X-Git-Url: http://git.grml.org/?a=blobdiff_plain;f=grml-terminalserver;h=458b203c1a899b6909a2ce058fd64a6f979c0959;hb=744835b3f429c89983adc3d83c27f5a1baebb7fe;hp=20bfe2937ffc63ca2388ca70556d0d2b13d51249;hpb=33f3e8b9ad7534baf738cc239e750e76c18055a1;p=grml-terminalserver.git diff --git a/grml-terminalserver b/grml-terminalserver index 20bfe29..458b203 100755 --- a/grml-terminalserver +++ b/grml-terminalserver @@ -135,21 +135,50 @@ function runDhcp # make sure tcp/113 is rejected function runIptables { - # something keeps answering all tftp requests with auth requests (SYN - # packets to the client tcp/113). Since the PXE client doesn't answer with - # RST, the auth query has to wait until it times out. Forbidding the - # terminalserver to send out packets to tcp/113 via iptables _greatly_ - # speeds up the process. But of course the real fix would be to have grml - # stop sending out auth queries to tftp clients. according to netstat, it - # is in.tftpd itself sending out the auth queries. - # Thanks to Marc Haber and Wolfgang Karall for noticing and current fix. if [ -x /sbin/iptables ] ; then - if iptables -L | grep -q '^REJECT.*tcp-reset' ; then + # something keeps answering all tftp requests with auth requests (SYN + # packets to the client tcp/113). Since the PXE client doesn't answer with + # RST, the auth query has to wait until it times out. Forbidding the + # terminalserver to send out packets to tcp/113 via iptables _greatly_ + # speeds up the process. But of course the real fix would be to have grml + # stop sending out auth queries to tftp clients. according to netstat, it + # is in.tftpd itself sending out the auth queries. + # Thanks to Marc Haber and Wolfgang Karall for noticing and current fix. + if iptables -L | grep -q '^REJECT.*tcp dpt:auth reject-with tcp-reset' ; then echo "Rule for tcp/113 already present, nothing to be done." else - echo -n "Rejecting tcp/113 via iptables to speed up speed up booting via PXE: " + echo "Rejecting tcp/113 via iptables to speed up booting via PXE, running:" + echo -n '* iptables -A OUTPUT -p tcp --dport 113 -j REJECT --reject-with tcp-reset ... ' iptables -A OUTPUT -p tcp --dport 113 -j REJECT --reject-with tcp-reset && echo done || echo failed fi + # deactivate Multicast-DNS + if iptables -L | grep -q '^REJECT.*dpt:mdns reject-with icmp-port-unreachable' ; then + echo "Rule for udp/5353 already present, nothing to be done." + else + echo "Rejecting udp/5353 via iptables for deactivating Multicast-DNS, running:" + echo -n '* iptables -A OUTPUT -p udp -d 224.0.0.0/8 --dport 5353 -j REJECT ... ' + iptables -A OUTPUT -p udp -d 224.0.0.0/8 --dport 5353 -j REJECT && echo done || echo failed + fi + if [ "$NAT_INTERFACE_" != "none" ]; then + local nat_source_ip_=`netGetIp "$NAT_INTERFACE_" warn` + + if iptables -t nat -vnL POSTROUTING | grep -q "SNAT.*${NAT_INTERFACE_}.*to:${nat_source_ip_}" ; then + echo "Rule for SNAT already present, nothing to be done." + else + echo "Setting up SNAT for terminalserver clients on ${NAT_INTERFACE_}:" + echo "* iptables -t nat -F POSTROUTING" + echo -n "* iptables -t nat -A POSTROUTING -o $NAT_INTERFACE_ -j SNAT --to-source $nat_source_ip_ ... " + { iptables -t nat -F POSTROUTING && \ + iptables -t nat -A POSTROUTING -o "$NAT_INTERFACE_" -j SNAT --to-source "$nat_source_ip_" ; } && \ + echo done || echo failed + fi + if [ `cat /proc/sys/net/ipv4/ip_forward` -eq 1 ]; then + echo "IP-Forwarding already enabled, nothing to be done." + else + echo -n "Enabling IP-Forwarding: " + echo 1 > /proc/sys/net/ipv4/ip_forward && echo done || echo failed + fi + fi else warn "iptables executable not avilable" fi