2018-03-30 07:52:49 +00:00
#!/bin/sh
SHADOWSOCKS_PASS = ${ SHADOWSOCKS_PASS :- $( head -c 32 /dev/urandom | base64 -w0) }
2019-10-22 19:55:58 +00:00
GLORYTUN_PASS = ${ GLORYTUN_PASS :- $( od -vN "32" -An -tx1 /dev/urandom | tr '[:lower:]' '[:upper:]' | tr -d " \n" ) }
DSVPN_PASS = ${ DSVPN_PASS :- $( od -vN "32" -An -tx1 /dev/urandom | tr '[:lower:]' '[:upper:]' | tr -d " \n" ) }
2018-03-30 07:52:49 +00:00
#NBCPU=${NBCPU:-$(nproc --all | tr -d "\n")}
NBCPU = ${ NBCPU :- $( grep -c '^processor' /proc/cpuinfo | tr -d "\n" ) }
2019-01-14 17:15:38 +00:00
OBFS = ${ OBFS :- yes }
2019-02-10 07:46:29 +00:00
V2RAY = ${ V2RAY :- yes }
2019-05-12 02:45:49 +00:00
TLS = ${ TLS :- yes }
2018-11-28 21:18:35 +00:00
OMR_ADMIN = ${ OMR_ADMIN :- yes }
2019-03-18 10:31:47 +00:00
OMR_ADMIN_PASS = ${ OMR_ADMIN_PASS :- $( od -vN "32" -An -tx1 /dev/urandom | tr '[:lower:]' '[:upper:]' | tr -d " \n" ) }
2019-01-14 17:15:38 +00:00
MLVPN = ${ MLVPN :- yes }
2018-11-28 21:18:35 +00:00
MLVPN_PASS = ${ MLVPN_PASS :- $( head -c 32 /dev/urandom | base64 -w0) }
2019-01-14 17:15:38 +00:00
OPENVPN = ${ OPENVPN :- yes }
2019-09-16 05:58:58 +00:00
DSVPN = ${ DSVPN :- yes }
2019-03-18 10:31:47 +00:00
INTERFACE = ${ INTERFACE :- $( ip -o -4 route show to default | grep -m 1 -Po '(?<=dev )(\S+)' | tr -d "\n" ) }
2019-10-25 18:19:48 +00:00
KERNEL_VERSION = "4.19.78"
KERNEL_PACKAGE_VERSION = "1.5+4e10ec5"
2019-10-22 19:55:58 +00:00
KERNEL_RELEASE = " ${ KERNEL_VERSION } -mptcp_ ${ KERNEL_PACKAGE_VERSION } "
2019-10-25 18:19:48 +00:00
GLORYTUN_UDP_VERSION = "8bd936929e98b202c0988c6d9757903661750a7c"
2018-11-30 09:31:36 +00:00
MLVPN_VERSION = "8f9720978b28c1954f9f229525333547283316d2"
2019-01-14 17:15:38 +00:00
OBFS_VERSION = "5cbfdcc28cdc912852cc3c99e3c7f5603d337805"
2019-10-25 18:24:44 +00:00
OMR_ADMIN_VERSION = "9ac484ebfdcbf211e7595c50c6e8ced3c779ffbc"
2019-09-16 05:58:58 +00:00
DSVPN_VERSION = "57fb1bd5baf87c1e9b03833eb641897cab972895"
#V2RAY_VERSION="v1.1.0"
V2RAY_VERSION = "v1.1.0-9-g2e56b2b"
2019-10-25 18:19:48 +00:00
EASYRSA_VERSION = "3.0.6"
SHADOWSOCKS_VERSION = "3.3.2"
2019-08-02 15:34:06 +00:00
VPS_DOMAIN = ${ VPS_DOMAIN :- $( wget -4 -qO- -T 2 http://hostname.openmptcprouter.com) }
2019-10-25 18:19:48 +00:00
VPSPATH = "server-test"
2019-05-12 02:45:49 +00:00
2019-10-25 18:19:48 +00:00
OMR_VERSION = "0.1002"
2018-03-30 07:52:49 +00:00
set -e
umask 0022
2019-03-12 00:35:49 +00:00
export LC_ALL = C
2019-07-21 07:04:36 +00:00
export PATH = $PATH :/sbin
export DEBIAN_FRONTEND = noninteractive
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-09-16 05:58:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-11-30 09:31:36 +00:00
2018-11-12 18:27:32 +00:00
# Check Linux version
if test -f /etc/os-release ; then
. /etc/os-release
else
. /usr/lib/os-release
fi
2019-07-21 07:04:36 +00:00
if [ " $ID " = "debian" ] && [ " $VERSION_ID " != "9" ] && [ " $VERSION_ID " != "10" ] ; then
echo "This script only work with Debian Stretch (9.x) or Debian Buster (10.x)"
2018-05-04 06:28:28 +00:00
exit 1
2019-09-16 05:58:58 +00:00
elif [ " $ID " = "ubuntu" ] && [ " $VERSION_ID " != "18.04" ] && [ " $VERSION_ID " != "19.04" ] ; then
echo "This script only work with Ubuntu 18.04 or Ubuntu 19.04"
2018-11-12 18:27:32 +00:00
exit 1
elif [ " $ID " != "debian" ] && [ " $ID " != "ubuntu" ] ; then
2019-09-16 05:58:58 +00:00
echo "This script only work with Ubuntu 18.04, Ubuntu 19.04, Debian Stretch (9.x) or Debian Buster (10.x)"
2018-11-12 18:27:32 +00:00
exit 1
2018-05-04 06:28:28 +00:00
fi
2018-11-12 18:27:32 +00:00
2018-06-08 15:17:06 +00:00
# Fix old string...
2018-11-12 18:27:32 +00:00
if [ -f /etc/motd ] && grep --quiet 'OpenMPCTProuter VPS' /etc/motd ; then
2018-06-08 15:17:06 +00:00
sed -i 's/OpenMPCTProuter/OpenMPTCProuter/g' /etc/motd
fi
2019-01-02 08:57:31 +00:00
if [ -f /etc/motd.head ] && grep --quiet 'OpenMPCTProuter VPS' /etc/motd.head ; then
sed -i 's/OpenMPCTProuter/OpenMPTCProuter/g' /etc/motd.head
fi
2018-11-12 18:27:32 +00:00
2018-11-01 08:29:02 +00:00
# Check if OpenMPTCProuter VPS is already installed
2018-11-12 18:27:32 +00:00
update = "0"
if [ -f /etc/motd ] && grep --quiet 'OpenMPTCProuter VPS' /etc/motd ; then
2018-06-05 15:25:30 +00:00
update = "1"
2018-11-12 18:27:32 +00:00
elif [ -f /etc/motd.head ] && grep --quiet 'OpenMPTCProuter VPS' /etc/motd.head ; then
2018-11-01 08:29:02 +00:00
update = "1"
2018-11-12 18:27:32 +00:00
elif [ -f /root/openmptcprouter_config.txt ] ; then
2018-10-26 13:43:57 +00:00
update = "1"
fi
2018-11-12 18:27:32 +00:00
2019-04-03 11:44:07 +00:00
apt-get update
2019-07-21 07:04:36 +00:00
apt-get -y install apt-transport-https gnupg
2019-04-03 11:44:07 +00:00
# Add OpenMPTCProuter repo
echo 'deb https://repo.openmptcprouter.com stretch main' > /etc/apt/sources.list.d/openmptcprouter.list
cat <<EOF | tee /etc/apt/preferences.d/openmptcprouter.pref
Explanation: Prefer OpenMPTCProuter provided packages over the Debian native ones
Package: *
Pin: origin repo.openmptcprouter.com
Pin-Priority: 1001
EOF
wget -O - http://repo.openmptcprouter.com/openmptcprouter.gpg.key | apt-key add -
2018-03-30 07:52:49 +00:00
# Install mptcp kernel and shadowsocks
apt-get update
2018-04-03 08:10:52 +00:00
apt-get -y install dirmngr patch
2018-03-30 07:52:49 +00:00
#apt-key adv --keyserver hkp://keys.gnupg.net --recv-keys 379CE192D401AB61
2018-11-12 18:27:32 +00:00
if [ " $ID " = "debian" ] ; then
2019-07-21 07:04:36 +00:00
if [ " $VERSION_ID " = "9" ] ; then
#echo 'deb http://dl.bintray.com/cpaasch/deb jessie main' >> /etc/apt/sources.list
echo 'deb http://deb.debian.org/debian stretch-backports main' > /etc/apt/sources.list.d/stretch-backports.list
fi
2018-11-12 18:27:32 +00:00
elif [ " $ID " = "ubuntu" ] ; then
echo 'deb http://archive.ubuntu.com/ubuntu bionic-backports main' > /etc/apt/sources.list.d/bionic-backports.list
echo 'deb http://archive.ubuntu.com/ubuntu bionic universe' > /etc/apt/sources.list.d/bionic-universe.list
fi
2018-03-30 07:52:49 +00:00
apt-get update
2019-04-03 11:44:07 +00:00
wget -O /tmp/linux-image-${ KERNEL_RELEASE } _amd64.deb https://www.openmptcprouter.com/kernel/linux-image-${ KERNEL_RELEASE } _amd64.deb
wget -O /tmp/linux-headers-${ KERNEL_RELEASE } _amd64.deb https://www.openmptcprouter.com/kernel/linux-headers-${ KERNEL_RELEASE } _amd64.deb
2018-05-14 20:08:27 +00:00
# Rename bzImage to vmlinuz, needed when custom kernel was used
2018-05-13 17:27:52 +00:00
cd /boot
2019-01-02 08:57:31 +00:00
apt-get -y install rename curl
2018-05-14 20:28:34 +00:00
rename 's/^bzImage/vmlinuz/s' * >/dev/null 2>& 1
2018-03-30 07:52:49 +00:00
#apt-get -y install linux-mptcp
2019-09-16 05:58:58 +00:00
#dpkg --remove --force-remove-reinstreq linux-image-${KERNEL_VERSION}-mptcp
#dpkg --remove --force-remove-reinstreq linux-headers-${KERNEL_VERSION}-mptcp
2019-10-22 19:55:58 +00:00
if [ " $( dpkg -l | grep linux-image-${ KERNEL_VERSION } | grep ${ KERNEL_PACKAGE_VERSION } ) " = "" ] ; then
echo " Install kernel linux-image- ${ KERNEL_RELEASE } "
echo " if kernel install fail run: dpkg --remove --force-remove-reinstreq linux-image- ${ KERNEL_VERSION } -mptcp "
dpkg --force-all -i -B /tmp/linux-image-${ KERNEL_RELEASE } _amd64.deb
dpkg --force-all -i -B /tmp/linux-headers-${ KERNEL_RELEASE } _amd64.deb
fi
2018-03-30 07:52:49 +00:00
2018-06-01 13:11:58 +00:00
# Check if mptcp kernel is grub default kernel
2018-06-04 10:33:15 +00:00
echo "Set MPTCP kernel as grub default..."
2019-10-25 18:19:48 +00:00
wget -O /tmp/update-grub.sh https://www.openmptcprouter.com/${ VPSPATH } /update-grub.sh
2018-06-01 13:11:58 +00:00
cd /tmp
2019-04-30 04:14:41 +00:00
bash update-grub.sh ${ KERNEL_VERSION } -mptcp
2019-01-14 17:15:38 +00:00
bash update-grub.sh ${ KERNEL_RELEASE }
2018-05-13 17:27:52 +00:00
2019-04-03 11:44:07 +00:00
echo "Install tracebox and iperf3 OpenMPTCProuter edition"
apt-get -y -o Dpkg::Options::= "--force-overwrite" install tracebox omr-iperf3
2018-03-30 07:52:49 +00:00
#apt -t stretch-backports -y install shadowsocks-libev
## Compile Shadowsocks
2018-11-30 09:31:36 +00:00
rm -rf /tmp/shadowsocks-libev-${ SHADOWSOCKS_VERSION }
wget -O /tmp/shadowsocks-libev-${ SHADOWSOCKS_VERSION } .tar.gz http://github.com/shadowsocks/shadowsocks-libev/releases/download/v${ SHADOWSOCKS_VERSION } /shadowsocks-libev-${ SHADOWSOCKS_VERSION } .tar.gz
2018-03-30 07:52:49 +00:00
cd /tmp
2018-11-30 09:31:36 +00:00
tar xzf shadowsocks-libev-${ SHADOWSOCKS_VERSION } .tar.gz
cd shadowsocks-libev-${ SHADOWSOCKS_VERSION }
2018-06-11 14:53:08 +00:00
wget https://raw.githubusercontent.com/Ysurac/openmptcprouter-feeds/master/shadowsocks-libev/patches/020-NOCRYPTO.patch
2018-03-30 07:52:49 +00:00
patch -p1 < 020-NOCRYPTO.patch
2019-01-14 17:15:38 +00:00
# Shadowsocks eBPF support
#wget https://raw.githubusercontent.com/Ysurac/openmptcprouter-feeds/master/shadowsocks-libev/patches/030-eBPF.patch
#patch -p1 < 030-eBPF.patch
#rm -f /var/lib/dpkg/lock
#apt-get install -y --no-install-recommends build-essential git ca-certificates libcap-dev libelf-dev libpcap-dev
#cd /tmp
#rm -rf libbpf
#git clone https://github.com/libbpf/libbpf.git
#cd libbpf
#if [ "$ID" = "debian" ]; then
# rm -f /var/lib/dpkg/lock
# apt -y -t stretch-backports install linux-libc-dev
#elif [ "$ID" = "ubuntu" ]; then
# rm -f /var/lib/dpkg/lock
# apt-get -y install linux-libc-dev
#fi
#BUILD_SHARED=y make -C src CFLAGS="$CFLAGS -DCOMPAT_NEED_REALLOCARRAY"
#cp /tmp/libbpf/src/libbpf.so /usr/lib
#cp /tmp/libbpf/src/*.h /usr/include/bpf
#cd /tmp
#rm -rf /tmp/libbpf
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2019-04-03 12:09:47 +00:00
apt-get -y install --no-install-recommends devscripts equivs apg libcap2-bin libpam-cap libc-ares2 libc-ares-dev libev4 haveged
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-11-12 18:27:32 +00:00
systemctl enable haveged
if [ " $ID " = "debian" ] ; then
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2019-07-21 07:04:36 +00:00
if [ " $VERSION_ID " = "9" ] ; then
apt -y -t stretch-backports install libsodium-dev
else
apt -y install libsodium-dev
fi
2018-11-12 18:27:32 +00:00
elif [ " $ID " = "ubuntu" ] ; then
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-11-12 18:27:32 +00:00
apt-get -y install libsodium-dev
systemctl enable haveged
fi
2019-01-14 17:15:38 +00:00
cd /tmp/shadowsocks-libev-${ SHADOWSOCKS_VERSION }
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-05-04 06:28:28 +00:00
mk-build-deps --install --tool "apt-get -o Debug::pkgProblemResolver=yes --no-install-recommends -y"
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-03-30 07:52:49 +00:00
dpkg-buildpackage -b -us -uc
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2019-01-14 17:15:38 +00:00
cd /tmp
2018-11-30 09:31:36 +00:00
dpkg -i shadowsocks-libev_${ SHADOWSOCKS_VERSION } -1_amd64.deb
2019-01-14 17:15:38 +00:00
#mkdir -p /usr/lib/shadowsocks-libev
#cp -f /tmp/shadowsocks-libev-${SHADOWSOCKS_VERSION}/src/*.ebpf /usr/lib/shadowsocks-libev
2018-11-30 09:31:36 +00:00
rm -rf /tmp/shadowsocks-libev-${ SHADOWSOCKS_VERSION }
2018-03-30 07:52:49 +00:00
# Load OLIA Congestion module at boot time
if ! grep -q olia /etc/modules ; then
echo mptcp_olia >> /etc/modules
fi
2018-11-28 21:18:35 +00:00
# Load WVEGAS Congestion module at boot time
if ! grep -q wvegas /etc/modules ; then
echo mptcp_wvegas >> /etc/modules
fi
# Load BALIA Congestion module at boot time
if ! grep -q balia /etc/modules ; then
echo mptcp_balia >> /etc/modules
fi
2018-08-02 13:14:16 +00:00
# Load BBR Congestion module at boot time
if ! grep -q bbr /etc/modules ; then
echo tcp_bbr >> /etc/modules
fi
2019-09-16 05:58:58 +00:00
# Load mctcpdesync Congestion module at boot time
if ! grep -q mctcp_desync /etc/modules ; then
echo mctcp_desync >> /etc/modules
fi
2018-03-30 07:52:49 +00:00
2018-11-28 21:18:35 +00:00
if systemctl -q is-active omr-admin.service; then
systemctl -q stop omr-admin > /dev/null 2>& 1
fi
if [ " $OMR_ADMIN " = "yes" ] ; then
echo 'Install OpenMPTCProuter VPS Admin'
2019-03-22 02:38:17 +00:00
apt-get -y install unzip gunicorn python3-flask-restful python3-openssl python3-pip python3-setuptools python3-wheel
2019-10-25 18:19:48 +00:00
pip3 -q install flask-jwt-simple netjsonconfig
2018-11-28 21:18:35 +00:00
mkdir -p /etc/openmptcprouter-vps-admin
2019-10-25 18:19:48 +00:00
mkdir -p /var/opt/openmptcprouter
wget -O /lib/systemd/system/omr-admin.service https://www.openmptcprouter.com/${ VPSPATH } /omr-admin.service.in
2019-01-14 17:15:38 +00:00
wget -O /tmp/openmptcprouter-vps-admin.zip https://github.com/Ysurac/openmptcprouter-vps-admin/archive/${ OMR_ADMIN_VERSION } .zip
2018-11-28 21:18:35 +00:00
cd /tmp
unzip -q -o openmptcprouter-vps-admin.zip
if [ -f /usr/local/bin/omr-admin.py ] ; then
2019-01-14 17:15:38 +00:00
cp /tmp/openmptcprouter-vps-admin-${ OMR_ADMIN_VERSION } /omr-admin.py /usr/local/bin/
2018-11-29 08:10:52 +00:00
OMR_ADMIN_PASS = $( grep -Po '"pass":.*?[^\\]"' /etc/openmptcprouter-vps-admin/omr-admin-config.json | awk -F':' '{print $2}' | sed 's/"//g' )
2018-11-28 21:18:35 +00:00
else
2019-01-14 17:15:38 +00:00
sed -i " s:MySecretKey: $OMR_ADMIN_PASS :g " /tmp/openmptcprouter-vps-admin-${ OMR_ADMIN_VERSION } /omr-admin-config.json
cp /tmp/openmptcprouter-vps-admin-${ OMR_ADMIN_VERSION } /omr-admin-config.json /etc/openmptcprouter-vps-admin/
cp /tmp/openmptcprouter-vps-admin-${ OMR_ADMIN_VERSION } /omr-admin.py /usr/local/bin/
2018-11-28 21:18:35 +00:00
cd /etc/openmptcprouter-vps-admin
openssl req -new -newkey rsa:2048 -days 365 -nodes -x509 -keyout key.pem -out cert.pem -subj "/C=US/ST=Oregon/L=Portland/O=OpenMPTCProuterVPS/OU=Org/CN=www.openmptcprouter.vps"
fi
chmod u+x /usr/local/bin/omr-admin.py
systemctl enable omr-admin.service
2019-01-14 17:15:38 +00:00
rm -rf /tmp/tmp/openmptcprouter-vps-admin-${ OMR_ADMIN_VERSION }
2018-11-28 21:18:35 +00:00
fi
2018-03-30 07:52:49 +00:00
# Get shadowsocks optimization
2019-10-25 18:19:48 +00:00
wget -O /etc/sysctl.d/90-shadowsocks.conf https://www.openmptcprouter.com/${ VPSPATH } /shadowsocks.conf
2018-03-30 07:52:49 +00:00
# Install shadowsocks config and add a shadowsocks by CPU
2018-06-05 15:25:30 +00:00
if [ " $update " = "0" ] ; then
2019-10-25 18:19:48 +00:00
wget -O /etc/shadowsocks-libev/config.json https://www.openmptcprouter.com/${ VPSPATH } /config.json
2018-06-04 10:33:15 +00:00
SHADOWSOCKS_PASS_JSON = $( echo $SHADOWSOCKS_PASS | sed 's/+/-/g; s/\//_/g;' )
sed -i " s:MySecretKey: $SHADOWSOCKS_PASS_JSON :g " /etc/shadowsocks-libev/config.json
fi
2019-09-16 05:58:58 +00:00
[ ! -f /etc/shadowsocks-libev/local.acl ] && touch /etc/shadowsocks-libev/local.acl
2018-08-02 13:14:16 +00:00
sed -i 's:aes-256-cfb:chacha20:g' /etc/shadowsocks-libev/config.json
2018-11-01 08:29:02 +00:00
sed -i 's:json:json --no-delay:g' /lib/systemd/system/shadowsocks-libev-server@.service
2018-03-30 07:52:49 +00:00
systemctl disable shadowsocks-libev
systemctl enable shadowsocks-libev-server@config.service
if [ $NBCPU -gt 1 ] ; then
for i in $NBCPU ; do
ln -fs /etc/shadowsocks-libev/config.json /etc/shadowsocks-libev/config$i .json
systemctl enable shadowsocks-libev-server@config$i .service
done
fi
if ! grep -q 'DefaultLimitNOFILE=65536' /etc/systemd/system.conf ; then
echo 'DefaultLimitNOFILE=65536' >> /etc/systemd/system.conf
fi
# Install simple-obfs
if [ " $OBFS " = "yes" ] ; then
2018-11-28 21:18:35 +00:00
echo "Install OBFS"
2018-07-07 08:59:46 +00:00
rm -rf /tmp/simple-obfs
2018-03-30 07:52:49 +00:00
cd /tmp
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2019-01-02 08:57:31 +00:00
apt-get install -y --no-install-recommends build-essential autoconf libtool libssl-dev libpcre3-dev libev-dev asciidoc xmlto automake git ca-certificates
2018-03-30 07:52:49 +00:00
git clone https://github.com/shadowsocks/simple-obfs.git /tmp/simple-obfs
cd /tmp/simple-obfs
2018-11-30 09:31:36 +00:00
git checkout ${ OBFS_VERSION }
2018-03-30 07:52:49 +00:00
git submodule update --init --recursive
./autogen.sh
./configure && make
make install
cd /tmp
rm -rf /tmp/simple-obfs
2019-01-14 17:15:38 +00:00
#sed -i 's%"mptcp": true%"mptcp": true,\n"plugin": "/usr/local/bin/obfs-server",\n"plugin_opts": "obfs=http;mptcp;fast-open;t=400"%' /etc/shadowsocks-libev/config.json
2019-02-10 07:46:29 +00:00
fi
# Install v2ray-plugin
if [ " $V2RAY " = "yes" ] ; then
echo "Install v2ray plugin"
rm -rf /tmp/v2ray-plugin-linux-amd64-${ V2RAY_VERSION } .tar.gz
2019-09-16 05:58:58 +00:00
#wget -O /tmp/v2ray-plugin-linux-amd64-${V2RAY_VERSION}.tar.gz https://github.com/shadowsocks/v2ray-plugin/releases/download/${V2RAY_VERSION}/v2ray-plugin-linux-amd64-${V2RAY_VERSION}.tar.gz
2019-10-25 18:19:48 +00:00
wget -O /tmp/v2ray-plugin-linux-amd64-${ V2RAY_VERSION } .tar.gz https://www.openmptcprouter.com/${ VPSPATH } /bin/v2ray-plugin-linux-amd64-${ V2RAY_VERSION } .tar.gz
2019-02-10 07:46:29 +00:00
cd /tmp
tar xzvf v2ray-plugin-linux-amd64-${ V2RAY_VERSION } .tar.gz
cp v2ray-plugin_linux_amd64 /usr/local/bin/v2ray-plugin
cd /tmp
rm -rf /tmp/v2ray-plugin_linux_amd64
rm -rf /tmp/v2ray-plugin-linux-amd64-${ V2RAY_VERSION } .tar.gz
#rm -rf /tmp/v2ray-plugin
#cd /tmp
#rm -f /var/lib/dpkg/lock
#apt-get install -y --no-install-recommends git ca-certificates golang-go
#git clone https://github.com/shadowsocks/v2ray-plugin.git /tmp/v2ray-plugin
#cd /tmp/v2ray-plugin
#git checkout ${V2RAY_VERSION}
#git submodule update --init --recursive
#CGO_ENABLED=0 go build -o v2ray-plugin
#cp v2ray-plugin /usr/local/bin/v2ray-plugin
#cd /tmp
#rm -rf /tmp/simple-obfs
fi
if [ " $OBFS " = "no" ] && [ " $V2RAYPLUGIN " = "no" ] ; then
2018-06-28 12:43:26 +00:00
sed -i -e '/plugin/d' -e 's/,,//' /etc/shadowsocks-libev/config.json
2018-03-30 07:52:49 +00:00
fi
2018-11-28 21:18:35 +00:00
if systemctl -q is-active mlvpn@mlvpn0.service; then
systemctl -q stop mlvpn@mlvpn0 > /dev/null 2>& 1
systemctl -q disable mlvpn@mlvpn0 > /dev/null 2>& 1
fi
echo "install mlvpn"
# Install MLVPN
2018-06-11 14:53:08 +00:00
if [ " $MLVPN " = "yes" ] ; then
2018-11-28 21:18:35 +00:00
echo 'Install MLVPN'
mlvpnupdate = "0"
if [ -f /etc/mlvpn/mlvpn0.conf ] ; then
mlvpnupdate = "1"
fi
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-11-30 09:31:36 +00:00
apt-get -y install build-essential pkg-config autoconf automake libpcap-dev unzip git
rm -rf /tmp/mlvpn
2018-06-11 14:53:08 +00:00
cd /tmp
2018-11-30 09:31:36 +00:00
git clone https://github.com/markfoodyburton/MLVPN.git /tmp/mlvpn
2019-07-21 07:04:36 +00:00
#git clone https://github.com/flohoff/MLVPN.git /tmp/mlvpn
2019-09-16 05:58:58 +00:00
#git clone https://github.com/link4all/MLVPN.git /tmp/mlvpn
2018-11-30 09:31:36 +00:00
cd /tmp/mlvpn
git checkout ${ MLVPN_VERSION }
2018-11-28 21:18:35 +00:00
./autogen.sh
./configure --sysconfdir= /etc
make
make install
2019-10-25 18:19:48 +00:00
wget -O /lib/systemd/network/mlvpn.network https://www.openmptcprouter.com/${ VPSPATH } /mlvpn.network
wget -O /lib/systemd/system/mlvpn@.service https://www.openmptcprouter.com/${ VPSPATH } /mlvpn@.service.in
2018-11-28 21:18:35 +00:00
mkdir -p /etc/mlvpn
if [ " $mlvpnupdate " = "0" ] ; then
2019-10-25 18:19:48 +00:00
wget -O /etc/mlvpn/mlvpn0.conf https://www.openmptcprouter.com/${ VPSPATH } /mlvpn0.conf
2018-11-28 21:18:35 +00:00
sed -i " s:MLVPN_PASS: $MLVPN_PASS : " /etc/mlvpn/mlvpn0.conf
fi
chmod 0600 /etc/mlvpn/mlvpn0.conf
adduser --quiet --system --home /var/opt/mlvpn --shell /usr/sbin/nologin mlvpn
mkdir -p /var/opt/mlvpn
usermod -d /var/opt/mlvpn mlvpn
chown mlvpn /var/opt/mlvpn
systemctl enable mlvpn@mlvpn0.service
systemctl enable systemd-networkd.service
cd /tmp
2018-11-30 09:31:36 +00:00
rm -rf /tmp/mlvpn
2018-06-12 15:13:34 +00:00
fi
2018-11-28 21:18:35 +00:00
echo "install mlvpn done"
2018-07-31 12:47:13 +00:00
if systemctl -q is-active openvpn-server@tun0.service; then
systemctl -q stop openvpn-server@tun0 > /dev/null 2>& 1
systemctl -q disable openvpn-server@tun0 > /dev/null 2>& 1
fi
2018-06-12 15:13:34 +00:00
if [ " $OPENVPN " = "yes" ] ; then
2018-11-28 21:18:35 +00:00
echo "Install OpenVPN"
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-06-12 15:13:34 +00:00
apt-get -y install openvpn
2019-10-25 18:19:48 +00:00
wget -O /lib/systemd/network/openvpn.network https://www.openmptcprouter.com/${ VPSPATH } /openvpn.network
2018-06-12 15:13:34 +00:00
if [ ! -f "/etc/openvpn/server/static.key" ] ; then
2019-10-25 18:19:48 +00:00
wget -O /etc/openvpn/tun0.conf https://www.openmptcprouter.com/${ VPSPATH } /openvpn-tun0.conf
2018-06-12 15:13:34 +00:00
cd /etc/openvpn/server
openvpn --genkey --secret static.key
fi
2019-10-25 18:19:48 +00:00
if [ ! -f "/etc/openvpn/server/server.crt" ] ; then
openssl dhparam -out /etc/openvpn/server/dh2048.pem 2048
wget -O /tmp/EasyRSA-unix-v${ EASYRSA_VERSION } .tgz https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.6/EasyRSA-unix-v${ EASYRSA_VERSION } .tgz
cd /tmp
tar xzvf EasyRSA-unix-v${ EASYRSA_VERSION } .tgz
cd /tmp/EasyRSA-v${ EASYRSA_VERSION }
./easyrsa init-pki
./easyrsa --batch build-ca nopass
EASYRSA_CERT_EXPIRE = 3650 ./easyrsa build-server-full server nopass
EASYRSA_CERT_EXPIRE = 3650 ./easyrsa build-client-full "client" nopass
EASYRSA_CRL_DAYS = 3650 ./easyrsa gen-crl
cp pki/ca.crt pki/private/ca.key pki/issued/server.crt pki/private/server.key pki/crl.pem /etc/openvpn/server
cp pki/issued/client.crt pki/private/client.key /etc/openvpn/client
wget -O /etc/openvpn/tun1.conf https://www.openmptcprouter.com/${ VPSPATH } /openvpn-tun1.conf
fi
2018-07-31 12:47:13 +00:00
systemctl enable openvpn@tun0.service
2019-10-25 18:19:48 +00:00
systemctl enable openvpn@tun1.service
2018-06-11 14:53:08 +00:00
fi
2018-11-28 21:18:35 +00:00
echo 'Glorytun UDP'
2018-03-30 07:52:49 +00:00
# Install Glorytun UDP
2018-06-04 10:50:02 +00:00
if systemctl -q is-active glorytun-udp@tun0.service; then
2018-06-04 10:33:15 +00:00
systemctl -q stop glorytun-udp@tun0 > /dev/null 2>& 1
fi
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-11-30 09:31:36 +00:00
apt-get install -y --no-install-recommends build-essential git ca-certificates meson pkg-config
rm -rf /tmp/glorytun-udp
2018-06-01 13:11:58 +00:00
cd /tmp
2018-11-30 09:31:36 +00:00
git clone https://github.com/angt/glorytun.git /tmp/glorytun-udp
cd /tmp/glorytun-udp
git checkout ${ GLORYTUN_UDP_VERSION }
git submodule update --init --recursive
2018-06-01 13:11:58 +00:00
meson build
ninja -C build install
sed -i 's:EmitDNS=yes:EmitDNS=no:g' /lib/systemd/network/glorytun.network
rm /lib/systemd/system/glorytun*
rm /lib/systemd/network/glorytun*
2019-10-25 18:19:48 +00:00
wget -O /usr/local/bin/glorytun-udp-run https://www.openmptcprouter.com/${ VPSPATH } /glorytun-udp-run
2018-06-04 10:50:02 +00:00
chmod 755 /usr/local/bin/glorytun-udp-run
2019-10-25 18:19:48 +00:00
wget -O /lib/systemd/system/glorytun-udp@.service https://www.openmptcprouter.com/${ VPSPATH } /glorytun-udp%40.service.in
wget -O /lib/systemd/network/glorytun-udp.network https://www.openmptcprouter.com/${ VPSPATH } /glorytun-udp.network
2018-06-01 13:11:58 +00:00
mkdir -p /etc/glorytun-udp
2019-10-25 18:19:48 +00:00
wget -O /etc/glorytun-udp/tun0 https://www.openmptcprouter.com/${ VPSPATH } /tun0.glorytun-udp
2019-10-22 19:55:58 +00:00
if [ " $update " = "0" ] || [ ! -f /etc/glorytun-udp/tun0.key ] ; then
2018-06-04 10:33:15 +00:00
echo " $GLORYTUN_PASS " > /etc/glorytun-udp/tun0.key
elif [ ! -f /etc/glorytun-udp/tun0.key ] && [ -f /etc/glorytun-tcp/tun0.key ] ; then
cp /etc/glorytun-tcp/tun0.key /etc/glorytun-udp/tun0.key
fi
2018-06-01 13:11:58 +00:00
systemctl enable glorytun-udp@tun0.service
systemctl enable systemd-networkd.service
cd /tmp
2018-11-30 09:31:36 +00:00
rm -rf /tmp/glorytun-udp
2018-03-30 07:52:49 +00:00
2019-09-16 05:58:58 +00:00
if [ " $DSVPN " = "yes" ] ; then
echo 'A Dead Simple VPN'
# Install A Dead Simple VPN
if systemctl -q is-active dsvpn-server.service; then
systemctl -q stop dsvpn-server > /dev/null 2>& 1
fi
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2019-09-16 05:58:58 +00:00
apt-get install -y --no-install-recommends build-essential git ca-certificates
rm -rf /tmp/dsvpn
cd /tmp
git clone https://github.com/jedisct1/dsvpn.git /tmp/dsvpn
cd /tmp/dsvpn
git checkout ${ DSVPN_VERSION }
wget https://raw.githubusercontent.com/Ysurac/openmptcprouter-feeds/13b8d06d41f92f5599cdf1f453771c64d67dda7a/dsvpn/patches/nofirewall.patch
patch -p1 < nofirewall.patch
make CFLAGS = '-DNO_DEFAULT_ROUTES -DNO_DEFAULT_FIREWALL'
make install
rm -f /lib/systemd/system/dsvpn/*
2019-10-25 18:19:48 +00:00
wget -O /lib/systemd/system/dsvpn-server.service https://www.openmptcprouter.com/${ VPSPATH } /dsvpn-server.service.in
2019-09-16 05:58:58 +00:00
mkdir -p /etc/dsvpn
2019-10-22 19:55:58 +00:00
if [ " $update " = "0" ] || [ ! -f /etc/dsvpn/dsvpn.key ] ; then
2019-09-16 05:58:58 +00:00
echo " $DSVPN_PASS " > /etc/dsvpn/dsvpn.key
fi
systemctl enable dsvpn-server.service
cd /tmp
rm -rf /tmp/dsvpn
fi
2018-03-30 07:52:49 +00:00
# Install Glorytun TCP
2018-06-04 10:50:02 +00:00
if systemctl -q is-active glorytun-tcp@tun0.service; then
2018-06-04 10:33:15 +00:00
systemctl -q stop glorytun-tcp@tun0 > /dev/null 2>& 1
fi
2018-11-12 18:27:32 +00:00
if [ " $ID " = "debian" ] ; then
2019-07-21 07:04:36 +00:00
if [ " $VERSION_ID " = "9" ] ; then
apt -t stretch-backports -y install libsodium-dev
else
apt -y install libsodium-dev
fi
2018-11-12 18:27:32 +00:00
elif [ " $ID " = "ubuntu" ] ; then
apt-get -y install libsodium-dev
fi
2019-01-02 08:57:31 +00:00
rm -f /var/lib/dpkg/lock
2019-10-22 19:55:58 +00:00
rm -f /var/lib/dpkg/lock-frontend
2018-03-30 07:52:49 +00:00
apt-get -y install build-essential pkg-config autoconf automake
2018-07-07 08:59:46 +00:00
rm -rf /tmp/glorytun-0.0.35
2018-03-30 07:52:49 +00:00
cd /tmp
wget -O /tmp/glorytun-0.0.35.tar.gz http://github.com/angt/glorytun/releases/download/v0.0.35/glorytun-0.0.35.tar.gz
tar xzf glorytun-0.0.35.tar.gz
cd glorytun-0.0.35
./autogen.sh
./configure
make
cp glorytun /usr/local/bin/glorytun-tcp
2019-10-25 18:19:48 +00:00
wget -O /usr/local/bin/glorytun-tcp-run https://www.openmptcprouter.com/${ VPSPATH } /glorytun-tcp-run
2018-03-30 07:52:49 +00:00
chmod 755 /usr/local/bin/glorytun-tcp-run
2019-10-25 18:19:48 +00:00
wget -O /lib/systemd/system/glorytun-tcp@.service https://www.openmptcprouter.com/${ VPSPATH } /glorytun-tcp%40.service.in
wget -O /lib/systemd/network/glorytun-tcp.network https://www.openmptcprouter.com/${ VPSPATH } /glorytun.network
2018-03-30 07:52:49 +00:00
mkdir -p /etc/glorytun-tcp
2019-10-25 18:19:48 +00:00
wget -O /etc/glorytun-tcp/tun0 https://www.openmptcprouter.com/${ VPSPATH } /tun0.glorytun
2018-06-05 15:25:30 +00:00
if [ " $update " = "0" ] ; then
2018-06-04 10:33:15 +00:00
echo " $GLORYTUN_PASS " > /etc/glorytun-tcp/tun0.key
fi
2018-03-30 07:52:49 +00:00
systemctl enable glorytun-tcp@tun0.service
systemctl enable systemd-networkd.service
cd /tmp
2018-07-07 08:59:46 +00:00
rm -rf /tmp/glorytun-0.0.35
2018-03-30 07:52:49 +00:00
# Load tun module at boot time
if ! grep -q tun /etc/modules ; then
echo tun >> /etc/modules
fi
2018-07-27 12:40:12 +00:00
# Add multipath utility
2019-10-25 18:19:48 +00:00
wget -O /usr/local/bin/multipath https://www.openmptcprouter.com/${ VPSPATH } /multipath
2018-07-27 12:40:12 +00:00
chmod 755 /usr/local/bin/multipath
2018-06-01 13:11:58 +00:00
2018-07-27 12:40:12 +00:00
# Add OpenMPTCProuter service
2019-10-25 18:19:48 +00:00
wget -O /usr/local/bin/omr-service https://www.openmptcprouter.com/${ VPSPATH } /omr-service
2018-07-27 12:40:12 +00:00
chmod 755 /usr/local/bin/omr-service
2019-10-25 18:19:48 +00:00
wget -O /lib/systemd/system/omr.service https://www.openmptcprouter.com/${ VPSPATH } /omr.service.in
2018-07-27 12:40:12 +00:00
if systemctl -q is-active omr-6in4.service; then
systemctl -q stop omr-6in4 > /dev/null 2>& 1
2018-07-28 18:34:00 +00:00
systemctl -q disable omr-6in4 > /dev/null 2>& 1
2018-07-27 12:40:12 +00:00
fi
systemctl enable omr.service
2018-06-01 13:11:58 +00:00
2018-03-30 07:52:49 +00:00
# Change SSH port to 65222
sed -i 's:#Port 22:Port 65222:g' /etc/ssh/sshd_config
sed -i 's:Port 22:Port 65222:g' /etc/ssh/sshd_config
# Remove Bind9 if available
#systemctl -q disable bind9
# Remove fail2ban if available
#systemctl -q disable fail2ban
2019-09-16 05:58:58 +00:00
2018-06-05 15:25:30 +00:00
if [ " $update " = "0" ] ; then
2018-06-04 10:33:15 +00:00
# Install and configure the firewall using shorewall
apt-get -y install shorewall shorewall6
2019-10-25 18:19:48 +00:00
wget -O /etc/shorewall/openmptcprouter-shorewall.tar.gz https://www.openmptcprouter.com/${ VPSPATH } /openmptcprouter-shorewall.tar.gz
2018-06-04 10:33:15 +00:00
tar xzf /etc/shorewall/openmptcprouter-shorewall.tar.gz -C /etc/shorewall
rm /etc/shorewall/openmptcprouter-shorewall.tar.gz
sed -i " s:eth0: $INTERFACE :g " /etc/shorewall/*
systemctl enable shorewall
2019-10-25 18:19:48 +00:00
wget -O /etc/shorewall6/openmptcprouter-shorewall6.tar.gz https://www.openmptcprouter.com/${ VPSPATH } /openmptcprouter-shorewall6.tar.gz
2018-06-04 10:33:15 +00:00
tar xzf /etc/shorewall6/openmptcprouter-shorewall6.tar.gz -C /etc/shorewall6
rm /etc/shorewall6/openmptcprouter-shorewall6.tar.gz
sed -i " s:eth0: $INTERFACE :g " /etc/shorewall6/*
systemctl enable shorewall6
else
# Update only needed firewall files
2019-10-25 18:19:48 +00:00
wget -O /etc/shorewall/interfaces https://www.openmptcprouter.com/${ VPSPATH } /shorewall4/interfaces
wget -O /etc/shorewall/snat https://www.openmptcprouter.com/${ VPSPATH } /shorewall4/snat
wget -O /etc/shorewall/stoppedrules https://www.openmptcprouter.com/${ VPSPATH } /shorewall4/stoppedrules
wget -O /etc/shorewall/tcinterfaces https://www.openmptcprouter.com/${ VPSPATH } /shorewall4/tcinterfaces
wget -O /etc/shorewall/shorewall.conf https://www.openmptcprouter.com/${ VPSPATH } /shorewall4/shorewall.conf
wget -O /etc/shorewall/params https://www.openmptcprouter.com/${ VPSPATH } /shorewall4/params
wget -O /etc/shorewall/params.vpn https://www.openmptcprouter.com/${ VPSPATH } /shorewall4/params.vpn
wget -O /etc/shorewall/params.net https://www.openmptcprouter.com/${ VPSPATH } /shorewall4/params.net
2018-06-04 10:33:15 +00:00
sed -i " s:eth0: $INTERFACE :g " /etc/shorewall/*
2019-01-02 08:57:31 +00:00
sed -i 's/^.*#DNAT/#DNAT/g' /etc/shorewall/rules
2018-06-13 17:45:53 +00:00
sed -i 's:10.0.0.2:$OMR_ADDR:g' /etc/shorewall/rules
2019-10-25 18:19:48 +00:00
wget -O /etc/shorewall6/params https://www.openmptcprouter.com/${ VPSPATH } /shorewall6/params
wget -O /etc/shorewall6/params.net https://www.openmptcprouter.com/${ VPSPATH } /shorewall6/params.net
wget -O /etc/shorewall6/interfaces https://www.openmptcprouter.com/${ VPSPATH } /shorewall6/interfaces
wget -O /etc/shorewall6/stoppedrules https://www.openmptcprouter.com/${ VPSPATH } /shorewall6/stoppedrules
wget -O /etc/shorewall6/snat https://www.openmptcprouter.com/${ VPSPATH } /shorewall6/snat
2018-06-04 10:33:15 +00:00
sed -i " s:eth0: $INTERFACE :g " /etc/shorewall6/*
fi
2019-09-16 05:53:38 +00:00
if [ " $ID " = "debian" ] && [ " $VERSION_ID " = "10" ] ; then
update-alternatives --set iptables /usr/sbin/iptables-legacy
2019-10-22 19:55:58 +00:00
update-alternatives --set ip6tables /usr/sbin/ip6tables-legacy
fi
if ( [ " $ID " = "debian" ] && [ " $VERSION_ID " = "10" ] ) || ( [ " $ID " = "ubuntu" ] && [ " $VERSION_ID " = "19.04" ] ) ; then
2019-09-16 05:53:38 +00:00
sed -i 's:DROP_DEFAULT=Drop:DROP_DEFAULT="Broadcast(DROP),Multicast(DROP)":g' /etc/shorewall/shorewall.conf
sed -i 's:REJECT_DEFAULT=Reject:REJECT_DEFAULT="Broadcast(DROP),Multicast(DROP)":g' /etc/shorewall/shorewall.conf
sed -i 's:DROP_DEFAULT=Drop:DROP_DEFAULT="Broadcast(DROP),Multicast(DROP)":g' /etc/shorewall6/shorewall6.conf
sed -i 's:REJECT_DEFAULT=Reject:REJECT_DEFAULT="Broadcast(DROP),Multicast(DROP)":g' /etc/shorewall6/shorewall6.conf
fi
2019-05-12 02:45:49 +00:00
if [ " $TLS " = "yes" ] ; then
VPS_CERT = 0
apt-get -y install dnsutils socat
if [ " $VPS_DOMAIN " != "" ] && [ " $( dig +noall +answer $VPS_DOMAIN ) " != "" ] && [ " $( ping -c 1 -w 1 $VPS_DOMAIN ) " ] ; then
if [ ! -f " /root/.acme.sh/ $VPS_DOMAIN / $VPS_DOMAIN .cer " ] ; then
echo "Generate certificate for V2Ray"
set +e
#[ "$(shorewall status | grep stopped)" = "" ] && shorewall open all all tcp 443
curl https://get.acme.sh | sh
systemctl -q restart shorewall
~/.acme.sh/acme.sh --force --alpn --issue -d $VPS_DOMAIN --pre-hook 'shorewall open all all tcp 443 2>&1 >/dev/null' --post-hook 'shorewall close all all tcp 443 2>&1 >/dev/null' 2>& 1 >/dev/null
set -e
# mkdir -p /etc/ssl/v2ray
# ln -f -s /root/.acme.sh/$reverse/$reverse.key /etc/ssl/v2ray/omr.key
# ln -f -s /root/.acme.sh/$reverse/fullchain.cer /etc/ssl/v2ray/omr.cer
#[ "$(shorewall status | grep stopped)" = "" ] && shorewall close all all tcp 443
fi
VPS_CERT = 1
else
2019-08-02 15:34:06 +00:00
echo "No working domain detected..."
2019-05-12 02:45:49 +00:00
fi
fi
2018-03-30 07:52:49 +00:00
# Add OpenMPTCProuter VPS script version to /etc/motd
2018-10-26 13:43:57 +00:00
if [ -f /etc/motd.head ] ; then
2018-10-19 07:31:13 +00:00
if grep --quiet 'OpenMPTCProuter VPS' /etc/motd.head; then
2019-01-02 08:57:31 +00:00
sed -i " s:< OpenMPTCProuter VPS [0-9]*\.[0-9]* >:< OpenMPTCProuter VPS $OMR_VERSION >:g " /etc/motd.head
sed -i " s:< OpenMPTCProuter VPS \$OMR_VERSION >:< OpenMPTCProuter VPS $OMR_VERSION >:g " /etc/motd.head
2018-10-19 07:31:13 +00:00
else
2018-11-01 08:29:02 +00:00
echo " < OpenMPTCProuter VPS $OMR_VERSION > " >> /etc/motd.head
2018-10-19 07:31:13 +00:00
fi
2018-10-26 13:43:57 +00:00
elif [ -f /etc/motd ] ; then
if grep --quiet 'OpenMPTCProuter VPS' /etc/motd; then
2019-01-02 08:57:31 +00:00
sed -i " s:< OpenMPTCProuter VPS [0-9]*\.[0-9]* >:< OpenMPTCProuter VPS $OMR_VERSION >:g " /etc/motd
sed -i " s:< OpenMPTCProuter VPS \$OMR_VERSION >:< OpenMPTCProuter VPS $OMR_VERSION >:g " /etc/motd
2018-10-26 13:43:57 +00:00
else
2018-11-01 08:29:02 +00:00
echo " < OpenMPTCProuter VPS $OMR_VERSION > " >> /etc/motd
2018-10-26 13:43:57 +00:00
fi
2018-11-01 08:29:02 +00:00
else
echo " < OpenMPTCProuter VPS $OMR_VERSION > " > /etc/motd
2018-03-30 07:52:49 +00:00
fi
2018-06-05 15:25:30 +00:00
if [ " $update " = "0" ] ; then
2018-06-04 10:33:15 +00:00
# Display important info
echo '===================================================================================='
2019-09-16 05:58:58 +00:00
echo " OpenMPTCProuter Server $OMR_VERSION is now installed ! "
2018-06-04 10:33:15 +00:00
echo 'SSH port: 65222 (instead of port 22)'
2018-11-28 21:18:35 +00:00
if [ " $OMR_ADMIN " = "yes" ] ; then
echo '===================================================================================='
echo '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'
2019-09-16 05:58:58 +00:00
echo 'OpenMPTCProuter Server key (you need OpenMPTCProuter >= 0.42):'
2018-11-28 21:18:35 +00:00
echo $OMR_ADMIN_PASS
echo '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'
echo '===================================================================================='
fi
2018-06-04 10:33:15 +00:00
echo 'Shadowsocks port: 65101'
2018-08-02 13:14:16 +00:00
echo 'Shadowsocks encryption: chacha20'
2018-06-04 10:33:15 +00:00
echo 'Your shadowsocks key: '
echo $SHADOWSOCKS_PASS
echo 'Glorytun port: 65001'
echo 'Glorytun encryption: chacha20'
echo 'Your glorytun key: '
echo $GLORYTUN_PASS
2019-09-16 05:58:58 +00:00
if [ " $DSVPN " = "yes" ] ; then
echo 'A Dead Simple VPN port: 65011'
echo 'A Dead Simple VPN key: '
echo $DSVPN_PASS
fi
2018-11-28 21:18:35 +00:00
if [ " $MLVPN " = "yes" ] ; then
echo 'MLVPN first port: 65201'
echo 'Your MLVPN password: '
echo $MLVPN_PASS
fi
2019-05-12 02:45:49 +00:00
if [ " $VPS_CERT " = "0" ] ; then
2019-07-21 07:04:36 +00:00
echo 'No working domain detected, not able to generate certificate for v2ray.'
2019-05-12 02:45:49 +00:00
echo 'You can set VPS_DOMAIN to a working domain if you want a certificate.'
fi
2018-06-04 10:33:15 +00:00
echo '===================================================================================='
echo 'Keys are also saved in /root/openmptcprouter_config.txt, you are free to remove them'
echo '===================================================================================='
echo ' /!\ You need to reboot to enable MPTCP, shadowsocks, glorytun and shorewall /!\'
echo '------------------------------------------------------------------------------------'
echo ' After reboot, check with uname -a that the kernel name contain mptcp.'
echo ' Else, you may have to modify GRUB_DEFAULT in /etc/defaut/grub'
echo '===================================================================================='
# Save info in file
cat > /root/openmptcprouter_config.txt <<-EOF
SSH port: 65222 ( instead of port 22)
Shadowsocks port: 65101
2018-08-02 13:14:16 +00:00
Shadowsocks encryption: chacha20
2018-11-12 18:27:32 +00:00
Your shadowsocks key: ${ SHADOWSOCKS_PASS }
2018-06-04 10:33:15 +00:00
Glorytun port: 65001
Glorytun encryption: chacha20
2018-11-12 18:27:32 +00:00
Your glorytun key: ${ GLORYTUN_PASS }
2018-06-04 10:33:15 +00:00
EOF
2019-09-16 05:58:58 +00:00
if [ " $DSVPN " = "yes" ] ; then
cat >> /root/openmptcprouter_config.txt <<-EOF
A Dead Simple VPN port: 65011
A Dead Simple VPN key: ${ DSVPN_PASS }
EOF
fi
2018-11-28 21:18:35 +00:00
if [ " $MLVPN " = "yes" ] ; then
cat >> /root/openmptcprouter_config.txt <<-EOF
MLVPN first port: 65201'
Your MLVPN password: $MLVPN_PASS
EOF
fi
if [ " $OMR_ADMIN " = "yes" ] ; then
cat >> /root/openmptcprouter_config.txt <<-EOF
2019-09-16 05:58:58 +00:00
Your OpenMPTCProuter Server key: $OMR_ADMIN_PASS
2018-11-28 21:18:35 +00:00
EOF
2018-06-11 14:53:08 +00:00
fi
2018-06-04 10:33:15 +00:00
else
echo '===================================================================================='
2019-09-16 05:58:58 +00:00
echo " OpenMPTCProuter Server is now updated to version $OMR_VERSION ! "
2018-06-04 10:33:15 +00:00
echo 'Keys are not changed, shorewall rules files preserved'
2018-08-02 13:14:16 +00:00
echo 'You need OpenMPTCProuter >= 0.30'
2018-06-04 10:33:15 +00:00
echo '===================================================================================='
2018-06-13 08:18:43 +00:00
echo 'Restarting systemd network...'
systemctl -q restart systemd-networkd
echo 'done'
2018-11-28 21:18:35 +00:00
if [ " $MLVPN " = "yes" ] ; then
echo 'Restarting mlvpn...'
systemctl -q start mlvpn@mlvpn0
echo 'done'
fi
2019-09-16 05:58:58 +00:00
if [ " $DSVPN " = "yes" ] ; then
echo 'Restarting dsvpn...'
systemctl -q start dsvpn-server
echo 'done'
fi
2018-07-27 12:40:12 +00:00
echo 'Restarting glorytun and omr...'
2018-06-04 10:33:15 +00:00
systemctl -q start glorytun-tcp@tun0
systemctl -q start glorytun-udp@tun0
2018-07-27 12:40:12 +00:00
systemctl -q restart omr
2018-06-04 10:33:15 +00:00
echo 'done'
2018-06-12 15:13:34 +00:00
if [ " $OPENVPN " = "yes" ] ; then
echo 'Restarting OpenVPN'
2018-07-31 12:47:13 +00:00
systemctl -q restart openvpn@tun0
2019-10-25 18:19:48 +00:00
systemctl -q restart openvpn@tun1
2018-06-12 15:13:34 +00:00
echo 'done'
fi
2018-11-28 21:18:35 +00:00
if [ " $OMR_ADMIN " = "yes" ] ; then
echo 'Restarting OpenMPTCProuter VPS admin'
systemctl -q restart omr-admin
echo 'done'
2018-11-29 08:10:52 +00:00
if ! grep -q 'VPS Admin key' /root/openmptcprouter_config.txt ; then
cat >> /root/openmptcprouter_config.txt <<-EOF
2019-09-16 05:58:58 +00:00
Your OpenMPTCProuter Server key: $OMR_ADMIN_PASS
2018-11-29 08:10:52 +00:00
EOF
echo '===================================================================================='
echo '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'
2019-09-16 05:53:38 +00:00
echo 'OpenMPTCProuter Server key (you need OpenMPTCProuter >= 0.42):'
2018-11-29 08:10:52 +00:00
echo $OMR_ADMIN_PASS
echo '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'
echo '===================================================================================='
fi
2018-11-28 21:18:35 +00:00
fi
2019-05-12 02:45:49 +00:00
if [ " $VPS_CERT " = "0" ] ; then
2019-08-02 15:34:06 +00:00
echo 'No working domain detected, not able to generate certificate for v2ray.'
2019-05-12 02:45:49 +00:00
echo 'You can set VPS_DOMAIN to a working domain if you want a certificate.'
fi
2018-07-02 12:23:35 +00:00
echo 'Restarting shorewall...'
systemctl -q restart shorewall
systemctl -q restart shorewall6
echo 'done'
2018-08-02 13:14:16 +00:00
echo 'Apply latest sysctl...'
sysctl -p /etc/sysctl.d/90-shadowsocks.conf > /dev/null 2>& 1
echo 'done'
2018-11-29 08:10:52 +00:00
echo 'Restarting shadowsocks...'
systemctl -q restart shadowsocks-libev-server@config
if [ $NBCPU -gt 1 ] ; then
for i in $NBCPU ; do
systemctl restart shadowsocks-libev-server@config$i
done
fi
echo 'done'
2018-06-04 10:33:15 +00:00
fi