Freifunk:Mesh-VPN Gateway-Server einrichten: Unterschied zwischen den Versionen

Aus Hacksaar Wiki
Zur Navigation springen Zur Suche springen
Zeile 62: Zeile 62:
  
 
== Netzwerk Grundkonfiguration ==
 
== Netzwerk Grundkonfiguration ==
 +
=== Sysctl Einstellungen ===
 
* /etc/sysctl.conf
 
* /etc/sysctl.conf
 
<pre>
 
<pre>
Zeile 81: Zeile 82:
 
net.ipv6.conf.eth0.accept_ra = 0
 
net.ipv6.conf.eth0.accept_ra = 0
 
</pre>
 
</pre>
 +
* Danach neu laden: <code>sysctl -p /etc/sysctl.conf</code>
  
 +
=== Routing Tables erstellen ===
 +
* /etc/iproute2/rt_tables (bisherige Einstellungen beibehalten und folgende hinzufügen)
 +
<pre>
 +
# freifunk
 +
32      saar
 +
33      lux
 +
42      icvpn
 +
</pre>
 +
 +
=== Netzwerkinterafaces einstellen ===
 +
* /etc/network/interfaces (andere Interfaces nach der entsprechenden Konfiguration belassen)
 +
<pre>
 +
#
 +
# FREIFUNK SAAR
 +
#
 +
auto saarBR
 +
iface saarBR inet static
 +
    bridge_ports none
 +
    bridge_fd 0
 +
    bridge_maxwait 0
 +
    address 10.24.192.XXX
 +
    netmask 255.255.192.0
 +
    # be sure all incoming traffic is handled by the appropriate rt_table
 +
    post-up        /sbin/ip rule add iif $IFACE table saar priority 3200
 +
    pre-down        /sbin/ip rule del iif $IFACE table saar priority 3200
 +
    # default route is unreachable
 +
    post-up        /sbin/ip route add unreachable default table saar
 +
    post-down      /sbin/ip route del unreachable default table saar
 +
    # local reachable subnet saar for rt_table lux
 +
    post-up        /sbin/ip route add 10.24.128.0/18 proto static dev $IFACE table lux
 +
    post-down      /sbin/ip route del 10.24.128.0/18 proto static dev $IFACE table lux
 +
 +
iface saarBR inet6 static
 +
    address fd4e:f2d7:88d2:ffff::XXX
 +
    netmask 64
 +
    # be sure all incoming traffic is handled by the appropriate rt_table
 +
    post-up        /sbin/ip -6 rule add iif $IFACE table saar priority 3200
 +
    pre-down        /sbin/ip -6 rule del iif $IFACE table saar priority 3200
 +
    post-up        /sbin/ip -6 route add fe80::/64 proto static dev $IFACE table saar
 +
    post-down      /sbin/ip -6 route del fe80::/64 proto static dev $IFACE table saar
 +
    post-up        /sbin/ip -6 route add fd4e:f2d7:88d2:ffff::/64 proto static dev $IFACE table saar
 +
    post-down      /sbin/ip -6 route del fd4e:f2d7:88d2:ffff::/64 proto static dev $IFACE table saar
 +
    # ULA route mz for rt_table saar
 +
    post-up        /sbin/ip -6 route add fd4e:f2d7:88d2:fffe::/64 proto static dev $IFACE table lux
 +
    post-down      /sbin/ip -6 route del fd4e:f2d7:88d2:fffe::/64 proto static dev $IFACE table lux
 +
 +
allow-hotplug saarMESH
 +
iface saarMESH inet6 manual
 +
    hwaddress ca:fe:ba:be:00:XXX
 +
    pre-up          /sbin/modprobe batman_adv
 +
    post-up        /usr/sbin/batctl -m saarBAT if add $IFACE
 +
    post-up        /sbin/ip link set dev saarBAT up
 +
 +
allow-hotplug saarBAT
 +
iface saarBAT inet6 manual
 +
    pre-up          /sbin/modprobe batman-adv
 +
    post-up        /sbin/brctl addif saarBR $IFACE
 +
    post-up        /usr/sbin/batctl -m $IFACE it 10000
 +
    post-up        /usr/sbin/batctl -m $IFACE vm server
 +
    post-up        /usr/sbin/batctl -m $IFACE gw server  6mbit/6mbit
 +
    pre-down        /sbin/brctl delif saarBR $IFACE || true
 +
 +
#
 +
# FREIFUNK LUX
 +
#
 +
auto luxBR
 +
iface luxBR inet static
 +
    bridge_ports none
 +
    bridge_fd 0
 +
    bridge_maxwait 0
 +
    address 10.24.128.XXX
 +
    netmask 255.255.192.0
 +
    # be sure all incoming traffic is handled by the appropriate rt_table
 +
    post-up        /sbin/ip rule add iif $IFACE table lux priority 3300
 +
    pre-down        /sbin/ip rule del iif $IFACE table lux priority 3300
 +
    # default route is unreachable
 +
    post-up        /sbin/ip route add unreachable default table lux
 +
    post-down      /sbin/ip route del unreachable default table lux
 +
    # local reachable subnet lux for rt_table saar
 +
    post-up        /sbin/ip route add 10.24.192.0/18 proto static dev $IFACE table saar
 +
    post-down      /sbin/ip route del 10.24.192.0/18 proto static dev $IFACE table saar
 +
 +
iface luxBR inet6 static
 +
    address fd4e:f2d7:88d2:fffe::XXX
 +
    netmask 64
 +
    # be sure all incoming traffic is handled by the appropriate rt_table
 +
    post-up        /sbin/ip -6 rule add iif $IFACE table lux priority 3300
 +
    pre-down        /sbin/ip -6 rule del iif $IFACE table lux priority 3300
 +
    post-up        /sbin/ip -6 route add fe80::/64 proto static dev $IFACE table lux
 +
    post-down      /sbin/ip -6 route del fe80::/64 proto static dev $IFACE table lux
 +
    post-up        /sbin/ip -6 route add fd4e:f2d7:88d2:fffe::/64 proto static dev $IFACE table lux
 +
    post-down      /sbin/ip -6 route del fd4e:f2d7:88d2:fffe::/64 proto static dev $IFACE table lux
 +
    # ULA route saar for rt_table lux
 +
    post-up        /sbin/ip -6 route add fd4e:f2d7:88d2:ffff::/64 proto static dev $IFACE table saar
 +
    post-down      /sbin/ip -6 route del fd4e:f2d7:88d2:ffff::/64 proto static dev $IFACE table saar
 +
 +
allow-hotplug luxMESH
 +
iface luxMESH inet6 manual
 +
    hwaddress ca:fe:ba:be:01:XXX
 +
    pre-up          /sbin/modprobe batman_adv
 +
    post-up        /usr/sbin/batctl -m luxBAT if add $IFACE
 +
    post-up        /sbin/ip link set dev luxBAT up
 +
 +
allow-hotplug luxBAT
 +
iface luxBAT inet6 manual
 +
    pre-up          /sbin/modprobe batman-adv
 +
    post-up        /sbin/brctl addif luxBR $IFACE
 +
    post-up        /usr/sbin/batctl -m $IFACE it 10000
 +
    post-up        /usr/sbin/batctl -m $IFACE vm server
 +
    post-up        /usr/sbin/batctl -m $IFACE gw server  6mbit/6mbit
 +
    pre-down        /sbin/brctl delif luxBR $IFACE || true
 +
</pre>
 +
* Jedes Vorkommnis von XXX durch einen entsprechenden Wert aus dem Netzplan ersetzen, im Zweifel TobiT fragen
  
 
== Fastd-Config ==
 
== Fastd-Config ==
* <code>mkdir /etc/fastd/freifunk-{saar,lux}/</code>
 
 
* <code>mkdir /etc/fastd/freifunk-{saar,lux}/</code>
 
* <code>mkdir /etc/fastd/freifunk-{saar,lux}/</code>
 
* Config-Dateien anlegen und entsprechenden Inhalt reinkopieren: TODO Link zu Config-Repo einfügen
 
* Config-Dateien anlegen und entsprechenden Inhalt reinkopieren: TODO Link zu Config-Repo einfügen
 
* Secret Keys aus den Repos besorgen und in secret.conf schreiben
 
* Secret Keys aus den Repos besorgen und in secret.conf schreiben
* Neuen SSH-Key anlegen, als Deploy Key in das Gitlab-Projekt https://git.hacksaar.de/FreifunkSaar/mesh-vpn-peers eintragen.
+
* Neuen SSH-Key anlegen, als Deploy Key in die Gitlab-Projekte https://git.hacksaar.de/FreifunkSaar/mesh-vpn-peers und https://git.hacksaar.de/FreifunkSaar/mesh-vpn-peers-lux eintragen.
 
* Mesh-VPN-Peers-Verzeichnis als "peers" klonen: <code>git clone git@hacksaar.de:FreifunkSaar/mesh-vpn-peers.git peers</code> bzw <code>git clone git@hacksaar.de:FreifunkSaar/mesh-vpn-peers-lux.git peers</code> jeweils im entsprechende Verzeichnis
 
* Mesh-VPN-Peers-Verzeichnis als "peers" klonen: <code>git clone git@hacksaar.de:FreifunkSaar/mesh-vpn-peers.git peers</code> bzw <code>git clone git@hacksaar.de:FreifunkSaar/mesh-vpn-peers-lux.git peers</code> jeweils im entsprechende Verzeichnis
  

Version vom 14. Februar 2015, 15:36 Uhr

Unsere Gateways laufen auf Debian 7 Wheezy.

Installation

Größtenteils egal, wichtig ist folgendes: Root bekommt kein Passwort, dadurch wird der Root-Login gesperrt und man muss sudo benutzen. Als zu installierende Paketgruppen nutzen wir Debian-Standardutilities und SSH-Server.

SSH einrichten

  • Einloggen:
    ssh user@gwX.saar.freifunk.de
  • mkdir .ssh
  • echo "dein_ssh_key" > .ssh/authorized_keys
  • nano /etc/ssh/sshd_config
    Folgende Änderungen vornehmen:
...
PermitRootLogin no
...
PasswordAuthentication no
...
  • Alte Session aktiv lassen, in neuem Terminal versuchen mit Public Key einzuloggen. Wenn nicht erfolgreich debuggen.
  • sudo service ssh restart

Überflüssige Pakete deinstallieren

Da wir eben etwas großzügig waren mit der Installation von Paketgruppen müssen wir jetzt exim und nfs-Kram deinstallieren:

  • sudo apt-get remove exim4* nfs-common rpcbind

Als Resultat sollte bei Ausführung von "sudo netstat -tulpn" keine Programme außer sshd und vielleicht dhclient angezeigt werden.

APT Sources hinzufügen

Wir benötigen die Sources für fastd und batman-adv:

  • nano /etc/apt/sources.list
 deb http://security.debian.org/ wheezy/updates main contrib non-free
 deb-src http://security.debian.org/ wheezy/updates main contrib non-free
  
 # fastd
 deb http://ftp.de.debian.org/debian wheezy-backports main
 deb http://repo.universe-factory.net/debian/ sid main

 # alfred
 deb http://debian.draic.info/ wheezy main
 deb-src http://debian.draic.info/ wheezy main

  • Schlüssel für repo importieren:
  • gpg --keyserver pgpkeys.mit.edu --recv-key B89033D8
  • gpg -a --export B89033D8 | apt-key add -
  • gpg --keyserver pgpkeys.mit.edu --recv-key 16EF3F64CB201D9C
  • gpg -a --export 16EF3F64CB201D9C | apt-key add -

Pakete installieren

  • apt-get update
  • apt-get install batctl batman-adv-dkms fastd bridge-utils
  • echo "batman-adv" >> /etc/modules

Netzwerk Grundkonfiguration

Sysctl Einstellungen

  • /etc/sysctl.conf
# Freifunk specific settings
net.ipv4.ip_forward=1

net.bridge.bridge-nf-call-arptables = 0
net.bridge.bridge-nf-call-ip6tables = 0
net.bridge.bridge-nf-call-iptables = 0

net.ipv6.conf.all.forwarding=1

net.ipv6.conf.all.autoconf = 0
net.ipv6.conf.default.autoconf = 0
net.ipv6.conf.eth0.autoconf = 0

net.ipv6.conf.all.accept_ra = 0
net.ipv6.conf.default.accept_ra = 0
net.ipv6.conf.eth0.accept_ra = 0
  • Danach neu laden: sysctl -p /etc/sysctl.conf

Routing Tables erstellen

  • /etc/iproute2/rt_tables (bisherige Einstellungen beibehalten und folgende hinzufügen)
# freifunk
32      saar
33      lux
42      icvpn

Netzwerkinterafaces einstellen

  • /etc/network/interfaces (andere Interfaces nach der entsprechenden Konfiguration belassen)
#
# FREIFUNK SAAR
#
auto saarBR
iface saarBR inet static
    bridge_ports none
    bridge_fd 0
    bridge_maxwait 0
    address 10.24.192.XXX
    netmask 255.255.192.0
    # be sure all incoming traffic is handled by the appropriate rt_table
    post-up         /sbin/ip rule add iif $IFACE table saar priority 3200
    pre-down        /sbin/ip rule del iif $IFACE table saar priority 3200
    # default route is unreachable
    post-up         /sbin/ip route add unreachable default table saar
    post-down       /sbin/ip route del unreachable default table saar
    # local reachable subnet saar for rt_table lux
    post-up         /sbin/ip route add 10.24.128.0/18 proto static dev $IFACE table lux
    post-down       /sbin/ip route del 10.24.128.0/18 proto static dev $IFACE table lux

iface saarBR inet6 static
    address fd4e:f2d7:88d2:ffff::XXX
    netmask 64
    # be sure all incoming traffic is handled by the appropriate rt_table
    post-up         /sbin/ip -6 rule add iif $IFACE table saar priority 3200
    pre-down        /sbin/ip -6 rule del iif $IFACE table saar priority 3200
    post-up         /sbin/ip -6 route add fe80::/64 proto static dev $IFACE table saar
    post-down       /sbin/ip -6 route del fe80::/64 proto static dev $IFACE table saar
    post-up         /sbin/ip -6 route add fd4e:f2d7:88d2:ffff::/64 proto static dev $IFACE table saar
    post-down       /sbin/ip -6 route del fd4e:f2d7:88d2:ffff::/64 proto static dev $IFACE table saar
    # ULA route mz for rt_table saar
    post-up         /sbin/ip -6 route add fd4e:f2d7:88d2:fffe::/64 proto static dev $IFACE table lux
    post-down       /sbin/ip -6 route del fd4e:f2d7:88d2:fffe::/64 proto static dev $IFACE table lux

allow-hotplug saarMESH
iface saarMESH inet6 manual
    hwaddress ca:fe:ba:be:00:XXX
    pre-up          /sbin/modprobe batman_adv
    post-up         /usr/sbin/batctl -m saarBAT if add $IFACE
    post-up         /sbin/ip link set dev saarBAT up

allow-hotplug saarBAT
iface saarBAT inet6 manual
    pre-up          /sbin/modprobe batman-adv
    post-up         /sbin/brctl addif saarBR $IFACE
    post-up         /usr/sbin/batctl -m $IFACE it 10000
    post-up         /usr/sbin/batctl -m $IFACE vm server
    post-up         /usr/sbin/batctl -m $IFACE gw server  6mbit/6mbit
    pre-down        /sbin/brctl delif saarBR $IFACE || true

#
# FREIFUNK LUX 
#
auto luxBR
iface luxBR inet static
    bridge_ports none
    bridge_fd 0
    bridge_maxwait 0
    address 10.24.128.XXX
    netmask 255.255.192.0
    # be sure all incoming traffic is handled by the appropriate rt_table
    post-up         /sbin/ip rule add iif $IFACE table lux priority 3300
    pre-down        /sbin/ip rule del iif $IFACE table lux priority 3300
    # default route is unreachable
    post-up         /sbin/ip route add unreachable default table lux 
    post-down       /sbin/ip route del unreachable default table lux 
    # local reachable subnet lux for rt_table saar
    post-up         /sbin/ip route add 10.24.192.0/18 proto static dev $IFACE table saar
    post-down       /sbin/ip route del 10.24.192.0/18 proto static dev $IFACE table saar

iface luxBR inet6 static
    address fd4e:f2d7:88d2:fffe::XXX
    netmask 64
    # be sure all incoming traffic is handled by the appropriate rt_table
    post-up         /sbin/ip -6 rule add iif $IFACE table lux priority 3300
    pre-down        /sbin/ip -6 rule del iif $IFACE table lux priority 3300
    post-up         /sbin/ip -6 route add fe80::/64 proto static dev $IFACE table lux 
    post-down       /sbin/ip -6 route del fe80::/64 proto static dev $IFACE table lux 
    post-up         /sbin/ip -6 route add fd4e:f2d7:88d2:fffe::/64 proto static dev $IFACE table lux
    post-down       /sbin/ip -6 route del fd4e:f2d7:88d2:fffe::/64 proto static dev $IFACE table lux
    # ULA route saar for rt_table lux
    post-up         /sbin/ip -6 route add fd4e:f2d7:88d2:ffff::/64 proto static dev $IFACE table saar
    post-down       /sbin/ip -6 route del fd4e:f2d7:88d2:ffff::/64 proto static dev $IFACE table saar

allow-hotplug luxMESH
iface luxMESH inet6 manual
    hwaddress ca:fe:ba:be:01:XXX
    pre-up          /sbin/modprobe batman_adv
    post-up         /usr/sbin/batctl -m luxBAT if add $IFACE
    post-up         /sbin/ip link set dev luxBAT up

allow-hotplug luxBAT
iface luxBAT inet6 manual
    pre-up          /sbin/modprobe batman-adv
    post-up         /sbin/brctl addif luxBR $IFACE
    post-up         /usr/sbin/batctl -m $IFACE it 10000
    post-up         /usr/sbin/batctl -m $IFACE vm server
    post-up         /usr/sbin/batctl -m $IFACE gw server  6mbit/6mbit
    pre-down        /sbin/brctl delif luxBR $IFACE || true
  • Jedes Vorkommnis von XXX durch einen entsprechenden Wert aus dem Netzplan ersetzen, im Zweifel TobiT fragen

Fastd-Config

  • mkdir /etc/fastd/freifunk-{saar,lux}/
  • Config-Dateien anlegen und entsprechenden Inhalt reinkopieren: TODO Link zu Config-Repo einfügen
  • Secret Keys aus den Repos besorgen und in secret.conf schreiben
  • Neuen SSH-Key anlegen, als Deploy Key in die Gitlab-Projekte https://git.hacksaar.de/FreifunkSaar/mesh-vpn-peers und https://git.hacksaar.de/FreifunkSaar/mesh-vpn-peers-lux eintragen.
  • Mesh-VPN-Peers-Verzeichnis als "peers" klonen: git clone git@hacksaar.de:FreifunkSaar/mesh-vpn-peers.git peers bzw git clone git@hacksaar.de:FreifunkSaar/mesh-vpn-peers-lux.git peers jeweils im entsprechende Verzeichnis



To be continued...