Untitled
etc/config/dhcp 0000600 0000000 0000000 00000002164 14717103772 012441 0 ustar root root config dnsmasq option domainneeded '1' option boguspriv '1' option filterwin2k '0' option localise_queries '1' option rebind_protection '1' option rebind_localhost '1' option local '/lan/' option domain 'lan' option expandhosts '1' option nonegcache '0' option cachesize '1000' option authoritative '1' option readethers '1' option leasefile '/tmp/dhcp.leases' option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto' option nonwildcard '1' option localservice '1' option ednspacket_max '1232' option filter_aaaa '0' option filter_a '0' config dhcp 'lan' option interface 'lan' option start '100' option limit '150' option leasetime '12h' option dhcpv4 'server' option dhcpv6 'server' option ra 'server' option ra_slaac '1' list ra_flags 'managed-config' list ra_flags 'other-config' config dhcp 'wan' option interface 'wan' option ignore '1' config odhcpd 'odhcpd' option maindhcp '0' option leasefile '/tmp/hosts/odhcpd' option leasetrigger '/usr/sbin/odhcpd-update' option loglevel '4' config dhcp 'guest' option interface 'guest' option start '100' option limit '150' option leasetime '12h' etc/config/dropbear 0000600 0000000 0000000 00000000206 14674260146 013315 0 ustar root root config dropbear option PasswordAuth 'on' option RootPasswordAuth 'on' option Port '22' # option BannerFile '/etc/banner' etc/config/firewall 0000644 0000000 0000000 00000005723 14717104400 013331 0 ustar root root config defaults option input 'REJECT' option output 'ACCEPT' option forward 'REJECT' option synflood_protect '1' option flow_offloading '1' option flow_offloading_hw '1' config zone option name 'lan' list network 'lan' option input 'ACCEPT' option output 'ACCEPT' option forward 'ACCEPT' config zone option name 'wan' list network 'wan' list network 'wan6' option input 'REJECT' option output 'ACCEPT' option forward 'REJECT' option masq '1' option mtu_fix '1' config forwarding option src 'lan' option dest 'wan' config rule option name 'Allow-DHCP-Renew' option src 'wan' option proto 'udp' option dest_port '68' option target 'ACCEPT' option family 'ipv4' config rule option name 'Allow-Ping' option src 'wan' option proto 'icmp' option icmp_type 'echo-request' option family 'ipv4' option target 'ACCEPT' config rule option name 'Allow-IGMP' option src 'wan' option proto 'igmp' option family 'ipv4' option target 'ACCEPT' config rule option name 'Allow-DHCPv6' option src 'wan' option proto 'udp' option dest_port '546' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-MLD' option src 'wan' option proto 'icmp' option src_ip 'fe80::/10' list icmp_type '130/0' list icmp_type '131/0' list icmp_type '132/0' list icmp_type '143/0' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-ICMPv6-Input' option src 'wan' option proto 'icmp' list icmp_type 'echo-request' list icmp_type 'echo-reply' list icmp_type 'destination-unreachable' list icmp_type 'packet-too-big' list icmp_type 'time-exceeded' list icmp_type 'bad-header' list icmp_type 'unknown-header-type' list icmp_type 'router-solicitation' list icmp_type 'neighbour-solicitation' list icmp_type 'router-advertisement' list icmp_type 'neighbour-advertisement' option limit '1000/sec' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-ICMPv6-Forward' option src 'wan' option dest '*' option proto 'icmp' list icmp_type 'echo-request' list icmp_type 'echo-reply' list icmp_type 'destination-unreachable' list icmp_type 'packet-too-big' list icmp_type 'time-exceeded' list icmp_type 'bad-header' list icmp_type 'unknown-header-type' option limit '1000/sec' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-IPSec-ESP' option src 'wan' option dest 'lan' option proto 'esp' option target 'ACCEPT' config rule option name 'Allow-ISAKMP' option src 'wan' option dest 'lan' option dest_port '500' option proto 'udp' option target 'ACCEPT' config zone option name 'guest' option input 'REJECT' option output 'ACCEPT' option forward 'REJECT' list network 'guest' config forwarding option src 'guest' option dest 'wan' config rule option name 'Allow-DNS-Guest' option src 'guest' option dest_port '53' option target 'ACCEPT' config rule option name 'Allow-DHCP-Guest' list proto 'udp' option src 'guest' option dest_port '67' option target 'ACCEPT' etc/config/luci 0000644 0000000 0000000 00000001710 14674260155 012464 0 ustar root root config core 'main' option lang 'auto' option mediaurlbase '/luci-static/bootstrap' option resourcebase '/luci-static/resources' option ubuspath '/ubus/' config extern 'flash_keep' option uci '/etc/config/' option dropbear '/etc/dropbear/' option openvpn '/etc/openvpn/' option passwd '/etc/passwd' option opkg '/etc/opkg.conf' option firewall '/etc/firewall.user' option uploads '/lib/uci/upload/' config internal 'languages' config internal 'sauth' option sessionpath '/tmp/luci-sessions' option sessiontime '3600' config internal 'ccache' option enable '1' config internal 'themes' option Bootstrap '/luci-static/bootstrap' option BootstrapDark '/luci-static/bootstrap-dark' option BootstrapLight '/luci-static/bootstrap-light' config internal 'apply' option rollback '90' option holdoff '4' option timeout '5' option display '1.5' config internal 'diag' option dns 'openwrt.org' option ping 'openwrt.org' option route 'openwrt.org' etc/config/network 0000600 0000000 0000000 00000001634 14717103772 013215 0 ustar root root config interface 'loopback' option device 'lo' option proto 'static' option ipaddr '127.0.0.1' option netmask '255.0.0.0' config globals 'globals' option ula_prefix 'fdb8:56d8:603f::/48' config device option name 'br-lan' option type 'bridge' list ports 'lan' config device option name 'lan' option macaddr '70:3a:cb:8c:e6:cf' config interface 'lan' option device 'br-lan' option proto 'static' option ipaddr '192.168.1.1' option netmask '255.255.255.0' option ip6assign '60' config device option name 'wan' option macaddr '70:3a:cb:8c:e6:ce' config interface 'wan' option device 'wan' option proto 'dhcp' config interface 'wan6' option device 'wan' option proto 'dhcpv6' config device option type 'bridge' option name 'br-guest' option bridge_empty '1' config interface 'guest' option proto 'static' option device 'br-guest' option ipaddr '192.168.2.1' option netmask '255.255.255.0' etc/config/openssl 0000644 0000000 0000000 00000000056 14714220333 013202 0 ustar root root config provider 'legacy' option enabled '1' etc/config/radius 0000644 0000000 0000000 00000000410 14663572467 013025 0 ustar root root config radius option disabled '1' option ca_cert '/etc/radius/ca.pem' option cert '/etc/radius/cert.pem' option key '/etc/radius/key.pem' option users '/etc/radius/users' option clients '/etc/radius/clients' option auth_port '1812' option acct_port '1813' etc/config/rpcd 0000600 0000000 0000000 00000000247 14674260146 012454 0 ustar root root config rpcd option socket /var/run/ubus/ubus.sock option timeout 30 config login option username 'root' option password '$p$root' list read '*' list write '*' etc/config/system 0000600 0000000 0000000 00000001067 14714240440 013037 0 ustar root root config system option hostname 'OpenWrt' option timezone 'CET-1CEST,M3.5.0,M10.5.0/3' option ttylogin '0' option log_size '64' option urandom_seed '0' option compat_version '1.1' option zonename 'Europe/Zurich' option log_proto 'udp' option conloglevel '8' option cronloglevel '5' config timeserver 'ntp' list server '0.openwrt.pool.ntp.org' list server '1.openwrt.pool.ntp.org' list server '2.openwrt.pool.ntp.org' list server '3.openwrt.pool.ntp.org' config led option name '1' option sysfs 'LED0_Blue' option trigger 'none' option default '0' etc/config/ubootenv 0000644 0000000 0000000 00000000000 14674260155 013360 0 ustar root root etc/config/ucitrack 0000644 0000000 0000000 00000001424 14674260146 013337 0 ustar root root config network option init network list affects dhcp config wireless list affects network config firewall option init firewall list affects luci-splash list affects qos list affects miniupnpd config olsr option init olsrd config dhcp option init dnsmasq list affects odhcpd config odhcpd option init odhcpd config dropbear option init dropbear config httpd option init httpd config fstab option exec '/sbin/block mount' config qos option init qos config system option init led option exec '/etc/init.d/log reload' list affects luci_statistics list affects dhcp config luci_splash option init luci_splash config upnpd option init miniupnpd config ntpclient option init ntpclient config samba option init samba config tinyproxy option init tinyproxy etc/config/uhttpd 0000600 0000000 0000000 00000001417 14714217516 013032 0 ustar root root config uhttpd 'main' list listen_http '0.0.0.0:80' list listen_http '[::]:80' list listen_https '0.0.0.0:443' list listen_https '[::]:443' option redirect_https '0' option home '/www' option rfc1918_filter '1' option max_requests '3' option max_connections '100' option cert '/etc/uhttpd.crt' option key '/etc/uhttpd.key' option cgi_prefix '/cgi-bin' list lua_prefix '/cgi-bin/luci=/usr/lib/lua/luci/sgi/uhttpd.lua' option script_timeout '60' option network_timeout '30' option http_keepalive '20' option tcp_keepalive '1' option ubus_prefix '/ubus' config cert 'defaults' option days '730' option key_type 'ec' option bits '2048' option ec_curve 'P-256' option country 'ZZ' option state 'Somewhere' option location 'Unknown' option commonname 'OpenWrt' etc/config/wireless 0000644 0000000 0000000 00000003444 14735457146 013401 0 ustar root root config wifi-device 'radio0' option type 'mac80211' option path 'platform/soc/a000000.wifi' option channel '11' option band '2g' option htmode 'HT20' option cell_density '0' config wifi-iface 'default_radio0' option device 'radio0' option network 'lan' option mode 'mesh' option encryption 'sae' option key 'xxxxxxxxxx' option mesh_id 'mymesh' option mesh_fwding '1' option mesh_rssi_threshold '0' option disabled '1' config wifi-device 'radio1' option type 'mac80211' option path 'platform/soc/a800000.wifi' option channel '149' option band '5g' option htmode 'VHT80' option cell_density '0' option txpower '23' config wifi-iface 'default_radio1' option device 'radio1' option network 'lan' option mode 'ap' option encryption 'psk2' option key 'xxxxxxxxxx' option ssid 'virus 5' option ieee80211r '1' option mobility_domain '4321' option ft_over_ds '0' option ft_psk_generate_local '1' config wifi-iface 'wifinet2' option device 'radio0' option mode 'ap' option ssid 'virus' option encryption 'psk2' option key 'xxxxxxxxxx' option network 'lan' option ieee80211r '1' option ft_over_ds '0' option ft_psk_generate_local '1' option mobility_domain '1234' config wifi-iface 'wifinet3' option device 'radio1' option mode 'mesh' option encryption 'sae' option mesh_id 'mymesh5' option mesh_fwding '1' option mesh_rssi_threshold '0' option key 'xxxxxxxxxx' option network 'lan' config wifi-iface 'wifinet4' option device 'radio0' option mode 'ap' option ssid 'guest' option encryption 'psk2' option key 'xxxxxxxxxxxxxx' option network 'guest' config wifi-iface 'wifinet5' option device 'radio0' option mode 'ap' option ssid 'OpenWrt' option encryption 'none' config wifi-iface 'wifinet6' option device 'radio0' option mode 'ap' option ssid 'OpenWrt' option encryption 'none' etc/dropbear/dropbear_ed25519_host_key 0000600 0000000 0000000 00000000123 14674260160 016623 0 ustar root root ssh-ed25519 @Uæ‹. ÂqçZ l¸ *ò*±foÓ¯áòw× z"úÜgY$d¼g¾Öo«fEü–ì^tÉ=cº etc/dropbear/dropbear_rsa_host_key 0000600 0000000 0000000 00000001445 14674260173 016426 0 ustar root root ssh-rsa ßþP–±Ç¯ˆ.;5&?qಮLGX²Ôtßšhâ¦úªXê5Žì$•ô¥¦>ƒà‚……Ù!Éý—%lÚ·ç«&f4ÓoõfÞ•®He?”ãâQ[ôÏB&"h‰~^~å!pãCL˜‡ŽOÑKMOé/Ïe¼ìÔØ8ÆJ>1àæÒñM5÷«õH"qVÝì7…<jí;ì¸Ë‡Òvp-VÁÞY¡bßåÂßj¤å(Íz½¢3ÍÿÂuDý£½³¢‰)5òŠ`¢ñÂ@jµ¢î†’sJæn{sÜ´²Ç}‚\(8–IBÐ{É…€}>¬ãXØ3Ÿv*IÃW6· Žx„ÿÊqà'¬˜ äñfÏùê¹Ë[{„û£Sarå‘1S8h“ëé®8ô@ ~™v¶†§œnÒK^ªB¯ÌaŒ†‡¬°sXcö‘º3^ÔæãÆ1¦¦„8èP‰l²®Ï£e›h«À‹Çzè–‹r(‘ÕUðp`I\Ó—3¤h Œäé«&WU%åдíXãF¬nCN¾ühM €4\Yoy¼ŸŸ G<Mb.ïîw/ÛŒ…›ÙhvW¢ûõ°±<Ž#Å«ël© )þµ‚°([Ð,³àòÓ7ÐRïhKð“{r(¥ó„VRåMCja áøYÅ›-ÆŠ…Á¢-ºãß#åpðü°öOÈ_6÷"Ä7JýR;KêÇþφYFüꪅð[¿º¹7ëD Š|Ÿ‡È‹GZ<ǧ<²O¯Wat‰l‘ Nã(ëÛsî¨ýŸ ÆsyÉeó÷ÈÔX_!œ=-÷óo˜Õ8{ ý·&ìШ[£LA×k>|‚åE£ží-$Xu`¢ã6CyXû¾—©Ø4-Œ‹…˜ó\–@‹ùðç©…ÜÊXÓõÊSôõÒ•› Q:8~¿ð#ÔÔåóËþ‰êÑŒ/Ÿ~?àÕ¹ÀSr¶dák„î«)@ÉçkÅ|wuŠ«õ etc/group 0000644 0000000 0000000 00000000323 14674260146 011416 0 ustar root root root:x:0: daemon:x:1: adm:x:4: mail:x:8: dialout:x:20: audio:x:29: www-data:x:33: ftp:x:55: users:x:100: network:x:101:network nogroup:x:65534: ntp:x:123:ntp dnsmasq:x:453:dnsmasq logd:x:514:logd ubus:x:81:ubus etc/hosts 0000644 0000000 0000000 00000000156 14674260146 011426 0 ustar root root 127.0.0.1 localhost ::1 localhost ip6-localhost ip6-loopback ff02::1 ip6-allnodes ff02::2 ip6-allrouters etc/inittab 0000644 0000000 0000000 00000000327 14674260146 011720 0 ustar root root # Copyright (c) 2013 The Linux Foundation. All rights reserved. ::sysinit:/etc/init.d/rcS S boot ::shutdown:/etc/init.d/rcS K shutdown ttyMSM0::askfirst:/usr/libexec/login.sh ttyMSM1::askfirst:/usr/libexec/login.sh etc/luci-uploads/.placeholder 0000644 0000000 0000000 00000000000 14674260146 015213 0 ustar root root etc/nftables.d/10-custom-filter-chains.nft 0000644 0000000 0000000 00000002163 14674260146 017352 0 ustar root root ## The firewall4 input, forward and output chains are registered with ## priority `filter` (0). ## Uncomment the chains below if you want to stage rules *before* the ## default firewall input, forward and output chains. # chain user_pre_input { # type filter hook input priority -1; policy accept; # tcp dport ssh ct state new log prefix "SSH connection attempt: " # } # # chain user_pre_forward { # type filter hook forward priority -1; policy accept; # } # # chain user_pre_output { # type filter hook output priority -1; policy accept; # } ## Uncomment the chains below if you want to stage rules *after* the ## default firewall input, forward and output chains. # chain user_post_input { # type filter hook input priority 1; policy accept; # ct state new log prefix "Firewall4 accepted ingress: " # } # # chain user_post_forward { # type filter hook forward priority 1; policy accept; # ct state new log prefix "Firewall4 accepted forward: " # } # # chain user_post_output { # type filter hook output priority 1; policy accept; # ct state new log prefix "Firewall4 accepted egress: " # } etc/nftables.d/README 0000644 0000000 0000000 00000000305 14674260146 013237 0 ustar root root All *.nft files in this directory are included by the firewall4 ruleset within the inet/fw4 table context which allows referencing named sets declared and populated by the firewall configuration. etc/opkg/keys/b5043e70f9a75cde 0000644 0000000 0000000 00000000174 14674260146 014502 0 ustar root root untrusted comment: Public usign key for unattended snapshot builds RWS1BD5w+adc3j2Hqg9+b66CvLR7NlHbsj7wjNVj0XGt/othDgIAOJS+ etc/passwd 0000644 0000000 0000000 00000000566 14714216503 011565 0 ustar root root root:x:0:0:root:/root:/bin/ash daemon:*:1:1:daemon:/var:/bin/false ftp:*:55:55:ftp:/home/ftp:/bin/false network:*:101:101:network:/var:/bin/false nobody:*:65534:65534:nobody:/var:/bin/false ntp:x:123:123:ntp:/var/run/ntp:/bin/false dnsmasq:x:453:453:dnsmasq:/var/run/dnsmasq:/bin/false logd:x:514:514:logd:/var/run/logd:/bin/false ubus:x:81:81:ubus:/var/run/ubus:/bin/false etc/profile 0000644 0000000 0000000 00000002026 14674260146 011724 0 ustar root root [ -e /tmp/.failsafe ] && export FAILSAFE=1 [ -f /etc/banner ] && cat /etc/banner [ -n "$FAILSAFE" ] && cat /etc/banner.failsafe grep -Fsq '/ overlay ro,' /proc/mounts && { echo 'Your JFFS2-partition seems full and overlayfs is mounted read-only.' echo 'Please try to remove files from /overlay/upper/... and reboot!' } export PATH="/usr/sbin:/usr/bin:/sbin:/bin" export HOME=$(grep -e "^${USER:-root}:" /etc/passwd | cut -d ":" -f 6) export HOME=${HOME:-/root} export PS1='\u@\h:\w\$ ' export ENV=/etc/shinit case "$TERM" in xterm*|rxvt*) export PS1='\[\e]0;\u@\h: \w\a\]'$PS1 ;; esac [ -n "$FAILSAFE" ] || { for FILE in /etc/profile.d/*.sh; do [ -e "$FILE" ] && . "$FILE" done unset FILE } if ( grep -qs '^root::' /etc/shadow && \ [ -z "$FAILSAFE" ] ) then cat << EOF === WARNING! ===================================== There is no root password defined on this device! Use the "passwd" command to set up a new password in order to prevent unauthorized SSH logins. -------------------------------------------------- EOF fi etc/radius/clients 0000644 0000000 0000000 00000000021 14663572467 013217 0 ustar root root 0.0.0.0/0 radius etc/radius/users 0000644 0000000 0000000 00000000177 14663572467 012733 0 ustar root root { "phase1": { "wildcard": [ { "name": "*", "methods": [ "PEAP" ] } ] }, "phase2": { "users": { } } } etc/rc.local 0000644 0000000 0000000 00000000204 14674260146 011755 0 ustar root root # Put your custom commands here that should be executed once # the system init finished. By default this file does nothing. exit 0 etc/shadow 0000600 0000000 0000000 00000000363 14714216503 011534 0 ustar root root root:$1$akgsAumu$TeY0jKUFzSGw1s0XFJ.Pp.:20037:0:99999:7::: daemon:*:0:0:99999:7::: ftp:*:0:0:99999:7::: network:*:0:0:99999:7::: nobody:*:0:0:99999:7::: ntp:x:0:0:99999:7::: dnsmasq:x:0:0:99999:7::: logd:x:0:0:99999:7::: ubus:x:0:0:99999:7::: etc/shells 0000644 0000000 0000000 00000000011 14674260146 011546 0 ustar root root /bin/ash etc/shinit 0000644 0000000 0000000 00000000733 14674260146 011565 0 ustar root root [ -x /bin/more ] || [ -x /usr/bin/more ] || alias more=less [ -x /usr/bin/vim ] && alias vi=vim || alias vim=vi alias ll='ls -alF --color=auto' [ -z "$KSH_VERSION" -o \! -s /etc/mkshrc ] || . /etc/mkshrc [ -x /usr/bin/arp -o -x /sbin/arp ] || arp() { cat /proc/net/arp; } [ -x /usr/bin/ldd ] || ldd() { LD_TRACE_LOADED_OBJECTS=1 $*; } [ -n "$KSH_VERSION" -o \! -s "$HOME/.shinit" ] || . "$HOME/.shinit" [ -z "$KSH_VERSION" -o \! -s "$HOME/.mkshrc" ] || . "$HOME/.mkshrc" etc/sysctl.conf 0000644 0000000 0000000 00000000120 14674260146 012522 0 ustar root root # Defaults are configured in /etc/sysctl.d/* and can be customized in this file etc/uhttpd.crt 0000644 0000000 0000000 00000001007 14674260176 012364 0 ustar root root 0‚0‚¨ ÓåõW¹õ0 *†HÎ=0_10 UZZ10U Somewhere10UUnknown10U OpenWrt98e0c30310UOpenWrt0 240923123510Z 260923123510Z0_10 UZZ10U Somewhere10UUnknown10U OpenWrt98e0c30310UOpenWrt0Y0*†HÎ=*†HÎ=B f›Á†ôΰH¼Ð)$s•_Žˆd†KY#ïÉõÜÒ# ,.À%ÞÛ nÿVáQ[ßd]:o[§Ó°bÔ&S@£M0K0 U0 0Ufføÿ¯†¨‘cXɈ[÷Mã0U#0€fføÿ¯†¨‘cXɈ[÷Mã0 *†HÎ=I 0F! L’Ñȃ¼ÂdøQ&µ]¶„Ö6‘çâœWþïðÌ`ú,! óí¯bÁÿªy×Ai2Ä•*•í~mTo‚(!ñÛ´¯GÇI etc/uhttpd.key 0000600 0000000 0000000 00000000171 14674260176 012355 0 ustar root root 0w ðÇ–üü¦#﹘˜c4 ÄFd{îý6âŸ= *†HÎ=¡DB f›Á†ôΰH¼Ð)$s•_Žˆd†KY#ïÉõÜÒ# ,.À%ÞÛ nÿVáQ[ßd]:o[§Ó°bÔ&S@
Leave a Comment