# This file describes the network interfaces available on your system # and how to activate them. For more information, see interfaces(5). # The loopback network interface auto lo iface lo inet loopback # The primary (upstream) network interface allow-hotplug eth0 iface eth0 inet dhcp post-up ifup uap0 post-down ifdown uap0 # The LAN network interface (not tor-ified) auto eth1 iface eth1 inet static address 10.23.42.1 netmask 255.255.255.0 network 10.23.42.0 broadcast 10.23.42.255 pre-up ip addr del 10.23.42.1/24 dev eth1 || true post-up /etc/init.d/torouterui start post-up /etc/init.d/dnsmasq_lan start # this must happen after have brought up uap0 because it clears the NAT # tables post-up iptables -t nat -A POSTROUTING -s 10.23.42.0/24 -o eth0 -j MASQUERADE pre-down /etc/init.d/dnsmasq_lan stop # The magic Tor wireless network auto uap0 iface uap0 inet static address 172.16.23.1 netmask 255.255.255.0 network 172.16.23.0 broadcast 172.16.23.255 pre-up ifconfig uap0 hw ether 00:66:66:66:66:66 pre-up ip addr del 172.16.23.1/24 dev uap0 || true post-up sysctl -w net.ipv6.conf.uap0.disable_ipv6=1 # just for this one post-up /etc/init.d/tor start post-up /etc/init.d/tor reload post-up /etc/init.d/dnsmasq_wifi start post-up /etc/init.d/ttdnsd restart post-up /usr/bin/uaputl sys_cfg_ssid "torproject" || true post-up /usr/bin/uaputl bss_start || true post-up /usr/sbin/tor-wireless-firewall.sh || true post-up /sbin/iptables -t nat -A OUTPUT -p tcp -d 10.192.0.0/10 -j REDIRECT --to-ports 9040 pre-down /usr/bin/uaputl bss_stop || true pre-down /etc/init.d/dnsmasq_wifi stop