Go to file
2014-11-03 16:11:52 +01:00
js-crypt-test simply-crypt js test added 2014-05-15 23:10:26 +02:00
lazyinstall fixed init script 2014-05-28 23:35:01 +02:00
.gitignore gitignored files that main.py creates 2014-04-21 12:10:02 +02:00
LICENSE Initial commit 2014-04-04 04:35:15 -07:00
main.py meshenger now changes the working directory to /meshenger/, fixed the lazyinstall 2014-05-28 23:01:03 +02:00
meshenger_clientserve.py mistake corrected 2014-05-28 23:14:04 +02:00
meshenger_nodeserve.py igg 2014-05-28 01:36:32 +02:00
meshenger_roadmap updated roadmap 2014-05-16 05:15:54 +02:00
README.md Merge branch 'master' of https://github.com/jngrt/meshenger 2014-11-03 16:11:52 +01:00
webapp.html added sort interface 2014-05-30 16:15:50 +02:00

meshenger

Meshenger is a Forban-inspired messaging software used for a speculative broadcast communication project. The starting point is an electronic messaging system running on a wireless mesh network. The messages propagate through the network when devices that come in contact with each other synchronize their content. It is non-hierarchical, every node receives, relays and broadcasts messages.

Using Meshenger, devices detect each other by continously broadcasting an identifier packet while listening to those of other nodes. As soon as two (or more) nodes detect each other they will try to synchronize the messages on each node.

The users of the network can interface with the nodes to send or receive messages by using the webbrowser of their smartphone or computer. The messages can be received and sent at any time, but they are only synchronized in the network when other nodes are encountered.

Meshenger is supposed to run on an Open-WRT router that has been configured to work in mesh networks (for a configuration how-to see below).

Configuring a router for Open-WRT and Meshenger

Flashing and preparing

Meshenger requires routers that both support Open-WRT and have at least one USB port (List of Open-WRT routers here). We have used the following models: TP-Link MR-3020, TP-Link TP-WR703n and TP-WR842nd.

Open-WRT have a guide for each supported device that tells how to best flash your specific device with Open-WRT. (Article on flashing)

After flashing proceed through the first login as described here.

You are going to need to have an internet connection to your router, the easiest thing is to hook it up to the router.

Alternatively if you use OSX you can enable internet sharing (make sure to set your OSX machine as the gateway and DNS server for your router in /etc/config/network)

System configuration

To use your router for Meshenger you're going to need to run the whole filesystem from a USB-Drive.

Make sure that said USB-Drive is formatted as such:

- one ext4 partition

- one linux-swap partition (32mb seems to be sufficient so far)

Next enable USB-Storage on the router:

$ opkg update

$ opkg install 'block-mount kmod-usb-storage kmod-usb2 kmod-fs-ext4

To check if it works try $ ls /dev/. You shoud see sda, sda1 and sda2

Now mount the USB-Drive:

$ mkdir /mnt/sda1

$ mount -t ext4 /dev/sda1 /mnt/sda1

Copy the whole filesystem to the USB-Drive:

$ mkdir -p /tmp/cproot

$ mount --bind / /tmp/cproot

$ tar -C /tmp/cproot -cvf - . | tar -C /mnt/sda1 -xf -

$ umount /tmp/cproot

Edit fstab

$ vi /etc/config/fstab

Make config mount look like:

config mount 
    option target /
    option device /dev/sda1
    option fstype ext4
    option options rw,sync
    option enabled 1
    option enabled_fsck 0

Reboot the device ($ reboot -f) and use $ df -h to confirm device now runs off the USB-Drive

Next we configure the swap partition

$ mkswap /dev/sda2

$ swapon /dev/sda2

Edit fstab again now make the swap look like this:

config mount
	option device   /dev/sda2
	option enabled 

Wireless configuration

The next section is on how to set up the network interfaces to work with B.A.T.M.A.N the mesh networking protocol. It is more or less a summary of what's written here.

$ vi etc/config/wireless and edit the wireless interface to look like this:

Dont forget to remove the line that disables wireless

config wifi-iface 'wmesh'

	option device  'radio0'

	option ifname  'adhoc0'

	option network 'mesh'  

	option mode		'adhoc'

	option ssid     'mesh'          

	option bssid '66:66:66:66:66:66'

Next up is $ vi etc/config/network where we add this interface:

config interface 'mesh'

	option ifname 'adhoc0'

	option mtu '1528'

	option proto 'none'

Install B.A.T.M.A.N and IP6 support.

$ opkg install kmod-batman-adv kmod-ipv6

Then edit $ /etc/config/batman-adv to tell it which interface to use.

config mesh 'bat0'

	option interfaces 'adhoc0'

	option 'aggregated_ogms'

	option 'ap_isolation' 

	option [..]

$ /etc/init.d/network restart to make the changes take effect.

If you have set this up properly on more than one node, the nodes should be able to see each other. Test with $ batctl -o

Make sure that you have the same version of batctl and openwrt on all nodes you plan to use. $ uname -a && batctl -v to see the version information.

Configuring / Adding a client Hotspot

For the front-end, the client user interface, we must have a captive portal running. These are the first steps in enableing another wireless interface for the hotspot

Add the following lines in the following config files and restart the network:

$ vi /etc/config/network

config interface 'hotspot'    
        option 'iface' 'radio0' #use your excisting wifi device (look in config/wireless below)
        option 'proto' 'static'
        option 'ipaddr' '192.168.2.1'
        option 'netmask' '255.255.255.0'
        option 'type' 'bridge'           
                                    

$ vi /etc/config/wireless

config wifi-iface                       
        option 'device' 'radio0'  #use your excisting wifi device, look in the list above.    
        option 'ssid' 'meshtest1'  #use a unique name for your network?
        option 'network' 'hotspot'      
        option 'mode' 'ap'              
        option 'encryption' 'none'
        option 'isolate' '1'  

$ vi /etc/config/dhcp

config dhcp hotspot                           
        option 'interface' 'hotspot'          
        option 'start' '100'                  
        option 'limit' '150'        
        option 'dynamicdhcp' '1'  

$ vi /etc/config/firewall enable handing out dhcp addresses to wifi clients

config 'zone'                                          
        option 'name' 'hotspot'                        
        option 'input' 'ACCEPT'                        
        option 'forward' 'ACCEPT' #was REJECT                      
        option  'output' 'ACCEPT'                      
                                                       
config 'rule'                                     
     
        option 'src' 'hotspot'                         
        option 'dest_port' '53'                        
        option 'proto' 'tcpudp'                        
        option 'target' 'ACCEPT'                       
                                                       
config 'rule'                                          
        option 'src' 'hotspot'                         
        option 'src_port' '67-68'                      
        option 'dest_port' '67-68'                     
        option 'proto' 'udp'                           
        option 'target' 'ACCEPT'                       

$ /etc/init.d/network restart $ /etc/init.d/firewall restart $ /etc/init.d/dnsmasq restart

Or better, restart the router with $ reboot -f

The Meshenger webinterface is now available at http://192.168.2.1 when connected to its associated hotspot, in this case 'meshtest1'.

Configuring the Hotspot as captive portal

We want connecting clients to be redirected to our webapp, no matter what url they request. To do so we need to add some firewall rules, configure dhcp and dnsmasq.

Add the following firewall rules:

$ vi /etc/config/firewall

config 'rule'
        option 'target' 'ACCEPT'
        option 'src' 'hotspot' # guest wifi interface
        option 'proto' 'tcp'
        option '_name' 'Website' # this can maybe go?
        option 'dest_port' '80'

config 'redirect'
        option 'proto' 'tcp'
        option '_name' 'Website' # this can maybe go?
        option 'src' 'hotspot' # guest wifi interface
        option 'src_dport' '80'
        option 'dest_port' '80'
        option 'dest_ip' '192.168.2.1' # ip of webserver

In the dnsmasq section of the dhcp config (first section) add the following line:

$ vi /etc/config/dhcp

list server '//192.168.2.1'

In the dnsmasq config (first section) add the following line(s):

$ vi /etc/dnsmasq.conf

# Redirect all dns requests to meshenger                     
address=/#/192.168.2.1   

Restart dnsmasq to apply the changes:

$ /etc/init.d/dnsmasq restart

Now all http requests will be directed to Meshenger! If it doesn't work, check your DNS settings of the client your're using (aka your computer, phone, fapfapfaplet). Make sure google's 8.8.8.8 is not there and set 192.168.2.1 as the dns server.

Run meshenger on boot

Create a file in $ /etc/init.d/ called meshenger and paste the script below:

#!/bin/sh /etc/rc.common
#meshenger startup script

START=101
#STOP=15

start() {
    echo 'starting Meshenger'
    /usr/bin/python /root/meshenger/main.py &
}

stop() {
    echo 'Killing Meshenger'
    killall python
}

Make the file executable

$ chmod a+x /etc/init.d/meshenger

Now you can start/stop meshenger as a service, to enable the meshenger as srevice on boot run

$ /etc/init.d/meshenger enable

To start/stop/disable replace 'enable' with start, stop or disable.

Installing meshenger

Get the dependencies and clone the git

$ opkg install python git

$ git clone git://github.com/jngrt/meshenger.git

Running Meshenger on Boot

To launch the Meshenger script (or python script in this case), we have to run it as a 'Service'. Befor we can do so we need to know some variable.

Path to python

Find out where your Python binary is located:

$ which python

This command outputs your path, for example: /usr/bin/python, remember this path

Boot order

Alot of processes are started at boot, and we want to make sure our script runs after the system has booted completely. To find out the boot order, look in the rc.d folder:

$ ls /etc/rc.d

This will output a list of startup sctipts with prefixes like S10-, S20-, S30-. The numbers define the boot order, the higher, the later. Remember the highest 'S'(cript) number. We need to run our script after the last one.

Startup script

Create a new file in /etc/init.d/

$ vi /etc/init.d/meshenger

And paste the script below and correct your path to pyton and boot order number, both found above.

#!/bin/sh /etc/rc.common
#meshenger startup script

START=99 #the boot order number, note in our case the SAME number as the highest one found.
SERVICE_DAEMONIZE=1 #start as service, important!

start(){
	sleep 10 #make sure booting is finished
	echo 'starting meshenger'
	/usr/bin/python /root/meshenger/main.py &  #path to python binary, space, full path to your script


}


stop(){
	echo 'stopping meshenger'
	killall python
}

Make sure both your script (main.py) and the init.d script are executable!

$ chmod +x /etc/init.d/meshenger $ chmod +x /root/meshenger/main.py

Enabling the service

Now we have to activate the script we just pasted and make it run as service, on every (re)boot.

$ /etc/init.d/meshenger enable

This creates a symlink in /etc/rc.d with the boot order number prefix you provided in the init.d script (S99-meshenger). You can also start and stop the service manually with:

$ /etc/init.d/meshenger start $ /etc/init.d/meshenger stop

That's all, reboot and see if it works ( $ ps | grep python )!

SSH Access from Internet (wan)

If you want, you can hook your box up to the internet and manage it remotely. This is not in the scope of this project but I'll share the steps with you:

Configure your firewall

$ vi /etc/config/firewall


config 'rule'
  option 'src' 'wan'
  option 'dest_port' '22'
  option 'target' 'ACCEPT'
  option 'proto' 'tcp' 
  
  
$ /etc/init.d/firewall restart

Enable user iptable script:

$ vi  vi /etc/firewall.user 


iptables -t nat -A prerouting_wan -p tcp --dport 22 -j ACCEPT
iptables        -A input_wan      -p tcp --dport 22 -j ACCEPT
 
  
  
$ /etc/init.d/firewall restart

Configure open ssh service

Add the line below in your dropbear config

$ vi /etc/config/dropbear


option 'GatewayPorts' 'on'
  
  
$ /etc/init.d/dropbear restart

Now you can acces your router, via ssh, from the internet. Don't forget to add portforwarding on you're modem/router! Next up, http access from the internet!

HTTP Access from Internet (wan)

If you want, you can host Meshenger or your own homepage on the internet. This is not in the scope of this project but I'll share the steps with you:

Configure your firewall

Add the following lines in your firewall config, and restart the firewall:

$ vi /etc/config/firewall



config 'redirect'
        option 'src' 'wan'
        option 'src_dport' '80'
        option 'dest' 'lan'
        option 'dest_ip' '192.168.1.1'
        option 'dest_port' '80'
        option 'proto' 'tcp'

config 'rule'
        option 'src' 'wan'
        option 'dest_port' '80'
        option 'target' 'ACCEPT'
        option 'proto' 'tcp'
        
        
        
$ /etc/init.d/firewall restart

Now either run Meshenger, or run a simple http server (to share files, or whatever) from any directory with this Python oneliner:

python -m SimpleHTTPServer 80

After forwarding the correct ports on your home router/modem (from any ip on port 80 to your openwrt box (lan) ip on port 80) your website will now be accessible from outside (wan) through your external IP!