Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- ### Update: 2012.12.20. ###
- PATHs="http://ftp.sleepy.hu/download"
- LDAP_DN="dc=ldap,dc=sleepy,dc=hu"
- LDAP_SERVER="10.0.0.1"
- function install {
- clear
- echo "Lazy Admin Install Script v6.0 - Copyright © 2011 - 2012 sleepy -> http://www.sleepy.hu"
- echo "----------------------------------------------------------------------------------------------"
- #MENU
- select MENU in "Debian squeeze repository beállítása" "Repo előző verziójára visszatérés" "X telepítése (Xfce4)" "'Jó ha van' csomagok telepítése" "Skype letöltése és telepítése" "TeamViewer letöltése és telepítése" "Google Authenticator telepítése + ssh beállítása" "SSH + Opie telepítése és beállítása" "Konvertálók letöltése és telepítése" "Latex telepítése" "Samba PDC telepítése és beállítása" "Samba PDC kliens" "Postfix: spamassassin, imap telepítése" "Postfix: SMTP SSL" "Postfix: Greylist beállítás" "Quota telepítése és beállítása" "LAMP szerver telepítése" "Apache2 SSL beállítása" "DHCP szerver telepítése" "Firewall beállítása" "Squid telepítése" "Squid+auth telepítése" "vsFTP telepítés beállítás (SSL)" "Raid beállítása" "LDAP szerver beállítása" "LDAP kliens beállítása" "Privát mappa" "Wifi beállítás" "VPN (pptp)" "OpenVPN" "Doublecmd telepítése" "Devede telepítése" "Mustek 1200 CP install" "HP1020 install" "Kilépés"; do
- #Kilépés
- if [ "$MENU" = "Kilépés" ]; then
- echo "Kész."
- exit
- #end Kilépés
- #Mustek 1200 CP install
- elif [ "$MENU" = "Mustek 1200 CP install" ]; then
- cp /etc/sane.d/mustek_pp.conf /etc/sane.d/mustek_pp.conf.orig
- echo 'scanner Mustek-1200CP 0x378 cis1200' > /etc/sane.d/mustek_pp.conf
- echo 'Uncomment: mustek_pp'
- mcedit /etc/sane.d/dll.conf
- echo '#!/bin/bash
- chmod 777 /dev/lp0 # Does it hurt?
- chmod 777 /dev/parport0
- exit' >/etc/init.d/mustek
- chmod a+x /etc/init.d/mustek
- update-rc.d mustek defaults
- echo 'Please restart computer.'
- #end Mustek 1200 CP install
- #HP1020 install
- elif [ "$MENU" = "HP1020 install" ]; then
- apt-get install foo2zjs hannah-foo2zjs hplib
- hannah-foo2zjs
- sudo hp-setup -i
- #end HP1020 install
- #repository
- elif [ "$MENU" = "Debian squeeze repository beállítása" ]; then
- cp /etc/apt/sources.list /etc/apt/sources.list.old
- echo "#Official
- deb http://ftp.de.debian.org/debian squeeze main contrib non-free
- deb-src http://ftp.de.debian.org/debian squeeze main contrib non-free
- deb http://backports.debian.org/debian-backports squeeze-backports main
- #Security
- deb http://security.debian.org/ squeeze/updates main contrib non-free
- deb-src http://security.debian.org/ squeeze/updates contrib non-free main
- "> /etc/apt/sources.list
- apt-get update
- echo "
- #Debian csomagkezelés
- alias apt+='sudo apt-get install '
- alias apt-='sudo apt-get remove '
- alias apt*='sudo apt-get autoremove '
- alias update='sudo apt-get update; sudo apt-get upgrade; sudo apt-get clean'
- alias update-dist='sudo apt-get update; sudo apt-get dist-upgrade; sudo apt-get clean'
- #Rádiók
- alias classfm='mplayer http://87.229.103.52:7058/CLASS_FM'
- alias mr2='mplayer http://stream002.radio.hu/mr2.mp3'" > .bash_aliases
- chmod 770 .bash_aliases
- cp .bash_aliases /etc/skel/.bash_aliases
- source .bash_aliases
- aecho "source ~/.bash_aliases
- export EDITOR=mcedit" >> .bashrc
- cd .bashrc /etc/skel/.bashrc
- apt-get install mc firmware-linux-nonfree
- #end Repository
- #Repo előző verziójára visszatérés
- elif [ "$MENU" = "Repo előző verziójára visszatérés" ]; then
- cp /etc/apt/sources.list.old /etc/apt/sources.list
- apt-get update
- #end Repo előző verziójára visszatérés
- #'Jó ha van' csomagok telepítése"
- elif [ "$MENU" = "'Jó ha van' csomagok telepítése" ]; then
- apt-get install ssh xpdf make gstreamer0.10-plugins-bad gstreamer0.10-plugins-ugly bzip2 mc zip unzip rar unrar xterm audacity bc enigmail icedove icedove-l10n-hu iceowl-extension iceweasel iceweasel-l10n-hu gimp gstreamer0.10-alsa gstreamer0.10-ffmpeg gstreamer0.10-gnomevfs gstreamer0.10-plugins-bad gstreamer0.10-plugins-base gstreamer0.10-plugins-good gstreamer0.10-plugins-ugly ihungarian imagemagick file-roller gthumb glabels cowbell vlc sound-juicer rhythmbox pidgin pidgin-encryption pidgin-openpgp vinagre gprename gnome-bluetooth bluez-firmware arping flashplugin-nonfree-extrasound msttcorefonts ttf-xfree86-nonfree imagination hibernate librecad gnome-terminal vlc pidgin cdparanoia lame sun-java6-jdk sun-java6-jre sun-java6-plugin fbreader gpa gnome-screensaver duply #network-manager-gnome network-manager-pptp-gnome network-manager-pptp network-manager
- apt-get autoremove
- apt-get install libmono-addins-gui0.2-cil geoclue-localnet mesa-utils geoclue tomboy ekiga python-opengl gcalctool telepathy-salut gnuchess-book gnome-nettool gnome-games-extra-data libgnomepanel2.24-cil baobab pkg-config libsrtp0 tcptraceroute gucharmap gnome-games cheese gdebi evolution-exchange libgconf2.0-cil python-aptdaemon-gtk update-manager-core gnome-codec-install python-aptdaemon gnome-cards-data liferea-data gnome-themes-more gnome-screenshot xdg-user-dirs-gtk libgexiv2-0 gnome-office update-manager-gnome cheese-common python-gtkglext1 libart2.0-cil epiphany-extensions update-notifier-common seahorse remmina-plugin-rdp empathy gdebi-core update-notifier libgnome2.24-cil libndesk-dbus1.0-cil seahorse-plugins libgeoclue0 remmina-plugin-vnc xdg-user-dirs gnome-user-share nautilus-sendto-empathy gedit-plugins libtelepathy-farsight0 gconf-defaults-service guile-1.8-libs shotwell gnome-themes-extras libgmime2.4-cil software-center libopal3.6.8 libcryptui0 simple-scan libmono-addins0.2-cil remmina-plugin-data libgee2 rhythmbox-plugin-cdrecorder gtk2-engines-smooth gnome-backgrounds gnome-search-tool geoclue-manual python-vte libfreerdp-plugins-standard geoclue-hostip vino aptdaemon gnome-games-data telepathy-mission-control-5 libapache2-mod-dnssd libclutter-gtk-0.10-0 telepathy-gabble libchamplain-0.4-0 libchamplain-gtk-0.4-0 python-bugbuddy liferea libpt2.6.7 libcheese-gtk18 python-evolution libndesk-dbus-glib1.0-cil gconf-editor gnome-system-tools hamster-applet gnuchess libfreerdp0 libssh-4 libgnome-vfs2.0-cil transmission-common geoclue-yahoo gstreamer0.10-tools freeglut3 totem-mozilla gnome-system-log libspeexdsp1 transmission-gtk remmina empathy-common
- apt-get -t squeeze-backports install libreoffice libreoffice-base libreoffice-report-builder-bin libreoffice-filter-mobiledev libreoffice-l10n-hu
- apt-get remove abiword gnumeric
- wget -c http://ardownload.adobe.com/pub/adobe/reader/unix/9.x/9.5.1/enu/AdbeRdr9.5.1-1_i386linux_enu.deb
- dpkg -i AdbeRdr9.5.1-1_i386linux_enu.deb
- rm AdbeRdr9.5.1-1_i386linux_enu.deb
- #end 'Jó ha van' csomagok telepítése"
- #X telepítése"
- elif [ "$MENU" = "X telepítése (Xfce4)" ]; then
- apt-get install xserver-xorg xfce4-* xfonts-base pmount xinit x11-xserver-utils alsa-base alsa-oss xfce4-timer-plugin xfce4-netload-plugin xfce4-systemload-plugin xfce4-utils xfswitch-plugin gdm gnome-screensaver #network-manager network-manager-pptp network-manager-openvpn
- apt-get remove xscreensaver xscreensaver-data
- #end X telepítése
- #Doublecmd
- elif [ "$MENU" = "Doublecmd telepítése" ]; then
- echo "deb http://ppa.launchpad.net/alexx2000/doublecmd/ubuntu lucid main" >> /etc/apt/sources.list
- apt-key adv --keyserver keyserver.ubuntu.com --recv-keys BE35DEDD
- apt-get update
- apt-get install doublecmd-gtk
- echo "Kész."
- #end Doublecmd
- #Skype letöltése és telepítése
- elif [ "$MENU" = "Skype letöltése és telepítése" ]; then
- wget -c http://www.skype.com/go/getskype-linux-deb-32 -O skype-install.deb
- dpkg -i skype-install.deb
- rm -rf skype-install.deb
- apt-get -f install
- #end Skype letöltése és telepítése
- #TeamViewer letöltése és telepítése
- elif [ "$MENU" = "TeamViewer letöltése és telepítése" ]; then
- wget -c http://www.teamviewer.com/download/teamviewer_linux.deb -O teamviewer_linux.deb
- dpkg -i teamviewer_linux.deb
- rm -rf teamviewer_linux.deb
- #end TeamViewer letöltése és telepítése
- #Devede telepítése
- elif [ "$MENU" = "Devede telepítése" ]; then
- echo "
- deb http://debian-multimedia.org/ stable main
- deb-src http://debian-multimedia.org/ stable main
- " >> /etc/apt/sources.list
- apt-get update
- apt-get install devede
- mcedit /etc/apt/sources.list
- apt-get autoremove
- #end Devede telepítése
- #Konvertálók letöltése és telepítése
- elif [ "$MENU" = "Konvertálók letöltése és telepítése" ]; then
- cd /bin
- pwd
- wget -c $PATHs/convert.tar.gz
- cd /bin
- tar -xzvvf convert.tar.gz
- rm convert.tar.gz
- #end Konvertálók letöltése és telepítése
- #Latex telepítése
- elif [ "$MENU" = "Latex telepítése" ]; then
- apt-get install texlive-full texmaker
- #end Latex telepítése
- #SSH + Opie telepítése és beállítása
- elif [ "$MENU" = "SSH + Opie telepítése és beállítása" ]; then
- apt-get install ssh opie-server opie-client
- cp /etc/ssh/sshd_config /etc/ssh/sshd_config.old
- echo "
- Port 22
- Protocol 2
- HostKey /etc/ssh/ssh_host_rsa_key
- HostKey /etc/ssh/ssh_host_dsa_key
- UsePrivilegeSeparation yes
- KeyRegenerationInterval 3600
- ServerKeyBits 768
- SyslogFacility AUTH
- LogLevel INFO
- LoginGraceTime 120
- PermitRootLogin yes
- StrictModes yes
- RSAAuthentication yes
- PubkeyAuthentication yes
- AuthorizedKeysFile %h/.ssh/authorized_keys
- #AllowUsers user1@*
- IgnoreRhosts yes
- RhostsRSAAuthentication no
- HostbasedAuthentication yes
- PermitEmptyPasswords no
- ChallengeResponseAuthentication yes
- PasswordAuthentication no
- #PAMAuthenticationViaKbdInt yes
- X11Forwarding yes
- X11DisplayOffset 10
- PrintMotd no
- PrintLastLog yes
- TCPKeepAlive yes
- Banner /etc/issue.net
- AcceptEnv LANG LC_*
- Subsystem sftp /usr/lib/openssh/sftp-server
- UsePAM yes"> /etc/ssh/sshd_config
- cp /etc/pam.d/sshd /etc/pam.d/ssh.old
- echo "
- auth required pam_env.so # [1]
- auth required pam_env.so envfile=/etc/default/locale
- auth sufficient pam_opie.so
- auth required pam_deny.so
- account required pam_nologin.so
- @include common-account
- @include common-session
- session optional pam_motd.so # [1]
- session optional pam_mail.so standard noenv # [1]
- session required pam_limits.so
- @include common-password"> /etc/pam.d/sshd
- /etc/init.d/ssh restart
- echo "Használat:
- 1. Jelszó legenerálása a seed-hez: opiepasswd -c
- 2. opiekey -n 50 499 seed
- - 50 OTP kódot generál a 499 sorszámtól, seed azonosító amit a opiepasswd adott.
- 3. opieinfo
- - A következő válasz sorszáma és a felhasználó azonostója.
- 4. opiepasswd
- - jelszó létrehozása
- - új kód létrehozása"> ~/opie.hasznalata.txt
- chmod 777 ~/opie.hasznalata.txt
- #end SSH + Opie telepítése és beállítása
- #LAMP szerver telepítése
- elif [ "$MENU" = "LAMP szerver telepítése" ]; then
- apt-get install apache2 php5 mysql-common mysql-server php5-mysql phpmyadmin
- #end LAMP szerver telepítése
- #"Apache2 SSL beállítása"
- elif [ "$MENU" = "Apache2 SSL beállítása" ]; then
- #apt-get install apache2 php5 mysql-common mysql-server phpmyadmin php5-mysql
- mkdir /var/www/ssl
- cd /etc/apache2
- echo "AddType application/x-x509-ca-cert .crt
- AddType application/x-pkcs7-crl .crl
- SSLPassPhraseDialog builtin
- SSLSessionCache dbm:/var/cache/mod_ssl/scache
- SSLSessionCacheTimeout 300
- SSLRandomSeed startup builtin
- SSLRandomSeed connect builtin
- <VirtualHost _default_:443>
- DocumentRoot \"/var/www/ssl\"
- ServerName localhost:443
- ServerAdmin webmaster@localhost
- ErrorLog /var/log/apache2/ssl-error.log
- TransferLog /var/log/apache2/ssl-error.log
- SSLEngine on
- SSLCipherSuite HIGH:MEDIUM
- SSLProtocol all -SSLv2
- SSLCertificateFile /etc/apache2/ssl/server.crt
- SSLCertificateKeyFile /etc/apache2/ssl/server.key
- SSLCertificateChainFile /etc/apache2/ssl/server.crt
- SSLCACertificateFile /etc/apache2/ssl/server.crt
- <Files ~ \"\.(cgi|shtml|phtml|php3?)$\">
- SSLOptions +StdEnvVars
- </Files>
- ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/
- <Directory \"/usr/lib/cgi-bin\">
- AllowOverride None
- Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch
- Order allow,deny
- Allow from all
- </Directory>
- SetEnvIf User-Agent \".*MSIE.*\" \
- nokeepalive ssl-unclean-shutdown \
- downgrade-1.0 force-response-1.0
- #CustomLog logs/ssl_request_log \
- # \"%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \\"%r\\" %b\"
- <Directory \"/var/www/ssl\">
- Options Indexes
- AllowOverride None
- Allow from from all
- Order allow,deny
- </Directory>
- </VirtualHost>" > ssl.conf
- mkdir ssl
- cd ssl
- openssl req -new > server.csr
- openssl rsa -in privkey.pem -out server.key
- openssl x509 -in server.csr -out server.cert -req -signkey server.key -days 3650
- cd ..
- cp ssl/server.cert /etc/apache2/ssl/server.crt
- ln -s /etc/apache2/mods-available/ssl.conf /etc/apache2/mods-enabled/ssl.conf
- ln -s /etc/apache2/mods-available/ssl.load /etc/apache2/mods-enabled/ssl.load
- touch /var/log/apache2/ssl-error.log
- echo "Include /etc/apache2/ssl.conf" >> /etc/apache2/httpd.conf
- /etc/init.d/apache2 restart
- #end Apache2 SSL beállítása
- #Samba PDC telepítése és beállítása
- elif [ "$MENU" = "Samba PDC telepítése és beállítása" ]; then
- apt-get install samba samba-common samba-doc libkrb53 winbind smbclient
- mkdir /home/samba
- mkdir /home/samba/netlogon
- mkdir /home/samba/profiles
- mkdir /var/spool/samba
- chmod 777 /var/spool/samba/
- chown -R root:users /home/samba/
- chmod -R 771 /home/samba/
- echo "
- //hostname/share /mnt/sleepy cifs exec,username=winUsername,password=winPassword 0 0" >> /etc/fstab
- echo "
- net time \\server /set /yes
- net use u: \\server\home
- net use m: \\server\media
- " > /home/samba/netlogon/logon.bat
- mv /etc/samba/smb.conf /etc/samba/smb.conf.old
- echo "
- [global]
- workgroup = WORKGROUP
- netbios name = SERVER
- server string = %h (Debian GNU/Linux)
- passdb backend = tdbsam
- passwd program = /usr/bin/passwd %u
- passwd chat = *Enter\snew\sUNIX\spassword:* %n\n *Retype\snew\sUNIX\spassword:* %n\n *password\supdated\ssuccessfully* .
- passwd chat debug = Yes
- username map = /etc/samba/smbusers
- unix password sync = Yes
- log level = 3
- name resolve order = wins bcast hosts
- printcap name = CUPS
- add user script = /usr/sbin/adduser --quiet --disabled-password --gecos "" %u
- delete user script = /usr/sbin/userdel -r %u
- add group script = /usr/sbin/groupadd %g
- delete group script = /usr/sbin/groupdel %g
- add user to group script = /usr/sbin/usernod -G %g %u
- add machine script = /usr/sbin/useradd -s /bin/false/ -d /var/lib/nobody %u
- logon script = logon.bat
- logon drive = u:
- domain logons = Yes
- preferred master = Yes
- wins support = Yes
- idmap uid = 15000-20000
- idmap gid = 15000-20000
- template shell = /bin/bash
- printer admin = @lpadmin
- printing = cups
- print command =
- lpq command = %p
- lprm command =
- [homes]
- comment = Home
- valid users = %S
- read only = No
- browseable = No
- [printers]
- comment = All Printers
- path = /var/spool/samba
- create mask = 0700
- printable = Yes
- browseable = No
- [print\$]
- comment = Printer Drivers
- path = /var/lib/samba/printers
- write list = root, @smbadmin
- [netlogon]
- comment = Network Logon Service
- path = /home/samba/netlogon
- valid users = %U
- admin users = Administrator
- guest ok = Yes
- share modes = No
- [profile]
- comment = User profiles
- path = /home/samba/profiles
- valid users = %U
- read only = No
- create mask = 0600
- directory mask = 0700
- browseable = No
- [megosztas]
- comment = Megosztas
- path = /media/hdd3
- valid users = %U
- read only = yes
- create mask = 0600
- directory mask = 0700
- browseable = yes
- "> /etc/samba/smb.conf
- echo "smbpasswd -a root"
- smbpasswd -a root
- echo "root = Administrator" > /etc/samba/smbusers
- echo "
- useradd -g gep gepneve$
- smbpasswd -a -m gepneve"
- #end Samba PDC telepítése és beállítása
- #Samba PDC kliens
- elif [ "$MENU" = "Samba PDC kliens" ]; then
- echo '=================== Samba PDC kliens telepitese ==================='
- apt-get install winbind samba smbfs
- cd /etc/samba
- cp /etc/samba/smb.conf /etc/samba/smb.conf.orig
- echo '[global]
- workgroup = MYDOMAIN
- security = domain
- encrypt passwords = yes
- password server = *
- idmap uid = 10000-20000
- idmap gid = 10000-20000
- template shell = /bin/bash
- template homedir = /home/%D/%U
- [homes]
- comment = Home Directories
- valid users = %S
- read only = No
- create mask = 0700
- directory mask = 0700
- browseable = No
- [printers]
- comment = All Printers
- path = /var/spool/samba
- printable = Yes
- browseable = No' > /etc/samba/smb.conf
- mcedit /etc/samba/smb.conf
- cp /etc/nsswitch.conf /etc/nsswitch.conf.orig
- echo '
- passwd: compat winbind
- group: compat winbind
- shadow: compat winbind' >> /etc/nsswitch.conf
- mcedit /etc/nsswitch.conf
- wbinfo -u
- echo 'Server IP? (ex.: 192.168.0.1)'
- read SERVERIP
- net join -S $SERVERIP -U root
- cp /etc/pam.d/common-account /etc/pam.d/common-account.orig
- echo '
- account sufficient pam_winbind.so' >> /etc/pam.d/common-account
- cp /etc/pam.d/common-session /etc/pam.d/common-session.orig
- echo '
- session required pam_unix.so nullok_secure
- session required pam_mkhomedir.so skel=/etc/skel/ umask=0022' >> /etc/pam.d/common-session
- echo 'Domain? (ex.: MYGROUP)'
- read DOMAIN
- mkdir /home/$DOMAIN
- chmod -R 777 /home/$DOMAIN
- echo "login: $DOMAIN\USERNAME"
- apt-get install libpam-mount
- cp /etc/security/pam_mount.conf.xml /etc/security/pam_mount.conf.xml.orig
- echo '<?xml version="1.0" encoding="UTF-8"?>
- <pam_mount>
- <debug enable="1" />
- <mkmountpoint enable="1" />
- <mntoptions allow="nosuid,nodev,loop,encryption,fsck" />
- <mntoptions require="nosuid,nodev" />
- <lsof>/usr/bin/lsof %(MNTPT)</lsof>
- <cifsmount>/sbin/mount.cifs //%(SERVER)/%(VOLUME) %(MNTPT) -o "user=%(USER),domain='$DOMAIN',uid=%(USER),gid=users"</cifsmount>
- <umount>/bin/umount %(MNTPT)</umount>
- <volume options="username=%(DOMAIN_USER),workgroup=%(DOMAIN_NAME),uid=%(DOMAIN_USER),fmask=700" mountpoint="/home/%(DOMAIN_NAME)/%(DOMAIN_USER)" path="%(DOMAIN_USER)" server="'$SERVERIP'" fstype="cifs" />
- </pam_mount>' > /etc/security/pam_mount.conf.xml
- mcedit /etc/security/pam_mount.conf.xml
- #end #Samba PDC kliens
- #Postfix,spamassassin, imap telepítése
- elif [ "$MENU" = "Postfix: spamassassin, imap telepítése" ]; then
- apt-get install postfix spamassassin spamc uw-imapd razor procmail clamav
- echo "
- smtp inet n - - - - smtpd
- -o content_filter=spamassassin
- spamassassin unix - n n - - pipe
- user=nobody argv=/usr/bin/spamc -f -e
- /usr/sbin/sendmail -oi -f \${sender} \${recipient}
- " >> /etc/postfix/master.cf
- mcedit /etc/postfix/master.cf
- #razor
- razor-client
- razor-admin -home=/etc/spamassassin/.razor -register
- razor-admin -home=/etc/spamassassin/.razor -create
- razor-admin -home=/etc/spamassassin/.razor -discover
- chmod -R 777 /etc/spamassassin/.razor
- echo " razorhome = /etc/spamassassin/.razor/" >> /etc/spamassassin/.razor/razor-agent.conf
- echo "razor_config /etc/spamassassin/.razor/razor-agent.conf" >> /etc/spamassassin/local.cf
- /usr/bin/mcedit /etc/default/spamassassin
- /etc/init.d/spamassassin restart
- echo "DEFAULT=/var/mail/$LOGNAME
- MAILDIR=$HOME/mail
- :0
- VIRUS=| clamdscan --no-summary --stdout - | cut -d' ' -f2 -
- :0
- * VIRUS ?? !^OK
- {
- :0
- SUBJECT=| egrep '^Subject:' - | sed -e 's/Subject: //' -
- :0 fw
- | formail -i"Subject: [*** VIRUS ***: ${VIRUS}] ${SUBJECT}"
- }
- " > /etc/procmailrc
- #end Mail server telepítése: postfix, spamassassin, imap-ssl
- #Postfix: SMTP SSL
- elif [ "$MENU" = "Postfix: SMTP SSL" ]; then
- ### SMTP SSL ###
- apt-get install sasl2-bin telnet
- dpkg-reconfigure postfix
- postconf -e 'smtpd_sasl_local_domain ='
- postconf -e 'smtpd_sasl_auth_enable = yes'
- postconf -e 'smtpd_sasl_security_options = noanonymous'
- postconf -e 'broken_sasl_auth_clients = yes'
- postconf -e 'smtpd_recipient_restrictions = permit_sasl_authenticated,permit_mynetworks,reject_unauth_destination'
- postconf -e 'inet_interfaces = all'
- echo 'pwcheck_method: saslauthd' >> /etc/postfix/sasl/smtpd.conf
- echo 'mech_list: plain login' >> /etc/postfix/sasl/smtpd.conf
- mkdir /etc/postfix/ssl
- cd /etc/postfix/ssl/
- echo "smtpd.key generating..."
- openssl genrsa -des3 -rand /etc/hosts -out smtpd.key 1024
- echo "smtpd.csr generating..."
- chmod 600 smtpd.key
- openssl req -new -key smtpd.key -out smtpd.csr
- echo "smtpd.crt generating..."
- openssl x509 -req -days 3650 -in smtpd.csr -signkey smtpd.key -out smtpd.crt
- openssl rsa -in smtpd.key -out smtpd.key.unencrypted
- mv -f smtpd.key.unencrypted smtpd.key
- openssl req -new -x509 -extensions v3_ca -keyout cakey.pem -out cacert.pem -days 3650
- openssl req -new -x509 -nodes -out imapd.pem -keyout imapd.pem -days 3650
- echo "Postfix TLS config..."
- postconf -e 'smtpd_tls_auth_only = no'
- postconf -e 'smtp_use_tls = yes'
- postconf -e 'smtpd_use_tls = yes'
- postconf -e 'smtp_tls_note_starttls_offer = yes'
- postconf -e 'smtpd_tls_key_file = /etc/postfix/ssl/smtpd.key'
- postconf -e 'smtpd_tls_cert_file = /etc/postfix/ssl/smtpd.crt'
- postconf -e 'smtpd_tls_CAfile = /etc/postfix/ssl/cacert.pem'
- postconf -e 'smtpd_tls_loglevel = 1'
- postconf -e 'smtpd_tls_received_header = yes'
- postconf -e 'smtpd_tls_session_cache_timeout = 3600s'
- postconf -e 'tls_random_source = dev:/dev/urandom'
- postconf -e 'myhostname = myhostname.homelinux.com'
- /etc/init.d/postfix restart
- clear
- echo "Please change /etc/postfix/master.cf: smtp inet n - y - - smtpd"
- read KEY
- mcedit /etc/postfix/master.cf
- mkdir -p /var/spool/postfix/var/run/saslauthd
- chmod -R 777 /var/spool/postfix/var/run/saslauthd
- chown root.sasl -R /var/spool/postfix/var/
- dpkg-statoverride --add root sasl 710 /var/spool/postfix/var/run/saslauthd
- echo "OPTIONS=\"-c -m /var/spool/postfix/var/run/saslauthd -r\"" >> /etc/default/saslauthd
- echo "MECHANISMS=\"shadow\"" >> /etc/default/saslauthd
- mcedit /etc/default/saslauthd
- addgroup postfix sasl
- /etc/init.d/saslauthd restart
- #telnet localhost 25
- chown -R root:sasl /var/spool/postfix/var/run/saslauthd
- chmod -R 755 /var/spool/postfix/var/run/saslauthd
- ### SMTP SSL ###
- #end Postfix: SMTP SSL
- #Postfix: Greylist beállítás
- elif [ "$MENU" = "Postfix: Greylist beállítás" ]; then
- apt-get install postgrey
- postconf -e 'smtpd_recipient_restrictions = permit_sasl_authenticated,permit_mynetworks,reject_unauth_destination,check_policy_service inet:127.0.0.1:10023, permit'
- echo "POSTGREY_OPTS=\"--inet=10023 --max-age=365\"" >> /etc/default/postgrey
- mcedit /etc/default/postgrey
- mcedit /etc/postfix/main.cf
- service postgrey restart
- service postfix restart
- #end Postfix: Greylist beállítás
- #Quota telepítése és beállítása
- elif [ "$MENU" = "Quota telepítése és beállítása" ]; then
- apt-get install quota
- /usr/bin/clear
- echo "Az /etc/fstab-ot írd át, pl.: /dev/sda3 /home ext3 defaults,usrjquota=aquota.user,grpjquota=aquota.group,jqfmt=vfsv0 0 2"
- echo "Tovább: ENTER"
- read KEY
- echo "
- \#/dev/sda3 /home ext3 defaults,usrjquota=aquota.user,grpjquota=aquota.group,jqfmt=vfsv0 0 2" >> /etc/fstab
- /usr/bin/mcedit /etc/fstab
- mount -o remount -a
- quotacheck -avugm
- quotaon -avug
- #end Quota telepítése és beállítása
- #VPN telepítése
- elif [ "$MENU" = "VPN (pptp)" ]; then
- apt-get install pptpd
- cp /etc/pptpd.conf /etc/pptpd.conf.orig
- echo "
- option /etc/ppp/pptpd-options
- logwtmp
- localip 10.5.1.1
- remoteip 10.5.1.5-10
- " > /etc/pptpd.conf
- cp /etc/ppp/options.pptp /etc/pptp/options.pptp.orig
- echo "name Test.PPTP
- refuse-pap
- refuse-chap
- refuse-mschap
- require-mschap-v2
- require-mppe-128
- ms-dns 208.67.222.222
- ms-dns 208.67.220.220
- proxyarp
- nodefaultroute
- lock
- nobsdcomp" > /etc/ppp/options.pptp
- mcedit /etc/ppp/chap-secrets
- /etc/init.d/pptpd restart
- firewall
- #end VPN
- #OpenVPN telepítése
- elif [ "$MENU" = "OpenVPN" ]; then
- apt-get install openvpn #network-manager-openvpn
- cd /etc/openvpn/
- cp -r /usr/share/doc/openvpn/examples/easy-rsa/2.0 .
- mv 2.0 easy-rsa
- cd /etc/openvpn/easy-rsa
- mcedit vars
- source vars
- ./clean-all
- ./build-dh
- ./build-ca
- ./build-key-server server
- echo 'Kliens hozzaadasa...'
- echo 'Kliens neve:'
- read KLIENS
- ./build-key $KLIENS
- echo "Másold be a kliens /etc/openvpn mappájába a
- ca.crt
- $KLIENS.crt
- $KLIENS.key kulcsokat."
- sleep 1
- echo "
- dev tun
- client
- proto tcp
- # Az w.x.y.z helyett a szerver IP-je kell
- remote w.x.y.z 1194
- resolv-retry infinite
- nobind
- user nobody
- group nogroup
- # Try to preserve some state across restarts.
- persist-key
- persist-tun
- ca ca.crt
- cert $KLIENS.crt
- key $KLIENS.key
- comp-lzo
- # Set log file verbosity.
- verb 3
- " > /etc/openvpn/openvpn-client.conf
- echo "
- port 1194
- proto udp
- dev tun
- ca /etc/openvpn/easy-rsa/keys/ca.crt
- cert /etc/openvpn/easy-rsa/keys/server.crt
- key /etc/openvpn/easy-rsa/keys/server.key
- dh /etc/openvpn/easy-rsa/keys/dh1024.pem
- server 10.0.0.0 255.255.255.0
- cipher AES-256-CBC
- comp-lzo
- persist-key
- persist-tun
- status /var/log/openvpn-status.log
- log-append /var/log/openvpn.log
- verb 3
- tun-mtu 1500
- tun-mtu-extra 32
- mssfix 1450
- push \"redirect-gateway def1\"
- push \"dhcp-option DNS 8.8.8.8\"
- push \"dhcp-option DNS 8.8.4.4\"
- push \"route 192.168.134.0 255.255.255.0\"
- keepalive 5 30" > /etc/openvpn/openvpn-server.conf
- echo "Ha szervert telepítesz, az /etc/openvpn/openvpn-server.conf állományt nevezd át openvpn.conf-ra,
- ha a kliens kell akkor az openvpn-client.conf állományt valamint írd át benne az x.y.z.w-t a szerver publikus IP-jére.
- Szever esetén a tűzfalat is be kell állítani NAT-hoz:
- echo \"1\" > /proc/sys/net/ipv4/ip_forward
- iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -o eth0 -j MASQUERADE
- iptables -A FORWARD -i tun+ -j ACCEPT
- iptables -A FORWARD -o tun+ -j ACCEPT
- Majd indítsd újra a szerveren is, és a kliensen is az openvpn-t, ezek után az ifconfig kimenetében benne kell lennie
- a tun0 eszköznek és a ping 10.0.0.1 címre választ kell kapj. Jó OpenVPN-elést :D"
- sleep 2
- #end OpenVPN
- #Firewall beállítása
- elif [ "$MENU" = "Firewall beállítása" ]; then
- firewall
- #Firewall beállítása
- #vsftpd
- elif [ "$MENU" = "vsFTP telepítés beállítás (SSL)" ]; then
- apt-get install vsftpd ftp-ssl
- echo "
- listen=YES
- anonymous_enable=YES
- anon_root=/home/ftp
- local_enable=YES
- write_enable=YES
- anon_upload_enable=NO
- anon_mkdir_write_enable=NO
- max_clients=10
- dirmessage_enable=YES
- xferlog_enable=YES
- connect_from_port_20=YES
- idle_session_timeout=600
- data_connection_timeout=120
- ftpd_banner=Chaser FTP szervere.
- chroot_local_user=YES
- secure_chroot_dir=/var/run/vsftpd
- pam_service_name=vsftpd
- rsa_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
- rsa_private_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
- pasv_promiscuous=YES
- ssl_enable=YES
- allow_anon_ssl=NO
- force_local_data_ssl=YES
- force_local_logins_ssl=YES
- ssl_tlsv1=YES
- ssl_sslv2=YES
- ssl_sslv3=YES
- pasv_min_port=2000
- pasv_max_port=2001" > /etc/vsftpd.conf
- iptables -A INPUT -p tcp -m multiport --dports 2000,2001 -j ACCEPT
- iptables -A INPUT -p udp -m multiport --dports 2000,2001 -j ACCEPT
- #end vsftpd
- #Proxy: Squid telepítése
- elif [ "$MENU" = "Squid telepítése" ]; then
- apt-get install squid
- cp /etc/squid/squid.conf /etc/squid/squid.conf--orig
- cd /etc/squid
- wget -c $PATHs/squid.tar.gz
- tar xf squid.tar.gz
- rm -r squid.tar.gz
- ln -s /usr/share/squid/errors/Hungarian /etc/squid/errors1
- squid -k reconfigure
- firewall
- #end Proxy: Squid telepítése
- #Proxy: Squid+auth telepítése
- elif [ "$MENU" = "Squid+auth telepítése" ]; then
- apt-get install squid
- cp /etc/squid/squid.conf /etc/squid.conf-old
- cd /etc/squid
- wget -c $PATHs/squid.tar.gz
- tar xf squid.tar.gz
- rm -r squid.tar.gz
- squid -k reconfigure
- touch /etc/squid/squid_passwords
- chmod o+r /etc/squid/squid_passwords
- clear
- echo "admin felhasznalo letrehozésa a squid-hoz. Jelszo: teszt"
- echo "Felhasznalo hozzaadasa ezzel a paranccsal: htpasswd -bmc /etc/squid/squid_passwords username password"
- htpasswd -bmc /etc/squid/squid_passwords admin teszt
- firewall
- #echo "Melyik eszköz van a belső háló felé? (pl.: eth0)"
- #read BELSO
- #iptables -t nat -A PREROUTING -i $BELSO -p tcp -m tcp --dport 8080 -j REDIRECT --to-ports 3128
- #iptables -t nat -A PREROUTING -i $BELSO -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128
- #iptables -t nat -A PREROUTING -i $BELSO -p tcp -m tcp --dport 1863 -j REDIRECT --to-ports 3128
- #iptables-save > /root/iptables.rules
- #end Proxy: Squid+auth telepítése
- #"DHCP szerver telepítése"
- elif [ "$MENU" = "DHCP szerver telepítése" ]; then
- apt-get install isc-dhcp-server
- mkdir -p /etc/scripts/dhcpd_config
- cd /etc/scripts/dhcpd_config
- wget -c $PATHs/dhcp_configure.tar.gz
- tar -xf dhcp_configure.tar.gz
- rm dhcp_configure.tar.gz
- mcedit /etc/default/isc-dhcp-server
- clear
- echo "DHCP beállító scriptek telepítve a /etc/scripts/dhcp_config mappába."
- #end "DHCP szerver telepítése"
- #Privat mappa
- elif [ "$MENU" = "Privát mappa" ]; then
- apt-get install ecryptfs-utils
- echo Beállítás: ecryptfs-setup-private
- #end Privat mappa
- #Wifi beállítás
- elif [ "$MENU" = "Wifi beállítás" ]; then
- apt-get install pump wpasupplicant firmware-iwlwifi
- clear
- echo "SSID? "
- read SSID
- echo "psk? "
- read PSK
- if [ -f "/etc/wpa_supplicant.conf" ]; then
- echo "
- network={
- ssid=\"$SSID\"
- scan_ssid=0
- proto=WPA2
- key_mgmt=WPA-PSK
- psk=\"$PSK\"
- pairwise=CCMP
- group=CCMP
- }
- " >> /etc/wpa_supplicant.conf
- else
- echo "ap_scan=1
- ctrl_interface=/var/run/wpa_supplicant
- network={
- ssid=\"$SSID\"
- scan_ssid=0
- proto=WPA2
- key_mgmt=WPA-PSK
- psk=\"$PSK\"
- pairwise=CCMP
- group=CCMP
- }
- " > /etc/wpa_supplicant.conf
- fi
- if [ -f "/etc/scripts/wifi" ]; then
- echo "/etc/scripts/wifi -> OK."
- ln -s /etc/scripts/wifi /bin/wifi
- else
- echo "#!/bin/bash
- case \"\$1\" in
- start)
- ifconfig eth0 down
- ifconfig wlan0 down
- ifconfig wlan0 up
- wpa_supplicant -B -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
- pump -i wlan0
- ifconfig wlan0
- ;;
- stop)
- ifconfig wlan0 down
- ifconfig eth0 up
- pump -i eth0
- ifconfig eth0
- ;;
- *)
- ;;
- esac
- " > /etc/scripts/wifi
- chmod +x /etc/scripts/wifi
- ln -s /etc/scripts/wifi /bin/wifi
- clear
- echo "Wifi a 'wifi start' paranccsal indítható."
- fi
- #end Wifi beállítás
- #Raid beállítása
- elif [ "$MENU" = "Raid beállítása" ]; then
- raid
- #Raid beállítása
- #LDAP kliens beállítása
- elif [ "$MENU" = "LDAP kliens beállítása" ]; then
- apt-get install libnss-ldap libpam-ldap ldap-utils nscd
- echo "
- passwd: compat ldap
- group: compat ldap
- shadow: compat ldap
- netgroup: ldap
- "
- cp /etc/nsswitch.conf /etc/nsswitch.conf--orig
- mcedit /etc/nsswitch.conf
- mkdir -p /public/Kozos
- echo "
- $LDAP_SERVER:/home /home nfs defaults 0 1
- $LDAP_SERVER:/public/Kozos /public/Kozos nfs defaults 0 1
- " >> /etc/fstab
- mcedit /etc/ldap/ldap.conf
- cp /etc/pam_ldap.conf /etc/pam_ldap.conf.orig
- echo "host $LDAP_SERVER
- base $LDAP_DN
- uri ldap://$LDAP_SERVER
- ldap_version 3
- pam_password crypt" > /etc/pam_ldap.conf
- #LDAP kliens beállítása
- #Google Authenticator
- elif [ "$MENU" = "Google Authenticator telepítése + ssh beállítása" ]; then
- wget http://download.sleepy.hu/debs/libpam-google-authenticator_i386.deb
- dpkg -i libpam-google-authenticator_i386.deb
- apt-get -f install
- #google-authenticator
- echo "
- auth required pam_google_authenticator.so" >> /etc/pam.d/sshd
- echo "
- Replace:
- ChallengeResponseAuthentication no -> ChallengeResponseAuthentication yes
- PasswordAuthentication yes -> PasswordAuthentication no"
- read ENTER
- mcedit /etc/ssh/sshd_config
- /etc/init.d/ssh restart
- #end Google Authenticator
- #TrueCrypt
- elif [ "$MENU" = "TrueCrypt telepítése" ]; then
- wget -c $PATHs/truecrypt-7.1-linux-x86.tar.gz
- tar xzf truecrypt-7.1-linux-x86.tar.gz
- chmod +x truecrypt-7.1-setup-x86
- ./truecrypt-7.1-setup-x86
- #end TrueCrypt
- #LDAP szerver beállítása
- elif [ "$MENU" = "LDAP szerver beállítása" ]; then
- apt-get install slapd
- mkdir -p /etc/scripts/LDAP
- cd /etc/scripts/LDAP
- echo "#!/bin/bash
- SUFFIX='$LDAP_DN'
- LDIF='ldapuser.ldif'
- echo -n > \$LDIF
- for line in \`grep \"x:[1-9][0-9][0-9][0-9]:\" /etc/passwd | sed -e \"s/ /%/g\"\`
- do
- UID1=\`echo \$line | cut -d: -f1\`
- NAME=\`echo \$line | cut -d: -f5 | cut -d, -f1\`
- if [ ! \"\$NAME\" ]
- then
- NAME=\$UID1
- else
- NAME=\`echo \$NAME | sed -e \"s/%/ /g\"\`
- fi
- SN=\`echo \$NAME | awk '{print \$2}'\`
- if [ ! \"\$SN\" ]
- then
- SN=\$NAME
- fi
- GIVEN=\`echo \$NAME | awk '{print \$1}'\`
- UID2=\`echo \$line | cut -d: -f3\`
- GID=\`echo \$line | cut -d: -f4\`
- PASS=\`grep \$UID1: /etc/shadow | cut -d: -f2\`
- SHELL=\`echo \$line | cut -d: -f7\`
- HOME=\`echo \$line | cut -d: -f6\`
- EXPIRE=\`passwd -S \$UID1 | awk '{print \$7}'\`
- FLAG=\`grep \$UID1: /etc/shadow | cut -d: -f9\`
- if [ ! \"\$FLAG\" ]
- then
- FLAG=\"0\"
- fi
- WARN=\`passwd -S \$UID1 | awk '{print \$6}'\`
- MIN=\`passwd -S \$UID1 | awk '{print \$4}'\`
- MAX=\`passwd -S \$UID1 | awk '{print \$5}'\`
- LAST=\`grep \$UID1: /etc/shadow | cut -d: -f3\`
- echo \"dn: uid=\$UID1,ou=users,\$SUFFIX\" >> \$LDIF
- echo \"objectClass: inetOrgPerson\" >> \$LDIF
- echo \"objectClass: posixAccount\" >> \$LDIF
- echo \"objectClass: shadowAccount\" >> \$LDIF
- echo \"uid: \$UID1\" >> \$LDIF
- echo \"sn: \$SN\" >> \$LDIF
- echo \"givenName: \$GIVEN\" >> \$LDIF
- echo \"cn: \$NAME\" >> \$LDIF
- echo \"displayName: \$NAME\" >> \$LDIF
- echo \"uidNumber: \$UID2\" >> \$LDIF
- echo \"gidNumber: \$GID\" >> \$LDIF
- echo \"userPassword: {crypt}\$PASS\" >> \$LDIF
- echo \"gecos: \$NAME\" >> \$LDIF
- echo \"loginShell: \$SHELL\" >> \$LDIF
- echo \"homeDirectory: \$HOME\" >> \$LDIF
- echo \"shadowExpire: \$EXPIRE\" >> \$LDIF
- echo \"shadowFlag: \$FLAG\" >> \$LDIF
- echo \"shadowWarning: \$WARN\" >> \$LDIF
- echo \"shadowMin: \$MIN\" >> \$LDIF
- echo \"shadowMax: \$MAX\" >> \$LDIF
- echo \"shadowLastChange: \$LAST\" >> \$LDIF
- echo >> \$LDIF
- done
- " > ldapuser.sh
- echo "dn: dc=$LDAP_DN
- objectClass: top
- objectClass: dcObject
- objectclass: organization
- o: Server World
- dc: Server
- description: LDAP Server" > base.ldif
- echo "dn: ou=users,$LDAP_DN
- objectClass: organizationalUnit
- ou: users " > users.ldif
- echo "dn: ou=groups,$LDAP_DN
- objectClass: organizationalUnit
- ou: groups " > groups.ldif
- echo "dn: olcDatabase={1}hdb,cn=config
- changetype: modify
- replace: olcSuffix
- olcSuffix: $LDAP_DN
- -
- replace: olcRootDN
- olcRootDN: cn=admin,$LDAP_DN
- -
- replace: olcAccess
- olcAccess: to attrs=userPassword by dn=\"cn=admin,$LDAP_DN\" write by anonymous auth by self write by * none
- olcAccess: to attrs=shadowLastChange by self write by * read
- olcAccess: to dn.base=\"\" by * read
- olcAccess: to * by dn=\"cn=admin,$LDAP_DN\" write by * read
- -" > ldap-config.conf
- echo "#!/bin/bash
- SUFFIX='$LDAP_DN'
- LDIF='ldapgroup.ldif'
- echo -n > \$LDIF
- for line in \`grep \"x:[1-9][0-9][0-9][0-9]:\" /etc/group\`
- do
- CN=\`echo \$line | cut -d: -f1\`
- GID=\`echo \$line | cut -d: -f3\`
- echo \"dn: cn=\$CN,ou=groups,\$SUFFIX\" >> \$LDIF
- echo \"objectClass: posixGroup\" >> \$LDIF
- echo \"cn: \$CN\" >> \$LDIF
- echo \"gidNumber: \$GID\" >> \$LDIF
- users=\`echo \$line | cut -d: -f4 | sed \"s/,/ /g\"\`
- for user in \${users} ; do
- echo \"memberUid: \${user}\" >> \$LDIF
- done
- echo >> \$LDIF
- done" > ldapgroup.sh
- apt-get install slapd ldap-utils
- echo LDAP tesztelése...
- ldapsearch -LLL -Y EXTERNAL -H ldapi:/// -b cn=config dn
- echo LDAP root jelszó generálása...
- slappasswd
- echo "
- dn: olcDatabase={0}config,cn=config
- add: olcRootPW
- olcRootPW:jelszo helye
- "
- ldapmodify -Y EXTERNAL -H ldapi:///
- echo LDAP beállítások betöltése...
- mcedit ldap-config.conf
- ldapmodify -Y EXTERNAL -H ldapi:/// -f ldap-config.conf
- ldapsearch -xLLL -b cn=config -D cn=admin,cn=config -W olcDatabase={1}hdb
- echo LDAP szerver tulajdonságainak beállítása
- mcedit base.ldif
- ldapadd -x -D cn=admin,$LDAP_DN -W -f base.ldif
- echo "LDAP users tulajdonságainak beállítása"
- mcedit users.ldif
- ldapadd -x -D cn=admin,$LDAP_DN -W -f users.ldif
- echo "LDAP groups tulajdonságainak beállítása"
- mcedit groups.ldif
- ldapadd -x -D cn=admin,$LDAP_DN -W -f groups.ldif
- echo UNIX user-ek LDAP adatbázisba migrálása...
- mcedit ldapuser.sh
- sh ldapuser.sh
- ldapadd -x -D cn=admin,$LDAP_DN -W -f ldapuser.ldif
- echo UNIX csoportok LDAP adatbázisba migrálása...
- mcedit ldapgroup.sh
- sh ldapgroup.sh
- ldapadd -x -D cn=admin,$LDAP_DN -W -f ldapgroup.ldif
- #echo "Felhasználók törlése..."
- #ldapdelete -r -x -W -D 'cn=admin,$LDAP_DN' "ou=users,$LDAP_DN"
- #echo "Csoportok törlése..."
- #ldapdelete -r -x -W -D 'cn=admin,$LDAP_DN' "ou=groups,$LDAP_DN"
- else
- echo Nincs ilyen menüpont.
- fi
- #end if
- done
- }
- ###########################################################
- function firewall {
- clear
- echo "Tűzfal típusa:"
- select MENUFW in "Alap" "Gateway" "Proxy" "Proxy (VPN)" "Fő menü"; do
- if [ "$MENUFW" = "Fő menü" ]; then
- install
- exit
- #alap tuzfal
- elif [ "$MENUFW" = "Alap" ]; then
- wget -O /etc/scripts/firewall.sh $PATHs/firewall/firewall.sh
- echo "/etc/scripts/firewall.sh" >> /etc/rc.local
- chmod +x /etc/scripts/firewall.sh
- mcedit /etc/rc.local
- /etc/rc.local
- #end alap tuzfal
- #gateway tuzfal
- elif [ "$MENUFW" = "Gateway" ]; then
- wget -O /etc/scripts/firewall.sh $PATHs/firewall/firewall-gateway.sh
- echo "/etc/scripts/firewall.sh" >> /etc/rc.local
- mcedit /etc/rc.local
- chmod +x /etc/scripts/firewall.sh
- /etc/rc.local
- #end alap tuzfal
- #proxy tuzfal
- elif [ "$MENUFW" = "Proxy" ]; then
- wget -O /etc/scripts/firewall.sh $PATHs/firewall/firewall-proxy.sh
- echo "/etc/scripts/firewall.sh" >> /etc/rc.local
- mcedit /etc/rc.local
- chmod +x /etc/scripts/firewall.sh
- /etc/rc.local
- #end proxy tuzfal
- #proxy (VPN) tuzfal
- elif [ "$MENUFW" = "Proxy (VPN)" ]; then
- wget -O /etc/scripts/firewall.sh $PATHs/firewall/firewall-proxy-vpn.sh
- echo "/etc/scripts/firewall.sh" >> /etc/rc.local
- mcedit /etc/rc.local
- chmod +x /etc/scripts/firewall.sh
- /etc/rc.local
- #end alap tuzfal
- else
- echo Nincs ilyen menüpont.
- fi
- done
- }
- ######################################################################
- function raid {
- clear
- echo "Raid kezelés - Copyright © 2007 - 2011 sleepy -> http://sleepy.hu"
- echo "-----------------------------------------------------------------"
- select MENU in "Particiónálás" "Particiós tábla másolás" "Tömb létrehozása (raid1)" "fstab beállítása" "Tömb törlése 'hibával'" "Raidtelenítés" "Kilépés"; do
- #Kilépés
- if [ "$MENU" = "Kilépés" ]; then
- echo "Kész."
- exit
- #end Kilépés
- #Particiónálás
- elif [ "$MENU" = "Particiónálás" ]; then
- fdisk -l
- cfdisk
- #end Particiónálás
- #Particiós tábla másolás
- elif [ "$MENU" = "Particiós tábla másolás" ]; then
- echo "Melyik merevlemezről? (pl.: sda)"
- read EGYIK
- echo "Melyik merevlemezre? (pl.: sdb)"
- read MASIK
- sfdisk -d /dev/$EGYIK| sfdisk /dev/$MASIK
- #end Particiós tábla másolás
- #Tömb létrehozása (raid1)
- elif [ "$MENU" = "Tömb létrehozása (raid1)" ]; then
- echo "Tömb első lemeze? (pl.: sda1)"
- read ELSO
- echo "Tömb második lemeze? (pl.: sdb1)"
- read MASODIK
- echo "md0 létrehozása..."
- mdadm --create /dev/md0 --level=1 --raid-disks=2 /dev/$ELSO /dev/$MASODIK
- echo "md0 formázása..."
- mkfs.ext3 /dev/md0
- echo "További particiókat ennek nyomán készíthetőek."
- #end Tömb létrehozása (raid1)
- #fstab beállítása
- elif [ "$MENU" = "fstab beállítása" ]; then
- cp /etc/fstab /etc/fstab.old
- echo "
- /dev/md0 /var/mail ext3 defaults 0 2" >> /etc/fstab
- mcedit /etc/fstab
- #end fstab beállítása
- #Tömb törlése 'hibával'
- elif [ "$MENU" = "Tömb törlése 'hibával'" ]; then
- echo "Kamikazee.."
- echo "Melyik eszköz menjen 'tönkre'? (pl.: sda1)"
- read ELSO
- mdadm --manage /dev/md0 --fail /dev/$ELSO
- mdadm --manage /dev/md0 --remove /dev/$ELSO
- #end Tömb törlése 'hibával'
- #Raidtelenítés
- elif [ "$MENU" = "Raidtelenítés" ]; then
- echo "Kamikazee.."
- echo "Melyik eszközt raidtelenítsük? (pl.: sda)"
- read ANTIRAID
- dmraid -r -E /dev/$ANTIRAID
- #end Tömb törlése 'hibával'
- else
- echo Nincs ilyen menüpont.
- fi
- done
- }
- ######################################################################
- mkdir /etc/scripts
- install
Advertisement
Add Comment
Please, Sign In to add comment