netoptions revision 45622
125184Sjkh#!/bin/sh -
225184Sjkh#
345622Sbrian#	$Id: rc.network,v 1.43 1999/04/10 10:56:58 des Exp $
425184Sjkh#	From: @(#)netstart	5.9 (Berkeley) 3/30/91
525184Sjkh
625184Sjkh# Note that almost all the user-configurable behavior is no longer in
725184Sjkh# this file, but rather in /etc/rc.conf.  Please check that file
825184Sjkh# first before contemplating any changes here.  If you do need to change
925184Sjkh# this file for some reason, we would like to know about it.
1025184Sjkh
1125184Sjkh# First pass startup stuff.
1225184Sjkh
1325184Sjkhnetwork_pass1() {
1425184Sjkh    echo -n 'Doing initial network setup:'
1525184Sjkh    # Set the host name if it is not already set
1625184Sjkh    if [ -z "`hostname -s`" ] ; then
1725184Sjkh	    hostname $hostname
1825184Sjkh	    echo -n ' hostname'
1925184Sjkh    fi
2025184Sjkh
2125184Sjkh    # Set the domainname if we're using NIS
2225184Sjkh    if [ -n "$nisdomainname" -a "x$nisdomainname" != "xNO" ] ; then
2325184Sjkh	    domainname $nisdomainname
2425184Sjkh	    echo -n ' domain'
2525184Sjkh    fi
2625184Sjkh    echo '.'
2725184Sjkh
2840006Sphk    # Initial ATM interface configuration
2940006Sphk    if [ "X${atm_enable}" = X"YES" -a -f /etc/rc.atm ]; then
3040006Sphk	    . /etc/rc.atm
3140006Sphk	    atm_pass1
3240006Sphk    fi
3340006Sphk
3442621Shm    # ISDN subsystem startup
3542621Shm    if [ "X${isdn_enable}" = X"YES" -a -f /etc/rc.isdn ]; then
3642621Shm	    . /etc/rc.isdn
3742621Shm    fi
3842621Shm
3942627Sjoerg    # Special options for sppp(4) interfaces go here.  These need
4042627Sjoerg    # to go _before_ the general ifconfig section, since in the case
4142627Sjoerg    # of hardwired (no link1 flag) but required authentication, you
4242627Sjoerg    # cannot pass auth parameters down to the already running interface.
4342627Sjoerg    for ifn in ${sppp_interfaces}; do
4442627Sjoerg	    eval spppcontrol_args=\$spppconfig_${ifn}
4542627Sjoerg	    if [ -n "${spppcontrol_args}" ] ; then
4642627Sjoerg		    # The auth secrets might contain spaces; in order
4742627Sjoerg		    # to retain the quotation, we need to eval them
4842627Sjoerg		    # here.
4942627Sjoerg		    eval spppcontrol ${ifn} ${spppcontrol_args}
5042627Sjoerg	    fi
5142627Sjoerg    done
5242627Sjoerg
5325184Sjkh    # Set up all the network interfaces, calling startup scripts if needed
5425184Sjkh    for ifn in ${network_interfaces}; do
5525184Sjkh	    if [ -e /etc/start_if.${ifn} ]; then
5633682Sbrian		    . /etc/start_if.${ifn}
5725184Sjkh	    fi
5825184Sjkh	    # Do the primary ifconfig if specified
5925184Sjkh	    eval ifconfig_args=\$ifconfig_${ifn}
6025184Sjkh	    if [ -n "${ifconfig_args}" ] ; then
6125184Sjkh		    ifconfig ${ifn} ${ifconfig_args}
6225184Sjkh	    fi
6325184Sjkh	    # Check to see if aliases need to be added
6425184Sjkh	    alias=0
6525184Sjkh	    while :
6625184Sjkh	    do
6725184Sjkh		    eval ifconfig_args=\$ifconfig_${ifn}_alias${alias}
6825184Sjkh		    if [ -n "${ifconfig_args}" ]; then
6925184Sjkh			    ifconfig ${ifn} ${ifconfig_args} alias
7025184Sjkh			    alias=`expr ${alias} + 1`
7125184Sjkh		    else
7225184Sjkh			    break;
7325184Sjkh		    fi
7425184Sjkh	    done
7525184Sjkh	    # Do ipx address if specified
7625184Sjkh	    eval ifconfig_args=\$ifconfig_${ifn}_ipx
7725184Sjkh	    if [ -n "${ifconfig_args}" ]; then
7825184Sjkh		    ifconfig ${ifn} ${ifconfig_args}
7925184Sjkh	    fi
8025184Sjkh	    ifconfig ${ifn}
8125184Sjkh    done
8229300Sdanny
8329300Sdanny    # Initialize IP filtering using ipfw
8429300Sdanny    echo ""
8529300Sdanny    /sbin/ipfw -q flush > /dev/null 2>&1
8632382Salex    if [ $? = 0 ] ; then
8732382Salex	firewall_in_kernel=1
8832382Salex    else 
8929300Sdanny	firewall_in_kernel=0
9029300Sdanny    fi
9129300Sdanny
9229300Sdanny    if [ $firewall_in_kernel = 0 -a "x$firewall_enable"  = "xYES" ] ; then
9341077Speter	if kldload ipfw; then
9429300Sdanny		firewall_in_kernel=1		# module loaded successfully
9529300Sdanny		echo "Kernel firewall module loaded."
9629300Sdanny	else
9729300Sdanny		echo "Warning: firewall kernel module failed to load."
9829300Sdanny	fi
9929300Sdanny    fi
10029300Sdanny
10129300Sdanny    # Load the filters if required
10229300Sdanny    if [ $firewall_in_kernel = 1 ]; then
10345542Sdes	if [ -z "${firewall_script}" ] ; then
10445542Sdes	    firewall_script="/etc/rc.firewall"
10545542Sdes	fi
10645542Sdes	if [ -f ${firewall_script} -a X"$firewall_enable" = X"YES" ]; then
10745542Sdes	    . ${firewall_script}
10845622Sbrian	    echo -n 'Firewall rules loaded, starting divert daemons:'
10944992Sbrian
11044992Sbrian	    # Network Address Translation daemon
11144992Sbrian	    if [ X"${natd_enable}" = X"YES" -a -n "${natd_interface}" ]; then
11244992Sbrian		if echo ${natd_interface} | \
11344992Sbrian		    grep -q -E '^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$'; then
11444992Sbrian		    natd_ifarg="-a ${natd_interface}"
11544992Sbrian		else
11644992Sbrian		    natd_ifarg="-n ${natd_interface}"
11744992Sbrian		fi
11844992Sbrian		echo -n ' natd'; ${natd_program} ${natd_flags} ${natd_ifarg}
11944992Sbrian	    fi
12044992Sbrian	    echo '.'
12129300Sdanny	else
12233337Salex	    IPFW_DEFAULT=`ipfw l 65535`
12333337Salex	    if [ "$IPFW_DEFAULT" = "65535 deny ip from any to any" ]; then
12433149Salex		echo -n "Warning: kernel has firewall functionality, "
12533149Salex		echo "but firewall rules are not enabled."
12633149Salex		echo "         All ip services are disabled."
12733149Salex	    fi
12829300Sdanny	fi
12925184Sjkh    fi
13025184Sjkh
13140006Sphk    # Additional ATM interface configuration
13240006Sphk    if [ -n "${atm_pass1_done}" ]; then
13340006Sphk	    atm_pass2
13440006Sphk    fi
13540006Sphk
13629300Sdanny    # Configure routing
13729300Sdanny
13825184Sjkh    if [ "x$defaultrouter" != "xNO" ] ; then
13925184Sjkh	    static_routes="default ${static_routes}"
14025184Sjkh	    route_default="default ${defaultrouter}"
14125184Sjkh    fi
14225184Sjkh    
14325184Sjkh    # Set up any static routes.  This should be done before router discovery.
14425184Sjkh    if [ "x${static_routes}" != "x" ]; then
14525184Sjkh	    for i in ${static_routes}; do
14625184Sjkh		    eval route_args=\$route_${i}
14725184Sjkh		    route add ${route_args}
14825184Sjkh	    done
14925184Sjkh    fi
15025184Sjkh
15125184Sjkh    echo -n 'Additional routing options:'
15227218Spst    if [ -n "$tcp_extensions" -a "x$tcp_extensions" != "xYES" ] ; then
15327218Spst	    echo -n ' tcp extensions=NO'
15427218Spst	    sysctl -w net.inet.tcp.rfc1323=0 >/dev/null 2>&1
15527218Spst    fi
15627218Spst
15745096Simp    if [ -n "$log_in_vain" -a "x$log_in_vain" != "xNO" ] ; then
15845096Simp	    echo -n ' log_in_vain=YES'
15945096Simp	    sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null 2>&1
16045096Simp	    sysctl -w net.inet.udp.log_in_vain=1 >/dev/null 2>&1
16145096Simp    fi
16245096Simp
16339267Sjkoshy    if [ X"$icmp_bmcastecho" = X"YES" ]; then
16439267Sjkoshy	    echo -n ' broadcast ping responses=YES'
16539267Sjkoshy	    sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null 2>&1
16639267Sjkoshy    fi
16739267Sjkoshy
16825184Sjkh    if [ "X$gateway_enable" = X"YES" ]; then
16925365Sjkh	    echo -n ' IP gateway=YES'
17025184Sjkh	    sysctl -w net.inet.ip.forwarding=1 >/dev/null 2>&1
17125184Sjkh    fi
17225184Sjkh    
17333439Sguido    if [ "X$forward_sourceroute" = X"YES" ]; then
17433439Sguido	    echo -n ' do source routing=YES'
17533439Sguido	    sysctl -w net.inet.ip.sourceroute=1 >/dev/null 2>&1
17633439Sguido    fi
17733439Sguido
17833439Sguido    if [ "X$accept_sourceroute" = X"YES" ]; then
17933439Sguido	    echo -n ' accept source routing=YES'
18033439Sguido	    sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null 2>&1
18133439Sguido    fi
18233439Sguido
18325184Sjkh    if [ "X$ipxgateway_enable" = X"YES" ]; then
18425365Sjkh	    echo -n ' IPX gateway=YES'
18525184Sjkh	    sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null 2>&1
18625184Sjkh    fi
18725184Sjkh    
18836174Sjkh    if [ "X$arpproxy_all" = X"YES" ]; then
18936174Sjkh	    echo -n ' enabling ARP_PROXY_ALL: '
19036174Sjkh	    sysctl -w net.link.ether.inet.proxyall=1 2>&1
19136174Sjkh    fi
19236174Sjkh    echo '.'
19336174Sjkh
19436174Sjkh    echo -n 'routing daemons:'
19536174Sjkh    if [ "X$router_enable" = X"YES" ]; then
19636174Sjkh	    echo -n " ${router}";	${router} ${router_flags}
19736174Sjkh    fi
19836174Sjkh    
19925184Sjkh    if [ "X$ipxrouted_enable" = X"YES" ]; then
20036174Sjkh	    echo -n ' IPXrouted'
20125184Sjkh	    IPXrouted ${ipxrouted_flags} > /dev/null 2>&1
20225184Sjkh    fi
20325765Sjkh    
20436174Sjkh    if [ "X${mrouted_enable}" = X"YES" ]; then
20536174Sjkh	    echo -n ' mrouted'; mrouted ${mrouted_flags}
20625765Sjkh    fi
20736174Sjkh
20834395Sjkh    if [ "X$rarpd_enable" = X"YES" ]; then
20934395Sjkh	    echo -n ' rarpd';     rarpd ${rarpd_flags}
21034395Sjkh    fi
21125184Sjkh    echo '.'
21225184Sjkh    network_pass1_done=YES	# Let future generations know we made it.
21325184Sjkh}
21425184Sjkh
21525184Sjkhnetwork_pass2() {
21625184Sjkh    echo -n 'Doing additional network setup:'
21725184Sjkh    if [ "X${named_enable}" = X"YES" ]; then
21832949Swollman	    echo -n ' named';		${named_program-"named"} ${named_flags}
21925184Sjkh    fi
22025184Sjkh
22131472Sobrien    if [ "X${ntpdate_enable}" = X"YES" ]; then
22235787Sandreas	    echo -n ' ntpdate';	${ntpdate_program} ${ntpdate_flags} >/dev/null 2>&1
22331472Sobrien    fi
22425184Sjkh
22531472Sobrien    if [ "X${xntpd_enable}" = X"YES" ]; then
22635787Sandreas	    echo -n ' xntpd';	${xntpd_program} ${xntpd_flags}
22725184Sjkh    fi
22825184Sjkh
22925184Sjkh    if [ "X${timed_enable}" = X"YES" ]; then
23025184Sjkh	    echo -n ' timed';		timed ${timed_flags}
23125184Sjkh    fi
23225184Sjkh
23325184Sjkh    if [ "X${portmap_enable}" = X"YES" ]; then
23444668Sjfitz	    echo -n ' portmap';		${portmap_program} ${portmap_flags}
23525184Sjkh    fi
23625184Sjkh
23725184Sjkh    # Start ypserv if we're an NIS server.
23825184Sjkh    # Run rpc.ypxfrd and rpc.yppasswdd only on the NIS master server.
23925184Sjkh    if [ "X${nis_server_enable}" = X"YES" ]; then
24025184Sjkh	    echo -n ' ypserv'; ypserv ${nis_server_flags}
24125184Sjkh	    
24225184Sjkh	    if [ "X${nis_ypxfrd_enable}" = X"YES" ]; then
24325184Sjkh		    echo -n ' rpc.ypxfrd'; rpc.ypxfrd ${nis_ypxfrd_flags}
24425184Sjkh	    fi
24525184Sjkh	    
24625184Sjkh	    if [ "X${nis_yppasswdd_enable}" = X"YES" ]; then
24725184Sjkh		    echo -n ' rpc.yppasswdd'; rpc.yppasswdd ${nis_yppasswdd_flags}
24825184Sjkh	    fi
24925184Sjkh    fi
25025184Sjkh
25125184Sjkh    # Start ypbind if we're an NIS client
25225184Sjkh    if [ "X${nis_client_enable}" = X"YES" ]; then
25325184Sjkh	    echo -n ' ypbind'; ypbind ${nis_client_flags}
25425184Sjkh	    if [ "X${nis_ypset_enable}" = X"YES" ]; then
25525184Sjkh		    echo -n ' ypset'; ypset ${nis_ypset_flags}
25625184Sjkh	    fi
25725184Sjkh    fi
25825184Sjkh
25935149Smarkm    # Start keyserv if we are running Secure RPC
26035149Smarkm    if [ "X${keyserv_enable}" = X"YES" ]; then
26135149Smarkm	    echo -n ' keyserv';		keyserv ${keyserv_flags}
26235149Smarkm    fi
26335149Smarkm    # Start ypupdated if we are running Secure RPC and we are NIS master
26435149Smarkm    if [ "X$rpc_ypupdated_enable" = X"YES" ]; then
26535149Smarkm	    echo -n ' rpc.ypupdated';	rpc.ypupdated
26635149Smarkm    fi
26735149Smarkm
26840006Sphk    # Start ATM daemons
26940006Sphk    if [ -n "${atm_pass2_done}" ]; then
27040006Sphk	    atm_pass3
27140006Sphk    fi
27240006Sphk
27325184Sjkh    echo '.'
27425184Sjkh    network_pass2_done=YES
27525184Sjkh}
27625184Sjkh
27725184Sjkhnetwork_pass3() {
27825184Sjkh    echo -n 'Starting final network daemons:'
27925184Sjkh
28025184Sjkh    if [ "X${nfs_server_enable}" = X"YES" -a -r /etc/exports ]; then
28125184Sjkh	    echo -n ' mountd'
28225184Sjkh	    if [ "X${weak_mountd_authentication}" = X"YES" ]; then
28325184Sjkh		    mountd_flags="-n"
28425184Sjkh	    fi
28525184Sjkh	    mountd ${mountd_flags}
28625184Sjkh	    if [ "X${nfs_reserved_port_only}" = X"YES" ]; then
28725184Sjkh		    sysctl -w vfs.nfs.nfs_privport=1 >/dev/null 2>&1
28825184Sjkh	    fi
28925916Sjkh	    echo -n ' nfsd';		nfsd ${nfs_server_flags}
29025184Sjkh	    if [ "X$rpc_lockd_enable" = X"YES" ]; then
29125184Sjkh		echo -n ' rpc.lockd';		rpc.lockd
29225184Sjkh	    fi
29325184Sjkh	    if [ "X$rpc_statd_enable" = X"YES" ]; then
29425184Sjkh		echo -n ' rpc.statd';		rpc.statd
29525184Sjkh	    fi
29625184Sjkh    fi
29725184Sjkh    
29825184Sjkh    if [ "X${nfs_client_enable}" = X"YES" ]; then
29925916Sjkh	    echo -n ' nfsiod';		nfsiod ${nfs_client_flags}
30041371Sjkoshy	    if [ "X${nfs_access_cache}" != X ]; then
30141371Sjkoshy		sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} \
30241371Sjkoshy			>/dev/null 2>&1
30341185Smsmith	    fi
30425184Sjkh    fi
30525184Sjkh
30625184Sjkh    if [ "X${amd_enable}" = X"YES" ]; then
30725184Sjkh	    echo -n ' amd'
30835459Sphk	    if [ "X${amd_map_program}" != X"NO" ]; then
30939380Scracauer		amd_flags="${amd_flags} `eval ${amd_map_program}`"
31035459Sphk	    fi
31125184Sjkh	    amd -p ${amd_flags} > /var/run/amd.pid 2> /dev/null
31225184Sjkh    fi
31325184Sjkh
31425184Sjkh    if [ "X${rwhod_enable}" = X"YES" ]; then
31542270Sjkh	    echo -n ' rwhod';	rwhod ${rwhod_flags}
31625184Sjkh    fi
31725184Sjkh
31825184Sjkh    # Kerberos runs ONLY on the Kerberos server machine
31925184Sjkh    if [ "X${kerberos_server_enable}" = X"YES" ]; then
32031033Ssef	    if [ "X${kerberos_stash}" = "XYES" ]; then
32131033Ssef		stash_flag=-n
32231033Ssef	    else
32331033Ssef		stash_flag=
32431033Ssef	    fi
32531033Ssef	    echo -n ' kerberos'; \
32638316Sphk		kerberos ${stash_flag} >> /var/log/kerberos.log &
32731033Ssef	    if [ "X${kadmind_server_enable}" = "XYES" ]; then
32831033Ssef		echo -n ' kadmind'; \
32938316Sphk		(sleep 20; kadmind ${stash_flag} >/dev/null 2>&1 &) &
33031033Ssef	    fi
33131033Ssef	    unset stash_flag
33225184Sjkh    fi
33325184Sjkh    
33425184Sjkh    echo '.'
33525184Sjkh    network_pass3_done=YES
33625184Sjkh}
337