp -j REJECT --reject-with tcp-reset
$IPT6 -t filter -A luci_splash_filter -j REJECT --reject-with adm-prohibited
fi
### Add QoS chain
$IPT -t mangle -N luci_splash_mark_out
$IPT -t mangle -N luci_splash_mark_in
$IPT -t mangle -I PREROUTING -j luci_splash_mark_out
$IPT -t mangle -I POSTROUTING -j luci_splash_mark_in
if [ "$HAS_IPV6" = 1 ]; then
$IPT6 -t mangle -N luci_splash_mark_out
$IPT6 -t mangle -N luci_splash_mark_in
$IPT6 -t mangle -I PREROUTING -j luci_splash_mark_out
$IPT6 -t mangle -I POSTROUTING -j luci_splash_mark_in
fi
### Build the main and portal rule
config_foreach iface_add iface
config_foreach subnet_add subnet
### Add the community homepage to the list of allowed destination subnets
hp=$(uci -q get freifunk.community.homepage) && {
chp=${hp#http*://}
chp=${chp%%/*}
$IPT -t nat -I luci_splash_prerouting -d "${chp}/32" -j RETURN
$IPT -t filter -I luci_splash_forwarding -d "${chp}/32" -j RETURN
}
### Find active mac addresses
MACS=""
config_foreach mac_add blacklist
config_foreach mac_add whitelist
config_load luci_splash_leases
config_foreach mac_add lease
### Add crontab entry
test -f /etc/crontabs/root || touch /etc/crontabs/root
grep -q luci-splash /etc/crontabs/root || {
echo '*/5 * * * * /usr/sbin/luci-splash sync' >> /etc/crontabs/root
}
lock -u $LOCK
### Populate iptables
[ -n "$MACS" ] && luci-splash add-rules $MACS
}
stop() {
lock $LOCK
include /lib/network
scan_interfaces
config_load luci_splash
### Clear interface rules
config_foreach iface_del iface
silent $IPT -t mangle -D PREROUTING -j luci_splash_mark_out
silent $IPT -t mangle -D POSTROUTING -j luci_splash_mark_in
if [ "$HAS_IPV6" = 1 ]; then
silent $IPT6 -t mangle -D PREROUTING -j luci_splash_mark_out
silent $IPT6 -t mangle -D POSTROUTING -j luci_splash_mark_in
fi
### Clear subchains
silent $IPT -t nat -F luci_splash_prerouting
silent $IPT -t nat -F luci_splash_leases
silent $IPT -t filter -F luci_splash_forwarding
silent $IPT -t filter -F luci_splash_filter
silent $IPT -t mangle -F luci_splash_mark_out
silent $IPT -t mangle -F luci_splash_mark_in
if [ "$HAS_IPV6" = 1 ]; then
$IPT6 -t filter -F luci_splash_forwarding
$IPT6 -t filter -F luci_splash_filter
$IPT6 -t mangle -F luci_splash_mark_out
$IPT6 -t mangle -F luci_splash_mark_in
fi
### Delete subchains
silent $IPT -t nat -X luci_splash_prerouting
silent $IPT -t nat -X luci_splash_leases
silent $IPT -t filter -X luci_splash_forwarding
silent $IPT -t filter -X luci_splash_filter
silent $IPT -t mangle -X luci_splash_mark_out
silent $IPT -t mangle -X luci_splash_mark_in
if [ "$HAS_IPV6" = 1 ]; then
$IPT6 -t filter -X luci_splash_forwarding
$IPT6 -t filter -X luci_splash_filter
$IPT6 -t mangle -X luci_splash_mark_out
$IPT6 -t mangle -X luci_splash_mark_in
fi
sed -ie '/\/usr\/sbin\/luci-splash sync/d' /var/spool/cron/crontabs/root
lock -u $LOCK
}
clear_leases() {
### Find active mac addresses
MACS=""
config_foreach mac_add lease
### Clear leases
[ -n "$MACS" ] && luci-splash remove $MACS
}
|