X-Git-Url: http://git.grml.org/?a=blobdiff_plain;f=grml-terminalserver;h=b8328e8e57e0a9e3986421933d720ded548c9435;hb=03bd4d097461b19b788b40247ef10885c03be14a;hp=458b203c1a899b6909a2ce058fd64a6f979c0959;hpb=184a9d3153e3fae4fa1ea20a186c12e9c0a83db2;p=grml-terminalserver.git diff --git a/grml-terminalserver b/grml-terminalserver index 458b203..b8328e8 100755 --- a/grml-terminalserver +++ b/grml-terminalserver @@ -1,4 +1,4 @@ -#!/bin/sh +#!/bin/bash # Filename: terminalserver # Purpose: Program to do something # Authors: grml-team (grml.org), (c) Michael Gebetsroither @@ -52,6 +52,7 @@ COMMANDS: SERVICES: tftp Tftp daemon dhcp Dhcp daemon + ipt Iptables setup (snat for clients) nfs All necessary nfs daemons <> ALL services @@ -65,8 +66,13 @@ EOT function killPortmapper { + if [ -f /etc/init.d/portmap ] ; then /etc/init.d/portmap stop >/dev/null &>/dev/null - killall -9 portmap &>/dev/null + elif [ -f /etc/init.d/rpcbind ] ; then + /etc/init.d/rpcbind stop >/dev/null &>/dev/null + fi + killall -9 portmap &>/dev/null + killall -9 rpcbind &>/dev/null } # DHCP SERVICE {{{ @@ -109,8 +115,12 @@ function stopDhcp { start-stop-daemon --stop --quiet --pidfile "$DHCPD_PID_" rm -f $DHCPD_PID_ - rm -f /var/lib/dhcp3/dhcpd.leases* 2>/dev/null #FIXME - touch /var/lib/dhcp3/dhcpd.leases + # ugly but necessary :-/ + find /var/lib/dhcp* -type f -name dhcpd.leases -delete + local dhcpdir + for dhcpdir in /var/lib/dhcp* ; do + touch ${dhcpdir}/dhcpd.leases + done } function startDhcp @@ -131,35 +141,21 @@ function runDhcp sleep 1 startDhcp } +# }}} -# make sure tcp/113 is rejected +# IPTABLES {{{ function runIptables { - if [ -x /sbin/iptables ] ; then - # something keeps answering all tftp requests with auth requests (SYN - # packets to the client tcp/113). Since the PXE client doesn't answer with - # RST, the auth query has to wait until it times out. Forbidding the - # terminalserver to send out packets to tcp/113 via iptables _greatly_ - # speeds up the process. But of course the real fix would be to have grml - # stop sending out auth queries to tftp clients. according to netstat, it - # is in.tftpd itself sending out the auth queries. - # Thanks to Marc Haber and Wolfgang Karall for noticing and current fix. - if iptables -L | grep -q '^REJECT.*tcp dpt:auth reject-with tcp-reset' ; then - echo "Rule for tcp/113 already present, nothing to be done." - else - echo "Rejecting tcp/113 via iptables to speed up booting via PXE, running:" - echo -n '* iptables -A OUTPUT -p tcp --dport 113 -j REJECT --reject-with tcp-reset ... ' - iptables -A OUTPUT -p tcp --dport 113 -j REJECT --reject-with tcp-reset && echo done || echo failed - fi - # deactivate Multicast-DNS - if iptables -L | grep -q '^REJECT.*dpt:mdns reject-with icmp-port-unreachable' ; then - echo "Rule for udp/5353 already present, nothing to be done." - else - echo "Rejecting udp/5353 via iptables for deactivating Multicast-DNS, running:" - echo -n '* iptables -A OUTPUT -p udp -d 224.0.0.0/8 --dport 5353 -j REJECT ... ' - iptables -A OUTPUT -p udp -d 224.0.0.0/8 --dport 5353 -j REJECT && echo done || echo failed - fi - if [ "$NAT_INTERFACE_" != "none" ]; then + if [[ $IPTABLES_SNAT_ != "true" ]]; then + return + fi + startIptables +} + +function startIptables +{ + if [ -x /sbin/iptables ] ; then + if [[ $NAT_INTERFACE_ != "" ]]; then local nat_source_ip_=`netGetIp "$NAT_INTERFACE_" warn` if iptables -t nat -vnL POSTROUTING | grep -q "SNAT.*${NAT_INTERFACE_}.*to:${nat_source_ip_}" ; then @@ -179,9 +175,27 @@ function runIptables echo 1 > /proc/sys/net/ipv4/ip_forward && echo done || echo failed fi fi - else + else warn "iptables executable not avilable" - fi + fi +} + +function stopIptables +{ + if [[ $IPTABLES_SNAT_ != "true" ]]; then + return + fi + if [ -x /sbin/iptables ] ; then + if [[ $NAT_INTERFACE_ != "" ]]; then + local nat_source_ip_=`netGetIp "$NAT_INTERFACE_" warn` + + if iptables -t nat -vnL POSTROUTING | grep -q "SNAT.*${NAT_INTERFACE_}.*to:${nat_source_ip_}" ; then + iptables -t nat -F POSTROUTING &>/dev/null && \ + iptables -t nat -D POSTROUTING -o "$NAT_INTERFACE_" -j SNAT --to-source "$nat_source_ip_" + fi + echo 0 > /proc/sys/net/ipv4/ip_forward + fi + fi } # }}} @@ -194,25 +208,29 @@ function createTftpConf { removeTftpConf - execute "mkdir $TFTPD_DATA_DIR_/pxelinux.cfg" die + execute "mkdir -p $TFTPD_DATA_DIR_/pxelinux.cfg" die execute "install -m 644 /usr/lib/syslinux/pxelinux.0 $TFTPD_DATA_DIR_" die execute "install -m 644 $PATH_/minirt26.gz $TFTPD_DATA_DIR_" die - execute "install -m 644 $KERNEL_IMAGE_ $TFTPD_DATA_DIR_/linux26" die - execute "install -m 644 $MEMTEST_IMAGE_ $TFTPD_DATA_DIR_/memtest" die + if [ -d "$MOUNT_POINT_"/boot/release ] ; then + cp -r "$MOUNT_POINT_"/boot/release "$TFTPD_DATA_DIR_" + else + execute "install -m 644 $KERNEL_IMAGE_ $TFTPD_DATA_DIR_/linux26" die + fi + [ -f "$MEMTEST_IMAGE" ] && execute "install -m 644 $MEMTEST_IMAGE_ $TFTPD_DATA_DIR_/memtest" die execute "install -m 644 $PXE_BOOT_MSG_ $TFTPD_DATA_DIR_" die - execute "install -m 644 $PXE_BOOT_LOGO_ $TFTPD_DATA_DIR_" die + [ -f "$PXE_BOOT_LOGO_" ] && execute "install -m 644 $PXE_BOOT_LOGO_ $TFTPD_DATA_DIR_" die execute "source $TEMPLATE_CONFIG_DIR_/grub-pxelinux_config" die } function stopTftp { - start-stop-daemon --stop --quiet --name "${TFTPD_BIN_##*/}" + start-stop-daemon --stop --quiet -p "$TFTPD_PID_" } function startTftp { test -f $TFTPD_BIN_ || die "could not find \"$TFTPD_BIN_\"" - start-stop-daemon --start --quiet --exec "$TFTPD_BIN_" -- -l -a "$IP_" -s "$TFTPD_DATA_DIR_" || \ + start-stop-daemon --start --quiet --exec "$TFTPD_BIN_" -- --daemon --no-multicast --pidfile "$TFTPD_PID_" --bind-address "$IP_" "$TFTPD_DATA_DIR_" || \ warn "problems starting tftpd server" } function runTftp @@ -227,20 +245,27 @@ function runTftp # NFS {{{ function createNfsConfig { - execute "exportfs -o ro,no_root_squash,async,nohide $NETWORK_/$NETMASK_:$MOUNT_POINT_" warn + execute "exportfs -o ro,no_root_squash,async,nohide,fsid=42 $NETWORK_/$NETMASK_:$MOUNT_POINT_" warn } function removeNfsConfig { - execute "exportfs -u -o ro,no_root_squash,async,nohide $NETWORK_/$NETMASK_:$MOUNT_POINT_" warn + execute "exportfs -u -o ro,no_root_squash,async,nohide,fsid=42 $NETWORK_/$NETMASK_:$MOUNT_POINT_" warn } function startNfs { - /etc/init.d/portmap start + if [ -f /etc/init.d/portmap ] ; then + /etc/init.d/portmap start + elif [ -f /etc/init.d/rpcbind ] ; then + /etc/init.d/rpcbind start + else + echo "Warning: Could not start portmapper/rpcbind" >&2 + fi /etc/init.d/nfs-common start # FIXME /etc/init.d/nfs-kernel-server start $USR_SHARE_/nfs-kernel-server start + echo createNfsConfig } @@ -281,13 +306,14 @@ function actionStart runIptables echo "Finally starting nfs services..." - startNfs && echo "Sucessfully finished startup of grml-terminalserver." || echo 'Startup of grml-terminalserver-config failed!' + startNfs && echo "Successfully finished startup of grml-terminalserver." || echo 'Startup of grml-terminalserver failed!' } function actionStop { stopTftp stopDhcp + stopIptables stopNfs notice "Terminal-server stopped" } @@ -322,6 +348,7 @@ function serviceStart "") actionStart ;; tftp) runTftp ;; dhcp) runDhcp ;; + ipt) startIptables ;; nfs) startNfs ;; *) warn "Service $service_ not available" ;; esac @@ -335,6 +362,7 @@ function serviceStop "") actionStop ;; tftp) stopTftp ;; dhcp) stopDhcp ;; + ipt) stopIptables ;; nfs) stopNfs ;; *) warn "Service $service_ not available" ;; esac