freebsd-skq/etc/rc.d/network3
Joerg Wunsch 8a173970c1 Add some special hooks for sppp(4) interfaces. In addition to the
normal ifconfig stuff, one might need to pass down authentication
parameters for them.

This is closely tied to Hellmuth's impending rc patches for ISDN, but
sppp can also be used separately (thus it doesn't go directly into the
planned ISDN section of rc.conf).

Reviewed by:	hm
1999-01-13 17:32:37 +00:00

329 lines
9.6 KiB
Bash

#!/bin/sh -
#
# $Id: rc.network,v 1.38 1999/01/13 08:20:55 hm Exp $
# From: @(#)netstart 5.9 (Berkeley) 3/30/91
# Note that almost all the user-configurable behavior is no longer in
# this file, but rather in /etc/rc.conf. Please check that file
# first before contemplating any changes here. If you do need to change
# this file for some reason, we would like to know about it.
# First pass startup stuff.
network_pass1() {
echo -n 'Doing initial network setup:'
# Set the host name if it is not already set
if [ -z "`hostname -s`" ] ; then
hostname $hostname
echo -n ' hostname'
fi
# Set the domainname if we're using NIS
if [ -n "$nisdomainname" -a "x$nisdomainname" != "xNO" ] ; then
domainname $nisdomainname
echo -n ' domain'
fi
echo '.'
# Initial ATM interface configuration
if [ "X${atm_enable}" = X"YES" -a -f /etc/rc.atm ]; then
. /etc/rc.atm
atm_pass1
fi
# ISDN subsystem startup
if [ "X${isdn_enable}" = X"YES" -a -f /etc/rc.isdn ]; then
. /etc/rc.isdn
fi
# Special options for sppp(4) interfaces go here. These need
# to go _before_ the general ifconfig section, since in the case
# of hardwired (no link1 flag) but required authentication, you
# cannot pass auth parameters down to the already running interface.
for ifn in ${sppp_interfaces}; do
eval spppcontrol_args=\$spppconfig_${ifn}
if [ -n "${spppcontrol_args}" ] ; then
# The auth secrets might contain spaces; in order
# to retain the quotation, we need to eval them
# here.
eval spppcontrol ${ifn} ${spppcontrol_args}
fi
done
# Set up all the network interfaces, calling startup scripts if needed
for ifn in ${network_interfaces}; do
if [ -e /etc/start_if.${ifn} ]; then
. /etc/start_if.${ifn}
fi
# Do the primary ifconfig if specified
eval ifconfig_args=\$ifconfig_${ifn}
if [ -n "${ifconfig_args}" ] ; then
ifconfig ${ifn} ${ifconfig_args}
fi
# Check to see if aliases need to be added
alias=0
while :
do
eval ifconfig_args=\$ifconfig_${ifn}_alias${alias}
if [ -n "${ifconfig_args}" ]; then
ifconfig ${ifn} ${ifconfig_args} alias
alias=`expr ${alias} + 1`
else
break;
fi
done
# Do ipx address if specified
eval ifconfig_args=\$ifconfig_${ifn}_ipx
if [ -n "${ifconfig_args}" ]; then
ifconfig ${ifn} ${ifconfig_args}
fi
ifconfig ${ifn}
done
# Initialize IP filtering using ipfw
echo ""
/sbin/ipfw -q flush > /dev/null 2>&1
if [ $? = 0 ] ; then
firewall_in_kernel=1
else
firewall_in_kernel=0
fi
if [ $firewall_in_kernel = 0 -a "x$firewall_enable" = "xYES" ] ; then
if kldload ipfw; then
firewall_in_kernel=1 # module loaded successfully
echo "Kernel firewall module loaded."
else
echo "Warning: firewall kernel module failed to load."
fi
fi
# Load the filters if required
if [ $firewall_in_kernel = 1 ]; then
if [ -n "$firewall_enable" -a -f /etc/rc.firewall -a \
"x$firewall_enable" = "xYES" ] ; then
. /etc/rc.firewall
echo "Firewall rules loaded."
else
IPFW_DEFAULT=`ipfw l 65535`
if [ "$IPFW_DEFAULT" = "65535 deny ip from any to any" ]; then
echo -n "Warning: kernel has firewall functionality, "
echo "but firewall rules are not enabled."
echo " All ip services are disabled."
fi
fi
fi
# Additional ATM interface configuration
if [ -n "${atm_pass1_done}" ]; then
atm_pass2
fi
# Configure routing
if [ "x$defaultrouter" != "xNO" ] ; then
static_routes="default ${static_routes}"
route_default="default ${defaultrouter}"
fi
# Set up any static routes. This should be done before router discovery.
if [ "x${static_routes}" != "x" ]; then
for i in ${static_routes}; do
eval route_args=\$route_${i}
route add ${route_args}
done
fi
echo -n 'Additional routing options:'
if [ -n "$tcp_extensions" -a "x$tcp_extensions" != "xYES" ] ; then
echo -n ' tcp extensions=NO'
sysctl -w net.inet.tcp.rfc1323=0 >/dev/null 2>&1
fi
if [ X"$icmp_bmcastecho" = X"YES" ]; then
echo -n ' broadcast ping responses=YES'
sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null 2>&1
fi
if [ "X$gateway_enable" = X"YES" ]; then
echo -n ' IP gateway=YES'
sysctl -w net.inet.ip.forwarding=1 >/dev/null 2>&1
fi
if [ "X$forward_sourceroute" = X"YES" ]; then
echo -n ' do source routing=YES'
sysctl -w net.inet.ip.sourceroute=1 >/dev/null 2>&1
fi
if [ "X$accept_sourceroute" = X"YES" ]; then
echo -n ' accept source routing=YES'
sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null 2>&1
fi
if [ "X$ipxgateway_enable" = X"YES" ]; then
echo -n ' IPX gateway=YES'
sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null 2>&1
fi
if [ "X$arpproxy_all" = X"YES" ]; then
echo -n ' enabling ARP_PROXY_ALL: '
sysctl -w net.link.ether.inet.proxyall=1 2>&1
fi
echo '.'
echo -n 'routing daemons:'
if [ "X$router_enable" = X"YES" ]; then
echo -n " ${router}"; ${router} ${router_flags}
fi
if [ "X$ipxrouted_enable" = X"YES" ]; then
echo -n ' IPXrouted'
IPXrouted ${ipxrouted_flags} > /dev/null 2>&1
fi
if [ "X${mrouted_enable}" = X"YES" ]; then
echo -n ' mrouted'; mrouted ${mrouted_flags}
fi
if [ "X$rarpd_enable" = X"YES" ]; then
echo -n ' rarpd'; rarpd ${rarpd_flags}
fi
echo '.'
network_pass1_done=YES # Let future generations know we made it.
}
network_pass2() {
echo -n 'Doing additional network setup:'
if [ "X${named_enable}" = X"YES" ]; then
echo -n ' named'; ${named_program-"named"} ${named_flags}
fi
if [ "X${ntpdate_enable}" = X"YES" ]; then
echo -n ' ntpdate'; ${ntpdate_program} ${ntpdate_flags} >/dev/null 2>&1
fi
if [ "X${xntpd_enable}" = X"YES" ]; then
echo -n ' xntpd'; ${xntpd_program} ${xntpd_flags}
fi
if [ "X${timed_enable}" = X"YES" ]; then
echo -n ' timed'; timed ${timed_flags}
fi
if [ "X${portmap_enable}" = X"YES" ]; then
echo -n ' portmap'; portmap ${portmap_flags}
fi
# Start ypserv if we're an NIS server.
# Run rpc.ypxfrd and rpc.yppasswdd only on the NIS master server.
if [ "X${nis_server_enable}" = X"YES" ]; then
echo -n ' ypserv'; ypserv ${nis_server_flags}
if [ "X${nis_ypxfrd_enable}" = X"YES" ]; then
echo -n ' rpc.ypxfrd'; rpc.ypxfrd ${nis_ypxfrd_flags}
fi
if [ "X${nis_yppasswdd_enable}" = X"YES" ]; then
echo -n ' rpc.yppasswdd'; rpc.yppasswdd ${nis_yppasswdd_flags}
fi
fi
# Start ypbind if we're an NIS client
if [ "X${nis_client_enable}" = X"YES" ]; then
echo -n ' ypbind'; ypbind ${nis_client_flags}
if [ "X${nis_ypset_enable}" = X"YES" ]; then
echo -n ' ypset'; ypset ${nis_ypset_flags}
fi
fi
# Start keyserv if we are running Secure RPC
if [ "X${keyserv_enable}" = X"YES" ]; then
echo -n ' keyserv'; keyserv ${keyserv_flags}
fi
# Start ypupdated if we are running Secure RPC and we are NIS master
if [ "X$rpc_ypupdated_enable" = X"YES" ]; then
echo -n ' rpc.ypupdated'; rpc.ypupdated
fi
# Start ATM daemons
if [ -n "${atm_pass2_done}" ]; then
atm_pass3
fi
echo '.'
network_pass2_done=YES
}
network_pass3() {
echo -n 'Starting final network daemons:'
if [ "X${nfs_server_enable}" = X"YES" -a -r /etc/exports ]; then
echo -n ' mountd'
if [ "X${weak_mountd_authentication}" = X"YES" ]; then
mountd_flags="-n"
fi
mountd ${mountd_flags}
if [ "X${nfs_reserved_port_only}" = X"YES" ]; then
sysctl -w vfs.nfs.nfs_privport=1 >/dev/null 2>&1
fi
echo -n ' nfsd'; nfsd ${nfs_server_flags}
if [ "X$rpc_lockd_enable" = X"YES" ]; then
echo -n ' rpc.lockd'; rpc.lockd
fi
if [ "X$rpc_statd_enable" = X"YES" ]; then
echo -n ' rpc.statd'; rpc.statd
fi
fi
if [ "X${nfs_client_enable}" = X"YES" ]; then
echo -n ' nfsiod'; nfsiod ${nfs_client_flags}
if [ "X${nfs_access_cache}" != X ]; then
sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} \
>/dev/null 2>&1
fi
fi
if [ "X${amd_enable}" = X"YES" ]; then
echo -n ' amd'
if [ "X${amd_map_program}" != X"NO" ]; then
amd_flags="${amd_flags} `eval ${amd_map_program}`"
fi
amd -p ${amd_flags} > /var/run/amd.pid 2> /dev/null
fi
if [ "X${rwhod_enable}" = X"YES" ]; then
echo -n ' rwhod'; rwhod ${rwhod_flags}
fi
# Kerberos runs ONLY on the Kerberos server machine
if [ "X${kerberos_server_enable}" = X"YES" ]; then
if [ "X${kerberos_stash}" = "XYES" ]; then
stash_flag=-n
else
stash_flag=
fi
echo -n ' kerberos'; \
kerberos ${stash_flag} >> /var/log/kerberos.log &
if [ "X${kadmind_server_enable}" = "XYES" ]; then
echo -n ' kadmind'; \
(sleep 20; kadmind ${stash_flag} >/dev/null 2>&1 &) &
fi
unset stash_flag
fi
# Network Address Translation daemon
if [ "X${natd_enable}" = X"YES" -a X"${natd_interface}" != X"" \
-a X"${firewall_enable}" = X"YES" ]; then
if echo ${natd_interface} | \
grep -q -E '^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$'; then
natd_ifarg="-a ${natd_interface}"
else
natd_ifarg="-n ${natd_interface}"
fi
echo -n ' natd'; natd ${natd_flags} ${natd_ifarg}
fi
echo '.'
network_pass3_done=YES
}