WikiDevi.Wi-Cat.RU:DD-WRT/Script Examples
Which IP addresses and hostnames are used for wireless clients?
Note: Only work if you get an IP address from DHCP
# mkdir -p /tmp/www
while [ 1 ];
do
wl assoclist | awk '{print tolower($2)}' > /tmp/assocLIST
# echo "<meta http-equiv="refresh" content="10">Hostnames and IP addresses of WLAN clients (last update: $(date))" > /tmp/www/wlan.html
while read assocLINE
do
dumpleases | awk '/'"$assocLINE"'/ {print "Hostname: " $1, "MAC: " $2, "IP: " $3}'
# echo "<br>";
done < /tmp/assocLIST # >> /tmp/www/wlan.html
sleep 10;
done;
Output:
Hostname: tp MAC: 01:81:18:3d:49:5e IP: 192.168.2.101
You can change the order of "$1, $2, $3" or cut-out:
awk '{print $1,$3}'
Output:
tp 192.168.2.101
if you want to show this in a browser remove the # and use:
http://routerIP/user/wlan.html
To booting on startup see Startup Scripts
How can I protect this file? I want to allow showing this only if you are logged in the web interface! Please write it here, thanks
answer:name it wlan.asp 57032956191056854646430
"How can I output the signal strength (wl rssi ) at the same time by feeding MAC Addr from assoclist without typing MAC addr each time in telnet?"
Keep ISP from disconnecting due to lack of traffic
Some internet service providers will drop the connection if there is no traffic for some period of time (idle time-out). With these scripts you can prevent this.
#!/bin/sh
while :
do
ping -c 5 www.example.com >/dev/null # ping 5 packets
sleep 300 # wait 5 minutes
done
If this does not work (providers ignores ICMP packets as traffic) use:
#!/bin/sh
while :
do
wget -q -O /dev/null http://www.example.com/ # download index file
sleep 300 # wait 5 minutes
done
To run these scripts, save to a local file, make executable with 'chmod a+x <filename>' and run with './filename'
How many connections are open for each IP address?
For each active IP address on the local network (assumed to be a 192.168.x.0 network below), this prints out the number of connections that this IP address has open to hosts on the Internet. "Connections" includes both TCP and UDP - while there are no "UDP connections", Linux maintains NAT-related information about UDP traffic which is similar to that for TCP.
This is handy for finding that person in your LAN whose P2P software opens many hundreds of connections, making the network slow for everybody.
The last command (sort -gr) sorts the results by number of connections, with the biggest number first.
sed -n 's%.* src=\(192.168.[0-9.]*\).*%\1%p' /proc/net/ip_conntrack | sort | uniq -c | sort -gr
Signal strength
Small one line scripts to give a signal level display in the style of the Linux 'wavemon' program.
wl interface
If you are using the WRT in client mode and connecting it to another AP, you might want monitor the signal level that you are receiving at the client wrt. To do this we use the 'wl' command to access the details from the wireless driver.
wl rssi
gives the signal strength in dB and
wl noise
gives the noise level in dB.
The only problem with this is that different versions of the firmware give different outputs. Versions of DD-WRT firmware up to v23 give
signal is <number>
as the output to 'wl rssi', but version 24 just gives the number only without the "signal is " bit. This means that scripts which use the outputs from the wl command must be chosen for the different firmware versions.
In client mode
We are interested in the signal to noise figure and in monitoring it continuously, so we need a small script to do it. I also decided that it would be useful to display a small graph of the s/n figure. This is an ugly script as I had to optimise it to get it to work fast enough to be useful on the slow WRT processors :(, but this does mean that it can easily just be cut and pasted into a telnet or ssh session onto the wrt as an ugly one-liner.
Firmware v23 and before
while true;do wl rssi;wl noise | awk '{print $3-$6}'|awk '{printf"Signal: "$1"\t";for(;j<$1;j++)printf"=";printf"\n"}';done
Firmware v24
while true;do (wl rssi | sed 's/rssi is \([0-9-]*\).*/\1/';wl noise | sed 's/noise is \([0-9-]*\).*/ \1/') | tr -d '\n' | awk '{print $1-$2}'|awk '{printf"Signal: "$1"\t";for(;j<$1;j++)printf"=";printf"\n"}';done
The output will look a bit like this:
Signal: 8 ========
Signal: 7 =======
Signal: 8 ========
Signal: 10 ==========
Signal: 9 =========
Signal: 11 ===========
To terminate, just press <ctrl> + c
When using a WRT54GL v1.1 (bought 23/May/08) with dd-wrt v24 std generic, I was able to tweak the script to the following to give meaningful SNR numbers:
while (true); do (wl rssi; echo " " ; wl noise) | tr -d '\n' | awk '{print $1-$2}' | awk '{printf "SNR: " $1 "\t"; for (;j<$1;j++) printf "="; printf "\n"}';done
SNR: 53 =====================================================
SNR: 52 ====================================================
SNR: 52 ====================================================
SNR: 52 ====================================================
SNR: 52 ====================================================
(This was during testing with the new WRT54GL in Client Bridge mode about 3m away from my (older) access point (Netgear WGR614).)
Rockus 10:42, 24 May 2008 (CEST)
In AP mode
Using it in AP mode is more difficult as firstly, you have to supply the MAC address of the client that you want to monitor, and secondly as I havent been able to get the 'wl' command to give a meaningful noise figure so you have to guess of what you think that the noise figure is.
while true;do wl rssi <MAC_ADDR_OF_CLIENT> | awk '{print $3+<NOISE_GUESS_FIGURE>}'|awk '{printf"Signal: "$1"\t";for(;j<$1;j++)printf"=";printf"\n"}';done
(Note : I have yet to test this on firmware v24, but if it is the same as the client mode, then the following should work -- also need to test if the noise figure works for v24)
while true;do wl rssi <MAC_ADDR_OF_CLIENT> | awk '{print $1+<NOISE_GUESS_FIGURE>}'|awk '{printf"Signal: "$1"\t";for(;j<$1;j++)printf"=";printf"\n"}';done
You will have to replace <MAC_ADDR_OF_CLIENT> with the MAC address of the client that you wish to monitor, and replace <NOISE_GUESS_FIGURE> with a guess of what you think that the noise level is at your location. I used the figure 97 as my guess for the noise level, but it is very likely that it will be different at your location.
Having to add in the noise fudge factor will probably mean that the signal to noise figure that you get will be wrong, but the script is still useful as it will give a graph which can show you the RELATIVE strength as you move the client around the room.
(If anyone knows how to get a correct noise figure, please either add it here or in the discussion tab)
Miscellaneous tweaks
Note: SMB or WGET may be substituted for JFFS on limited flash memory devices.
Log your startup
Requires JFFS. Save your startup commands to /jffs/startup.sh
Example:
#!/bin/sh
cat /tmp/etc/passwd | sed s/^root:/emanymton:/ > /tmp/etc/passwd
cp /jffs/options.pptpd /tmp/pptpd/options.pptpd
rmdir /tmp/www; ln -s /jffs/www /tmp
Make this file executable:
chmod +x /jffs/startup.sh
Save the following line to startup:
(use administration/diagnostics, save startup)
/jffs/startup.sh > /tmp/startup.log 2>&1
Your standard and error output from the scripts will be viewable in /tmp/startup.log. /tmp is stored in volatile memory (RAM) and will be erased each startup showing only the current error or success messages. It is not recommended to use /jffs for logs due to increased flash wear. Use the echo command to label sections of your startup file and verbose command options for troubleshooting.
Change root username
cat /tmp/etc/passwd | sed s/^root:/emanymton:/ > /tmp/etc/passwd
Replace 'emanymton' with your username. Save this as a startup script.
Or a simpler way
sed -i -e "s/^root:/emanymton:/" /tmp/etc/passwd
or even
sed -ie "s/^root:/emanymton:/" /tmp/etc/passwd
Here -i stands for "in place" and -e introduces the sed command expression
Store user web on JFFS
Requires JFFS. Create /jffs/www.
mkdir /jffs/www
Save this as a startup script:
rmdir /tmp/www; ln -s /jffs/www /tmp/www
Place your content in /jffs/www/index.html and other files in that same directory.
The default location is
http://192.168.1.1/user/index.html
Require PPTPD encryption
Requires JFFS, PPTPD. Copy /tmp/pptpd/options.pptpd to /jffs and edit.
cp /tmp/pptpd/options.pptpd /jffs
vi /jffs/options.pptpd
Insert the following:
mppe required
Save the following as a startup script:
cp /jffs/options.pptpd /tmp/pptpd/options.pptpd
Use freedns dot afraid dot org as DDNS
Create a Jffs partition and copy this script as /jffs/etc/config/ddns.wanup
Change "dot" to "."
#!/bin/sh
# Made by Marc-Antoine Ruel 2006
# Idea taken from http://freedns dot afraid dot org/forums/viewtopic.php?p=4161
# your update URL (replace by yours)
url=http://freedns dot afraid dot org/dynamic/update.php?abc...
# your internet interface
inet_if=ppp0
# curl utility
curl='wget -q -O /dev/tty'
# cache file for IP address
ip_cache=/tmp/ipaddr.cache
old_ip=`cat $ip_cache`
# echo old IP = $old_ip
current_ip=`ifconfig ${inet_if} | sed '/.*inet addr:/!d;s///;s/ .*//'`
# echo New IP = $current_ip
if [ "$current_ip" != "$old_ip" ]; then
$curl $url
echo $current_ip > $ip_cache
echo Updated IP to $current_ip
fi
Don't forget to do
chmod +x /jffs/etc/config/ddns.wanup
Then you can execute it to verify that it works. A temporary file will be created in $ip_cache.