2022-07-25 12:42:33 +00:00
|
|
|
#! /bin/bash
|
|
|
|
|
|
|
|
# - Take over 10.11.0.1.
|
|
|
|
# - Force default route to NordLynx
|
|
|
|
|
2022-07-28 13:33:08 +00:00
|
|
|
TOR_GW="172.20.0.111"
|
|
|
|
VPN_GW="172.20.0.254"
|
|
|
|
|
2022-07-25 12:42:33 +00:00
|
|
|
devbyip()
|
|
|
|
{
|
2022-07-28 13:33:08 +00:00
|
|
|
echo "$(ip addr show | grep -F "inet $1" | head) | awk '{ print $7; }'"
|
|
|
|
}
|
|
|
|
|
|
|
|
# Stop routing via VPN
|
|
|
|
vpn_unset()
|
|
|
|
{
|
|
|
|
ip route del default via "${VPN_GW}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# Start routing via VPN
|
|
|
|
vpn_set()
|
|
|
|
{
|
|
|
|
ip route add default via "${VPN_GW}"
|
|
|
|
}
|
|
|
|
|
|
|
|
tor_unset()
|
|
|
|
{
|
|
|
|
unset IS_SET_TOR
|
|
|
|
ip route del default via "${TOR_GW}"
|
|
|
|
}
|
|
|
|
|
|
|
|
tor_set()
|
|
|
|
{
|
|
|
|
IS_SET_TOR=1
|
|
|
|
ip route add default via "${TOR_GW}"
|
|
|
|
}
|
|
|
|
|
|
|
|
monitor_failover()
|
|
|
|
{
|
|
|
|
# ts=$(date +%s)
|
|
|
|
|
|
|
|
while :; do
|
|
|
|
if [[ -n $IS_SET_TOR ]]; then
|
|
|
|
# HERE: TOR is set
|
|
|
|
if [[ -f /sf/run/vpn/vpn_status ]]; then
|
|
|
|
# HERE: VPN is back
|
|
|
|
echo -e >&2 "$(date) WARN: Switching route to VPN."
|
|
|
|
tor_unset
|
|
|
|
vpn_set
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
# HERE: TOR is NOT set
|
|
|
|
# Run a ping test. On failure
|
|
|
|
if [[ ! -f /sf/run/vpn/vpn_status ]]; then
|
|
|
|
# HERE: VPN is gone
|
|
|
|
echo -e >&2 "$(date) WARN: Switching route to TOR."
|
|
|
|
vpn_unset
|
|
|
|
tor_set
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
sleep 5
|
|
|
|
done
|
2022-07-25 12:42:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
DEV="$(devbyip 10.11.)"
|
|
|
|
[[ -z $DEV ]] && { echo -e >&2 "DEV not found. Using DEV=eth1"; DEV="eth1"; }
|
|
|
|
|
|
|
|
DEV_GW="$(devbyip 172.20.0.)"
|
|
|
|
[[ -z $DEV_GW ]] && { echo -e >&2 "DEV not found. Using DEV_GW=eth0"; DEV_GW="eth0"; }
|
|
|
|
|
|
|
|
[[ -n $SF_DEBUG ]] && {
|
|
|
|
ip link show >&2
|
|
|
|
ip addr show >&2
|
|
|
|
ip route show >&2
|
|
|
|
|
|
|
|
echo >&2 "DEV=${DEV} DEV_GW=${DEV_GW}"
|
|
|
|
}
|
|
|
|
|
|
|
|
ip route del default && \
|
|
|
|
ifconfig "$DEV" 10.11.0.1/16 && \
|
2022-07-28 13:33:08 +00:00
|
|
|
# MASQ all traffic because the VPN/TOR systems dont know the route back
|
|
|
|
# to sf-guest (10.11.0.0/16).
|
2022-07-25 12:42:33 +00:00
|
|
|
iptables -t nat -A POSTROUTING -o "${DEV_GW}" -j MASQUERADE && \
|
2022-07-28 13:33:08 +00:00
|
|
|
# TOR traffic (10.111.0.0/16) always goes to TOR (transparent proxy)
|
|
|
|
ip route add 10.111.0.0/16 via "${TOR_GW}" && \
|
2022-07-27 14:26:03 +00:00
|
|
|
echo -e >&2 "FW: SUCCESS" && \
|
|
|
|
|
|
|
|
/tc.sh "${DEV_GW}" "${DEV}" && \
|
|
|
|
echo -e >&2 "TC: SUCCESS" && \
|
|
|
|
|
2022-07-28 13:33:08 +00:00
|
|
|
# By default go via TOR until vpn_status exists
|
|
|
|
tor_set
|
|
|
|
monitor_failover
|
2022-07-25 12:42:33 +00:00
|
|
|
# Sleep forever. This allows admin to attach to router
|
|
|
|
# and muddle with Traffic Control
|
2022-07-28 13:33:08 +00:00
|
|
|
# exec -a "[sf-router] sleep" sleep infinity
|
2022-07-25 12:42:33 +00:00
|
|
|
|
2022-07-27 14:26:03 +00:00
|
|
|
ip route del default
|
2022-07-25 12:42:33 +00:00
|
|
|
echo -e >&2 "FAILED to set routes"
|
|
|
|
exit 250
|
|
|
|
|