#!/bin/bash sysctl -w net.ipv4.conf.all.rp_filter=2 iptables --table nat --append POSTROUTING --jump MASQUERADE echo 1 > /proc/sys/net/ipv4/ip_forward for each in /proc/sys/net/ipv4/conf/* do echo 0 > $each/accept_redirects echo 0 > $each/send_redirects done if [ "$VPN_PASSWORD" = "password" ] || [ "$VPN_PASSWORD" = "" ]; then # Generate a random password P1=`cat /dev/urandom | tr -cd abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789 | head -c 3` P2=`cat /dev/urandom | tr -cd abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789 | head -c 3` P3=`cat /dev/urandom | tr -cd abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789 | head -c 3` VPN_PASSWORD="$P1$P2$P3" echo "No VPN_PASSWORD set! Generated a random password: $VPN_PASSWORD" fi if [ "$VPN_PSK" = "password" ] || [ "$VPN_PSK" = "" ]; then # Generate a random password P1=`cat /dev/urandom | tr -cd abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789 | head -c 3` P2=`cat /dev/urandom | tr -cd abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789 | head -c 3` P3=`cat /dev/urandom | tr -cd abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789 | head -c 3` VPN_PSK="$P1$P2$P3" echo "No VPN_PSK set! Generated a random PSK key: $VPN_PSK" fi if [ "$VPN_PASSWORD" = "$VPN_PSK" ]; then echo "It is not recommended to use the same secret as password and PSK key!" fi cat > /etc/ppp/l2tp-secrets < /etc/ipsec.secrets <