Tillbaka till svenska Fidonet
English   Information   Debug  
ENET.SOFT   0/11701
ENET.SYSOP   33805
ENET.TALKS   0/32
ENGLISH_TUTOR   0/2000
EVOLUTION   0/1335
FDECHO   0/217
FDN_ANNOUNCE   0/7068
FIDONEWS   23541
FIDONEWS_OLD1   0/49742
FIDONEWS_OLD2   0/35949
FIDONEWS_OLD3   0/30874
FIDONEWS_OLD4   0/37224
FIDO_SYSOP   12847
FIDO_UTIL   0/180
FILEFIND   0/209
FILEGATE   0/212
FILM   0/18
FNEWS_PUBLISH   4193
FN_SYSOP   41525
FN_SYSOP_OLD1   71952
FTP_FIDO   0/2
FTSC_PUBLIC   0/13585
FUNNY   0/4886
GENEALOGY.EUR   0/71
GET_INFO   105
GOLDED   0/408
HAM   0/16053
HOLYSMOKE   0/6791
HOT_SITES   0/1
HTMLEDIT   0/71
HUB203   466
HUB_100   264
HUB_400   39
HUMOR   0/29
IC   0/2851
INTERNET   0/424
INTERUSER   0/3
IP_CONNECT   719
JAMNNTPD   0/233
JAMTLAND   0/47
KATTY_KORNER   0/41
LAN   0/16
LINUX-USER   0/19
LINUXHELP   0/1155
LINUX   0/22012
LINUX_BBS   0/957
mail   18.68
mail_fore_ok   249
MENSA   0/341
MODERATOR   0/102
MONTE   0/992
MOSCOW_OKLAHOMA   0/1245
MUFFIN   0/783
MUSIC   0/321
N203_STAT   900
N203_SYSCHAT   313
NET203   321
NET204   69
NET_DEV   0/10
NORD.ADMIN   0/101
NORD.CHAT   0/2572
NORD.FIDONET   189
NORD.HARDWARE   0/28
NORD.KULTUR   0/114
NORD.PROG   0/32
NORD.SOFTWARE   0/88
NORD.TEKNIK   0/58
NORD   0/453
OCCULT_CHAT   0/93
OS2BBS   0/787
OS2DOSBBS   0/580
OS2HW   0/42
OS2INET   0/37
OS2LAN   0/134
OS2PROG   0/36
OS2REXX   0/113
OS2USER-L   207
OS2   0/4785
OSDEBATE   0/18996
PASCAL   0/490
PERL   0/457
PHP   0/45
POINTS   0/405
POLITICS   0/29554
POL_INC   0/14731
PSION   103
R20_ADMIN   1117
R20_AMATORRADIO   0/2
R20_BEST_OF_FIDONET   13
R20_CHAT   0/893
R20_DEPP   0/3
R20_DEV   399
R20_ECHO2   1379
R20_ECHOPRES   0/35
R20_ESTAT   0/719
R20_FIDONETPROG...
...RAM.MYPOINT
  0/2
R20_FIDONETPROGRAM   0/22
R20_FIDONET   0/248
R20_FILEFIND   0/24
R20_FILEFOUND   0/22
R20_HIFI   0/3
R20_INFO2   2794
R20_INTERNET   0/12940
R20_INTRESSE   0/60
R20_INTR_KOM   0/99
R20_KANDIDAT.CHAT   42
R20_KANDIDAT   28
R20_KOM_DEV   112
R20_KONTROLL   0/13064
R20_KORSET   0/18
R20_LOKALTRAFIK   0/24
R20_MODERATOR   0/1852
R20_NC   76
R20_NET200   245
R20_NETWORK.OTH...
...ERNETS
  0/13
R20_OPERATIVSYS...
...TEM.LINUX
  0/44
R20_PROGRAMVAROR   0/1
R20_REC2NEC   534
R20_SFOSM   0/340
R20_SF   0/108
R20_SPRAK.ENGLISH   0/1
R20_SQUISH   107
R20_TEST   2
R20_WORST_OF_FIDONET   12
RAR   0/9
RA_MULTI   106
RA_UTIL   0/162
REGCON.EUR   0/2055
REGCON   0/13
SCIENCE   0/1206
SF   0/239
SHAREWARE_SUPPORT   0/5146
SHAREWRE   0/14
SIMPSONS   0/169
STATS_OLD1   0/2539.065
STATS_OLD2   0/2530
STATS_OLD3   0/2395.095
STATS_OLD4   0/1692.25
SURVIVOR   0/495
SYSOPS_CORNER   0/3
SYSOP   0/84
TAGLINES   0/112
TEAMOS2   0/4530
TECH   0/2617
TEST.444   0/105
TRAPDOOR   0/19
TREK   0/755
TUB   0/290
UFO   0/40
UNIX   0/1316
USA_EURLINK   0/102
USR_MODEMS   0/1
VATICAN   0/2740
VIETNAM_VETS   0/14
VIRUS   0/378
VIRUS_INFO   0/201
VISUAL_BASIC   0/473
WHITEHOUSE   0/5187
WIN2000   0/101
WIN32   0/30
WIN95   0/4277
WIN95_OLD1   0/70272
WINDOWS   0/1517
WWB_SYSOP   0/419
WWB_TECH   0/810
ZCC-PUBLIC   0/1
ZEC   4

 
4DOS   0/134
ABORTION   0/7
ALASKA_CHAT   0/506
ALLFIX_FILE   0/1313
ALLFIX_FILE_OLD1   0/7997
ALT_DOS   0/152
AMATEUR_RADIO   0/1039
AMIGASALE   0/14
AMIGA   0/331
AMIGA_INT   0/1
AMIGA_PROG   0/20
AMIGA_SYSOP   0/26
ANIME   0/15
ARGUS   0/924
ASCII_ART   0/340
ASIAN_LINK   0/651
ASTRONOMY   0/417
AUDIO   0/92
AUTOMOBILE_RACING   0/105
BABYLON5   0/17862
BAG   135
BATPOWER   0/361
BBBS.ENGLISH   0/382
BBSLAW   0/109
BBS_ADS   0/5290
BBS_INTERNET   0/507
BIBLE   0/3563
BINKD   0/1119
BINKLEY   0/215
BLUEWAVE   0/2173
CABLE_MODEMS   0/25
CBM   0/46
CDRECORD   0/66
CDROM   0/20
CLASSIC_COMPUTER   0/378
COMICS   0/15
CONSPRCY   0/899
COOKING   28499
COOKING_OLD1   0/24719
COOKING_OLD2   0/40862
COOKING_OLD3   0/37489
COOKING_OLD4   0/35496
COOKING_OLD5   9370
C_ECHO   0/189
C_PLUSPLUS   0/31
DIRTY_DOZEN   0/201
DOORGAMES   0/2016
DOS_INTERNET   0/196
duplikat   6000
ECHOLIST   0/18295
EC_SUPPORT   0/318
ELECTRONICS   0/359
ELEKTRONIK.GER   1534
ENET.LINGUISTIC   0/13
ENET.POLITICS   0/4
Möte FIDONEWS_OLD3, 30874 texter
 lista första sista föregående nästa
Text 21497, 298 rader
Skriven 2011-08-01 01:39:41 av FidoNews Robot (2:2/2.0)
Ärende: FidoNews 28:31 [02/05]: General Articles
================================================
=================================================================
                        GENERAL ARTICLES
=================================================================

                A SECOND LIFE FOR THE LINKSYS  Part 1
                By Michiel van der Vlist 2:280/5555


Some five years ago, I joined the family of FON and I obtained a
Linksys WRT54GL, flashed with FON software, for a bargain. It has been
humming quitly away for almost five years. In March I got a Fonera
SIMPL, so I replaced the Linksys.

As you may have noticed from previous articles, I am an IPv6 advocate.
I have been experimenting with IPv6 for some time now. I started out
with a tunnel from SixXs. The idea was to have the tunnel terminate on
the machine that was going to host my web server and my Fido System. A
machine that would run 24/7 anyway.

The tunnel works fine for providing IPv6 connectivity to that machine,
but my plan to have it function as an IPv6 router to provide IPv6
connectivity to other machine on the LAN failed. It turned out that an
AYIYA tunnel running on a Windows machine can not route a subnet.

So I choose another approach. Why not let the routing be done by some-
thing that was designed for it in the first place: a router? With the
help of some guys in a Dutch IPv6 forum, I found a version of OpenWRT
that supports IPv6 and that can run on the Linksys. The binary image
can be found here:

http://www.vlist.eu/downloads/openwrt-wrt54g-squashfs-r25759.bin

Before you flash your linksys with this image be advised that the
WRT54GL has only 4 MB flash ROM available and the IPv6 add-ons need
memory space. So some compromise had to be made. This version does not
have a web interface, it is command line only. For most of us, that
should not be a problem, us FidoNetters have been using the command
line for ages. Also be warned that there is no easy "go back to
factory defaults button". Frankly, I do not even know how to go back
to the original firmware. I haven't felt the need yet, it is working
fine, so why fix what ain't broken?

No web interface, so you need a telnet/ssh client to access the
router. Telnet to 192.168.1.1 and you will get a prompt. The first
thing you will have to do is to configure a password for user root. It
won't let you do much, other than to use the "passwd" command for
entering a password after first startup.

Once you have configured a password for root, the Telnet interface is
disabled and you can only access the router with ssh. So get yourself
an ssh client first. A suitable one for windows is putty. To be found
here: www.putty.org. Putty BTW, is IPv6 capable.

With ssh you can log in as user root and the password you supplied.
Write down the password! There is no easy recovery if you forget the
password.
To my surprise I found that not only did I have a router, but I had a
complete Linux system at my hands. The idea of running a disk OS on a
stand-alone dedicated system - as I see a router - was completely new
to me and my first reaction when I saw the command line prompt was a
bit similar to what happened when I started up that PDP-8 some forty
five years years ago: Ok, it started up. Now what?

So I tried "dir" and "type". Eh.. sorry, this isn't CP/M, FLEX or
MS-DOS. It is linux and the commands are "ls" and "cat" from now on.
Ok...

Many of the standard Linux commands work. The entire configuration is
done by editing text files with a text editor. Weird idea for a stand
alone dedicated system, but I got used to it quickly.

The first thing of course was to get it configured properly for IPv4.
The machines on the LAN running servers needed a permanent address. So
we have to edit some files. We want the dhcp server to always issue
the same (semi-fixed) address to the machine named Fido. The package
comes with an editor called nano, so we enter the following command:

nano /etc/config/dhcp

And we add the following lines to the file:

[code]

config  host
        option ip       '192.168.1.2'
        option mac      '00:04:76:8C:25:3C'
        option name     Fido

[/code]

Note that the address must be ouside the normal dhcp pool which
defaults to 100-150. Set the MAC address to the one on the NIC of the
system in question

Note that changes do not take effect until the router is rebooted.

Next step is the forwarding of port 80 and port 25445.  This is done
by adding the following lines to the file /ect/config/firewall

[code]

# forward port 80 and port 24554 to Fido

config  redirect                http
        option src              wan
        option dest             lan
        option src_dport        80
        option dest_port        80
        option dest_ip          192.168.1.2
        option proto            tcp

config  redirect                binkp
        option src              wan
        option dest             lan
        option src_dport        24554
        option dest_port        24554
        option dest_ip          192.168.1.2
        option proto            tcp

[/code]

If you want to use Wifi, it has to be enabled as it is disabled by
default. In the  file /etc/config/wireless:

[code]

config 'wifi-device' 'radio0'
        option 'type' 'mac80211'
        option 'channel' '11'
        option 'macaddr' '00:16:b6:da:3a:b5'
        option 'hwmode' '11g'
        option 'disabled' '1'

config 'wifi-iface'
        option 'device' 'radio0'
        option 'network' 'lan'
        option 'mode' 'ap'
        option 'ssid' 'OpenWrt'
        option 'encryption' 'none'

[/code]

Change "option 'disabled' '1'"  to "option 'disabled' '0'"

That will enable the radio, but it is highly recommended to enable
encryption as well.

Change "option 'encryption' 'none'" to "option 'encryption' 'psk2'" to
enable WPA2 encryption. 'wpa2' as option is for WPA2 with a radius
server.

Specify the key with:

[code]
        option 'key' '<insert passfrase here>'
[/code]

You may want to change the channel number and the ssid. Also the para-
meter "11g" may be changed to "11bg" if you also want to support older
11b clients.

As always, changes do not take effect until the router is rebooted.

That takes care of my IPv4 settings.


Next step is to configure a 6in4 tunnel.

If your ISP does not provide native IPv6 you will need to set up a
tunnel. Some ISP's offer tunnels, but if yours does not, you will need
a third party tunnel broker. Both SixXs and Hurricane Electric offer
free tunnels. So set up an account with either one of them (or both)
and apply for a tunnel. For this tunnel I choose Hurricane Electric,
because unlike SixXs, they do not let you jump through any hoops. Just
go to tunnelbroker.net, create an account, choose a site for the
tunnel ingress and apply for a tunnel. A Hurricane Electric tunnel
comes with a /64 subnet by default. But you can also get a /48. We do
not need that. Yet...

For a static he.net tunnel, you need a static or semi-static IPv4
address.

To configure the tunnel on the Linksys, add the following to
/etc/config/network

[code]

####  The he.net tunnel
config  interface       henet
        option proto    6in4
        option peeraddr 216.66.84.46
        option ip6addr  2001:470:1f14:1117::2/64
        option tunnelid XXXXXX
        option username xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
        option password xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

[/code]

For "peeraddr" substitute the Server IPv4 address that the tunnel
broker has given you. For ip6addr substitute the client IPv6 address
that the the tunnel broker gave you. Note that this is te address of
you tunnel end point, not the subnet. Also do not ommit the /64, it
won't work without it. For tunnel ID substitie the decimal tunnel ID
number as supplied by the tunnel broker.

For Username substitute the 32 digit hex number that is found as "User
ID" on your account info page of tunnelbroker.net

The password should be a 32 digit hex number that is the MD5 hash of
your password for the tunnel broker. So how do we get that? The
Linksys will give it to you!

Type "echo -n '<your password>' | md5sum" at the command line and
there it is. Ain't that magic?

Rebot the router thave the changes take effect.

Now you should be able to ping6 ipv6 hosts from the router's command
line.

You can try to ping mine by typing:

[code]

root@OpenWrt:/# ping6 wrt6.vlist.eu
PING wrt6.vlist.eu (2001:470:1f14:1117::2): 56 data bytes
64 bytes from 2001:470:1f14:1117::2: seq=0 ttl=64 time=1.243 ms
64 bytes from 2001:470:1f14:1117::2: seq=1 ttl=64 time=1.358 ms
64 bytes from 2001:470:1f14:1117::2: seq=2 ttl=64 time=1.140 ms
64 bytes from 2001:470:1f14:1117::2: seq=3 ttl=64 time=1.142 ms
^C

[/code]

If you get this result your tunnel is working. To enable incoming
pings however you need to open the firewall for protocol 41. Protocol
41 is the protocol used for 6in4 tunneling. The firewall of openwrt is
closed for all unsollicited incoming packets by default. Bij pinging
out over IPv6, the firewall is opened for protocol 41, and it can be
pinged from outside, but it closes again after a minute or two. Add
the following lines to /etc/config/firewall to keep the tunnel open
permanently:

[code]

# Accept proto 41 so it always reaches the tunnel endpoint

config  rule
        option  src     wan
        option  proto   41
        option  target  ACCEPT

[/code]

To check if your router is pingable from outside, you can use a
looking glass server. Here is one: http://leasewebnoc.com/lg/html.

As a last step you have to configure the firewall to also apply the
firewall rules to the IPv6 tunnel.

In the file /etc/config/firewall  find this section:

[code]

config zone
        option name     wan
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option masq     1
        option mtu_fix  1

[/code]

And add this line after the second line:

[code]

# to have IPv6 firewall rules apply to the tunnel

        option network  'wan henet'

[/code]


This completes the setup of the tunnel on the linksys. Next week's
article will describe how to let the router issue global IPv6 adresses
from a subnet to your machines on the LAN.






-----------------------------------------------------------------

--- Azure/NewsPrep 3.0
 * Origin: Home of the Fidonews (2:2/2.0)