Compare commits

...

44 Commits

Author SHA1 Message Date
garywill
b4cbcbdbbb is_same_netns: handle if not same pidns 2025-08-16 10:09:08 +08:00
Phani Pavan K
205814a2ea lint remove stray spaces 2025-07-28 14:21:56 +08:00
Phani Pavan Kambhampati
b6fe527472
WiFi 6 Support (#82)
* add options for wifi66

* rebase to 0.7.6 and upgrade version to 0.8.0-unstable0

* fix channel detection

* can_transmit_to_channel: fix 5GHz and 6GHz freq range

* can_transmit_to_channel: limit freq integer part to 4 digits

* enable wmm when wifi 6 is enabled

* lint remove stray spaces

* Revert "lint remove stray spaces"

This reverts commit 8830b95cffc460cb19769630581e029c2be56f05.

---------

Co-authored-by: garywill <garywill@disroot.org>
Co-authored-by: Phani Pavan K <kphanipavan+goose@gmail.com>
2025-07-28 06:16:57 +00:00
garywill
94949ba40b show freq band and channel 2025-07-27 14:12:21 +08:00
garywill
9df05cd81a dependency: crda ,regdb 2025-07-27 13:42:50 +08:00
garywill
01c99f8e4c show config dir at start 2025-07-27 13:03:47 +08:00
garywill
3900871977 add --keep-confdir 2025-07-27 12:55:28 +08:00
garywill
cfeadeb3bd start/exit time in temp config dir 2025-07-27 12:52:59 +08:00
garywill
702c4f28f5 global variable PHY 2025-07-26 10:50:10 +08:00
garywill
3e23e0bd0c refractor freq to channel function (for 2.4G, 5G, 6G) 2025-07-26 10:17:26 +08:00
garywill
fe2348a725 some aa-complain improve 2024-12-18 20:52:53 +08:00
ByteSnipers GmbH
7b374d1ee1 Fix a bug with complian command
added support for aa-complian.
2024-12-18 12:50:44 +00:00
garywill
e7ecf8707d 0.7.6 2024-10-04 12:17:39 +08:00
garywill
fbad56f05c get_pid_by_dbus_name() : fix stderr show 2024-04-20 20:48:05 +08:00
garywill
c376609896 readme text 2024-04-20 20:46:05 +08:00
garywill
a8ae765f03 fix type #73 2024-04-20 20:45:53 +08:00
garywill
d39b438161 0.7.6b 2024-02-25 10:00:00 +08:00
garywill
6aabef278b Detect firewalld and make sure it won't interfere 2024-02-25 10:00:00 +08:00
garywill
8b57dcef1a judge netns 2024-02-25 10:00:00 +08:00
garywill
1def3deb96 improve nm running judgement. use dbus also 2024-02-25 10:00:00 +08:00
garywill
04f473dc64 call disable_unwanted_forward() early 2024-02-25 10:00:00 +08:00
garywill
c1bb2668dd 0.7.5b 2024-02-25 10:00:00 +08:00
garywill
a4e3089e69 disable unwanted forwarding 2024-02-25 10:00:00 +08:00
garywill
8c9e16dd17 explictly ban unwanted forwardings in start_nat() 2024-02-25 10:00:00 +08:00
garywill
40872ebb9e exclude 6 if not enabled 2024-02-25 10:00:00 +08:00
garywill
97b1ef5bd0 merge for start_redsocks() 2024-02-25 10:00:00 +08:00
garywill
9fc74d4bdb add missing local vars 2024-02-25 10:00:00 +08:00
garywill
8759ee43f1 merge for start_catch_dns() 2024-02-25 10:00:00 +08:00
garywill
5f24246e85 merge for allow_dns_port() 2024-02-25 10:00:00 +08:00
garywill
508fefa48f rename GATEWAY to GATEWAY4 2024-02-25 10:00:00 +08:00
garywill
791f6c314b merge for start_ban_lan() 2024-02-25 10:00:00 +08:00
garywill
4db9dcbdb0 merge iptables operation 4 and 6 for start_nat() 2024-02-25 10:00:00 +08:00
garywill
97269da898 use var SUBNET_NET4 , SUBNET_NET6 2024-02-25 10:00:00 +08:00
garywill
9c9b3afde6 use array for iptables custom chain 2024-02-25 10:00:00 +08:00
garywill
3d3a63d53b version 0.7.3 2024-01-19 14:33:25 +08:00
garywill
0274cd339b Merge branch 2024-01-19 14:26:36 +08:00
garywill
32f168ec8c can_transmit_to_channel() ignores freq value just focus on channel number 2024-01-19 13:50:34 +08:00
Zehka
f42dc4314d regex fixes 2024-01-16 13:26:52 +01:00
Zehka
78d481d083 also ignore trailing \.0+ for iw phy info 2024-01-16 00:59:41 +01:00
Zehka
34e326f303 Remove trailing .0 from iw reported frequency
Signed-off-by: Zehka <git@zehka.net>
2024-01-16 00:32:56 +01:00
garywill
cbaa19db72 improve pci info format 2024-01-14 20:25:06 +08:00
garywill
a86517294b readme 2024-01-14 20:20:50 +08:00
garywill
9790d3117b show current pci driver 2024-01-14 09:27:36 +08:00
garywill
e65228750b apply some spellcheck 2024-01-14 08:49:38 +08:00
2 changed files with 682 additions and 485 deletions

View File

@ -25,6 +25,7 @@ Basic features:
- Transparent proxy (redsocks)
- Transparent DNS proxy (hijack port 53 packets)
- Detect NetworkManager and make sure it won't interfere (handle interface (un)managed status)
- Detect firewalld and make sure it won't interfere our (by using `trusted` zone)
- You can run many instances, to create many different networks. Has instances managing feature.
**For many other features, see below [CLI usage](#cli-usage-and-other-features)**
@ -66,7 +67,7 @@ Internet----(eth0/wlan0)-Linux-(virtual interface)-----VM/container
1-file-script. Release on [Linux-router repo on Github](https://github.com/garywill/linux-router). Just download and run the bash script (meet the dependencies). In this case use without installation.
> I'm currently not packaging for any distro. If you do, open a PR and add the link (can be with a version badge) to list here
I'm currently not packaging for any distro. If you do, open a PR and add the link (can be with a version badge) to list here
| Linux distro | |
| ------------ | ---------------------------------------------------------------------------------------------------------- |
@ -81,9 +82,9 @@ Internet----(eth0/wlan0)-Linux-(virtual interface)-----VM/container
- iptables (or nftables with `iptables-nft` translation linked)
- WiFi hotspot dependencies
- hostapd
- iw
- iwconfig (you only need this if 'iw' can not recognize your adapter)
- iw (or iwconfig, when iw can not recognize adapter)
- haveged (optional)
- crda and wireless-regdb (optional)
@ -91,7 +92,7 @@ Internet----(eth0/wlan0)-Linux-(virtual interface)-----VM/container
### Provide Internet to an interface
```
```bash
sudo lnxrouter -i eth1
```
@ -99,7 +100,7 @@ no matter which interface (other than `eth1`) you're getting Internet from.
### Create WiFi hotspot
```
```bash
sudo lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase
```
@ -111,16 +112,14 @@ Clients access Internet through only `isp5`
<details>
```
```bash
sudo lnxrouter -i eth1 -o isp5 --no-dns --dhcp-dns 1.1.1.1 -6 --dhcp-dns6 [2606:4700:4700::1111]
```
> In this case of usage, it's recommended to:
>
> 1. Stop serving local DNS
> 2. Tell clients which DNS to use ISP5's DNS. (Or, a safe public DNS, like above example)
> Also, read *Notice 1*
> 2. Tell clients which DNS to use (ISP5's DNS. Or, a safe public DNS, like above example)
</details>
@ -128,12 +127,13 @@ sudo lnxrouter -i eth1 -o isp5 --no-dns --dhcp-dns 1.1.1.1 -6 --dhcp-dns6 [26
<details>
```
```bash
sudo lnxrouter -n -i eth1
sudo lnxrouter -n --ap wlan0 MyAccessPoint -p MyPassPhrase
```
> Read _Notice 1_
```bash
sudo lnxrouter -n --ap wlan0 MyAccessPoint -p MyPassPhrase
```
</details>
@ -143,7 +143,7 @@ sudo lnxrouter -n --ap wlan0 MyAccessPoint -p MyPassPhrase
Create a bridge
```
```bash
sudo brctl addbr lxcbr5
```
@ -156,7 +156,7 @@ lxc.network.link = lxcbr5
lxc.network.hwaddr = xx:xx:xx:xx:xx:xx
```
```
```bash
sudo lnxrouter -i lxcbr5
```
@ -168,7 +168,7 @@ All clients' Internet traffic go through, for example, Tor (notice this example
<details>
```
```bash
sudo lnxrouter -i eth1 --tp 9040 --dns 9053 -g 192.168.55.1 -6 --p6 fd00:5:6:7::
```
@ -193,7 +193,7 @@ To not give our infomation to clients. Clients can still access Internet.
<details>
```
```bash
sudo lnxrouter -i eth1 \
--tp 9040 --dns 9053 \
--random-mac \
@ -211,13 +211,13 @@ sudo lnxrouter -i eth1 \
Create a bridge
```
```bash
sudo brctl addbr lxdbr5
```
Create and add a new LXD profile overriding container's `eth0`
```
```bash
lxc profile create profile5
lxc profile edit profile5
@ -235,13 +235,13 @@ name: profile5
lxc profile add <container> profile5
```
```
```bash
sudo lnxrouter -i lxdbr5 --tp 9040 --dns 9053
```
To remove that new profile from container
```
```bash
lxc profile remove <container> profile5
```
@ -249,13 +249,13 @@ lxc profile remove <container> profile5
Add new `eth0` to container overriding default `eth0`
```
```bash
lxc config device add <container> eth0 nic name=eth0 nictype=bridged parent=lxdbr5
```
To remove the customized `eth0` to restore default `eth0`
```
```bash
lxc config device remove <container> eth0
```
@ -267,7 +267,7 @@ lxc config device remove <container> eth0
In VirtualBox's global settings, create a host-only network `vboxnet5` with DHCP disabled.
```
```bash
sudo lnxrouter -i vboxnet5 --tp 9040 --dns 9053
```
@ -279,11 +279,11 @@ sudo lnxrouter -i vboxnet5 --tp 9040 --dns 9053
Create a bridge
```
```bash
sudo brctl addbr firejail5
```
```
```bash
sudo lnxrouter -i firejail5 -g 192.168.55.1 --tp 9040 --dns 9053
firejail --net=firejail5 --dns=192.168.55.1 --blacklist=/var/run/nscd
```
@ -309,17 +309,16 @@ Options:
and to provide Internet to
(To create WiFi hotspot use '--ap' instead)
-o <interface> Specify an inteface to provide Internet from.
(See Notice 1)
(Note using this with default DNS option may leak
queries to other interfaces)
-n Do not provide Internet (See Notice 1)
-n Do not provide Internet
--ban-priv Disallow clients to access my private network
-g <ip> This host's IPv4 address in subnet (mask is /24)
(example: '192.168.5.1' or '5' shortly)
-6 Enable IPv6 (NAT)
--no4 Disable IPv4 Internet (not forwarding IPv4)
(See Notice 1). Usually used with '-6'
--no4 Disable IPv4 Internet (not forwarding IPv4).
Usually used with '-6'
--p6 <prefix> Set IPv6 LAN address prefix (length 64)
(example: 'fd00:0:0:5::' or '5' shortly)
@ -328,7 +327,7 @@ Options:
--dns <ip>|<port>|<ip:port>
DNS server's upstream DNS.
Use ',' to seperate multiple servers
(default: use /etc/resolve.conf)
(default: use /etc/resolv.conf)
(Note IPv6 addresses need '[]' around)
--no-dns Do not serve DNS
--no-dnsmasq Disable dnsmasq server (DHCP, DNS, RA)
@ -415,12 +414,11 @@ Options:
--stop <id> Stop a running instance
For <id> you can use PID or subnet interface name.
You can get them with '--list-running'
Notice 1: This script assume your host's default policy won't forward
packets, so the script won't explictly ban forwarding in any
mode. In some unexpected case (eg. mistaken configurations) may
cause unwanted packets leakage between 2 networks, which you
should be aware of if you want isolated network
Examples:
lnxrouter -i eth1
lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase
lnxrouter -i eth1 --tp <transparent-proxy> --dns <dns-proxy>
```
</details>
@ -452,30 +450,9 @@ Visit [**my homepage** 🏡](https://garywill.github.io) to see **more tools and
- 🍃 Also some [unfulfilled enhancements in the Issues](https://github.com/garywill/linux-router/issues?q=is%3Aissue+is%3Aopen+label%3Aenhancement)
- 🙋‍♂️ Contributions are not limited to coding. There're [some posts and questions](https://github.com/garywill/linux-router/issues) that need more people to answer
## Notice
<details>
```
Notice 1: This script assume your host's default policy won't forward
packets, so the script won't explictly ban forwarding in any
mode. In some unexpected case (eg. mistaken configurations) may
cause unwanted packets leakage between 2 networks, which you
should be aware of if you want isolated network
```
</details>
## TODO
Sooner is better:
- Detect firewalld and make sure it won't interfere our interface
Future:
- WPA3
- Global IPv6
- Explictly ban forwarding if not needed
- Bring bridging method back
## License

1076
lnxrouter

File diff suppressed because it is too large Load Diff