trojan-nao.sh 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494
  1. #!/bin/bash
  2. function blue(){
  3. echo -e "\033[34m\033[01m$1\033[0m"
  4. }
  5. function green(){
  6. echo -e "\033[32m\033[01m$1\033[0m"
  7. }
  8. function red(){
  9. echo -e "\033[31m\033[01m$1\033[0m"
  10. }
  11. function version_lt(){
  12. test "$(echo "$@" | tr " " "\n" | sort -rV | head -n 1)" != "$1";
  13. }
  14. #copy from 秋水逸冰 ss scripts
  15. if [[ -f /etc/redhat-release ]]; then
  16. release="centos"
  17. systemPackage="yum"
  18. elif cat /etc/issue | grep -Eqi "debian"; then
  19. release="debian"
  20. systemPackage="apt-get"
  21. elif cat /etc/issue | grep -Eqi "ubuntu"; then
  22. release="ubuntu"
  23. systemPackage="apt-get"
  24. elif cat /etc/issue | grep -Eqi "centos|red hat|redhat"; then
  25. release="centos"
  26. systemPackage="yum"
  27. elif cat /proc/version | grep -Eqi "debian"; then
  28. release="debian"
  29. systemPackage="apt-get"
  30. elif cat /proc/version | grep -Eqi "ubuntu"; then
  31. release="ubuntu"
  32. systemPackage="apt-get"
  33. elif cat /proc/version | grep -Eqi "centos|red hat|redhat"; then
  34. release="centos"
  35. systemPackage="yum"
  36. fi
  37. systempwd="/etc/systemd/system/"
  38. #install & config trojan
  39. function install_trojan(){
  40. $systemPackage install -y nginx
  41. systemctl stop nginx
  42. sleep 5
  43. cat > /etc/nginx/nginx.conf <<-EOF
  44. user root;
  45. worker_processes 1;
  46. error_log /var/log/nginx/error.log warn;
  47. pid /var/run/nginx.pid;
  48. events {
  49. worker_connections 1024;
  50. }
  51. http {
  52. include /etc/nginx/mime.types;
  53. default_type application/octet-stream;
  54. log_format main '\$remote_addr - \$remote_user [\$time_local] "\$request" '
  55. '\$status \$body_bytes_sent "\$http_referer" '
  56. '"\$http_user_agent" "\$http_x_forwarded_for"';
  57. access_log /var/log/nginx/access.log main;
  58. sendfile on;
  59. #tcp_nopush on;
  60. keepalive_timeout 120;
  61. client_max_body_size 20m;
  62. #gzip on;
  63. server {
  64. listen 80;
  65. server_name $your_domain;
  66. root /usr/share/nginx/html;
  67. index index.php index.html index.htm;
  68. }
  69. }
  70. EOF
  71. #设置伪装站
  72. rm -rf /usr/share/nginx/html/*
  73. cd /usr/share/nginx/html/
  74. wget https://www.dropbox.com/s/m6d5gniodueiumv/web.zip >/dev/null 2>&1
  75. unzip web.zip >/dev/null 2>&1
  76. sleep 5
  77. #申请https证书
  78. if [ ! -d "/usr/src" ]; then
  79. mkdir /usr/src
  80. fi
  81. mkdir /usr/src/trojan-cert /usr/src/trojan-temp
  82. curl https://get.acme.sh | sh
  83. ~/.acme.sh/acme.sh --issue -d $your_domain --standalone
  84. if test -s /root/.acme.sh/$your_domain/fullchain.cer; then
  85. systemctl start nginx
  86. cd /usr/src
  87. #wget https://github.com/trojan-gfw/trojan/releases/download/v1.13.0/trojan-1.13.0-linux-amd64.tar.xz
  88. wget https://api.github.com/repos/trojan-gfw/trojan/releases/latest >/dev/null 2>&1
  89. latest_version=`grep tag_name latest| awk -F '[:,"v]' '{print $6}'`
  90. rm -f latest
  91. wget https://www.dropbox.com/s/70swgj1gods17xu/trojan-1.13.0-linux-amd64.tar.xz >/dev/null 2>&1
  92. tar xf trojan-1.13.0-linux-amd64.tar.xz >/dev/null 2>&1
  93. #下载trojan客户端
  94. wget https://www.dropbox.com/s/yegoxa4hfo5sf2z/trojan-cli.zip >/dev/null 2>&1
  95. wget -P /usr/src/trojan-temp https://github.com/trojan-gfw/trojan/releases/download/v${latest_version}/trojan-${latest_version}-win.zip >/dev/null 2>&1
  96. unzip trojan-cli.zip >/dev/null 2>&1
  97. unzip /usr/src/trojan-temp/trojan-${latest_version}-win.zip -d /usr/src/trojan-temp/ >/dev/null 2>&1
  98. mv -f /usr/src/trojan-temp/trojan/trojan.exe /usr/src/trojan-cli/
  99. trojan_passwd=$(cat /dev/urandom | head -1 | md5sum | head -c 8)
  100. unset porta
  101. echo "================================================================="
  102. read -p " INGRESE PUERTO TROJAN A USAR : " porta
  103. echo "================================================================="
  104. [[ -z $porta ]] && porta="443"
  105. cat > /usr/src/trojan-cli/config.yml <<-EOF
  106. port: 7890
  107. socks-port: 7891
  108. redir-port: 7892
  109. allow-lan: true
  110. mode: Global
  111. log-level: info
  112. external-controller: '0.0.0.0:9090'
  113. secret: ''
  114. dns:
  115. enable: true
  116. nameserver:
  117. - 1.1.1.1
  118. - 1.0.0.1
  119. proxies:
  120. - name: Trojan
  121. type: "trojan"
  122. server: $your_domain
  123. port: 443
  124. password: $trojan_passwd
  125. udp: true
  126. sni: www.tuhost.com
  127. alpn:
  128. - h2
  129. - http/1.1
  130. skip-cert-verify: true
  131. # Eliminar "#" si configura v2ray
  132. #- name: V2ray
  133. # type: vmess
  134. # server: 123.0.0.0
  135. # port:
  136. # uuid:
  137. # alterId:
  138. # cipher: auto
  139. # udp: true
  140. # tls: true
  141. # skip-cert-verify: true
  142. # network: ws
  143. # ws-path: /
  144. # ws-headers: {host: www.tuhost.com}
  145. ###################################
  146. EOF
  147. rm -rf /usr/local/etc/trojan/config.json
  148. cat > /usr/local/etc/trojan/config.json <<-EOF
  149. {
  150. "run_type": "server",
  151. "local_addr": "0.0.0.0",
  152. "local_port": 443,
  153. "remote_addr": "127.0.0.1",
  154. "remote_port": 80,
  155. "password": [
  156. "$trojan_passwd"
  157. ,"chumoghscript"
  158. ],
  159. "log_level": 1,
  160. "ssl": {
  161. "cert": "/usr/src/trojan-cert/fullchain.cer",
  162. "key": "/usr/src/trojan-cert/private.key",
  163. "key_password": "",
  164. "cipher_tls13":"TLS_AES_128_GCM_SHA256:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384",
  165. "prefer_server_cipher": true,
  166. "alpn": [
  167. "http/1.1"
  168. ],
  169. "reuse_session": true,
  170. "session_ticket": false,
  171. "session_timeout": 600,
  172. "plain_http_response": "",
  173. "curves": "",
  174. "dhparam": ""
  175. },
  176. "tcp": {
  177. "no_delay": true,
  178. "keep_alive": true,
  179. "fast_open": false,
  180. "fast_open_qlen": 20
  181. },
  182. "mysql": {
  183. "enabled": false,
  184. "server_addr": "127.0.0.1",
  185. "server_port": 3306,
  186. "database": "trojan",
  187. "username": "trojan",
  188. "password": ""
  189. }
  190. }
  191. EOF
  192. cd /usr/src/trojan-cli/
  193. config.yml /usr/src/trojan-cli/
  194. trojan_path=$(cat /dev/urandom | head -1 | md5sum | head -c 16)
  195. mkdir /usr/share/nginx/html/${trojan_path}
  196. mv /usr/src/trojan-cli/config.yml /usr/share/nginx/html/${trojan_path}/
  197. #增加启动脚本
  198. cat > ${systempwd}trojan.service <<-EOF
  199. [Unit]
  200. Description=trojan
  201. After=network.target
  202. [Service]
  203. Type=simple
  204. PIDFile=/usr/src/trojan/trojan/trojan.pid
  205. ExecStart=/usr/src/trojan/trojan -c "/usr/local/etc/trojan/config.json"
  206. ExecReload=/bin/kill -HUP \$MAINPID
  207. Restart=on-failure
  208. RestartSec=1s
  209. [Install]
  210. WantedBy=multi-user.target
  211. EOF
  212. chmod +x ${systempwd}trojan.service
  213. systemctl enable trojan.service
  214. cd /root
  215. ~/.acme.sh/acme.sh --installcert -d $your_domain \
  216. --key-file /usr/src/trojan-cert/private.key \
  217. --fullchain-file /usr/src/trojan-cert/fullchain.cer \
  218. --reloadcmd "systemctl restart trojan"
  219. green "=============================================================="
  220. green "Se ha instalado trojan, utilice el siguiente enlace para\ndescargar el archivo .yml para configurar en Clash."
  221. blue "http://${your_domain}/$trojan_path/config.yml"
  222. red "Link único y generado de manera aleatoria."
  223. green "=============================================================="
  224. green "Puede modificar el archivo .yml abriéndolo como Texto. "
  225. green "Recuerde modificar el dominio por la ip en el archivo yml. "
  226. green "Todo viene configurado, pero para que funcione correctamente\ntiene que modificar el host."
  227. green "=============================================================="
  228. red "Si gusta configurar manualmente, esta es la información:"
  229. blue "Dominio: $your_domain"
  230. blue "Puerto: 443"
  231. blue "Contraseña: $trojan_passwd"
  232. green "=============================================================="
  233. else
  234. red "==================================="
  235. red "Si el certificado https no obtuvo resultados\nde solicitud y la instalación automática falló"
  236. green "No se preocupe, puede reparar manualmente la solicitud del certificado."
  237. green "1. Reinicie la VPS."
  238. green "2. Vuelva a ejecutar el script y use la función de reparación de certificado."
  239. red "==================================="
  240. fi
  241. }
  242. function preinstall_check(){
  243. nginx_status=`ps -aux | grep "nginx: worker" |grep -v "grep"`
  244. if [ -n "$nginx_status" ]; then
  245. systemctl stop nginx
  246. fi
  247. $systemPackage -y install net-tools socat
  248. Port80=`netstat -tlpn | awk -F '[: ]+' '$1=="tcp"{print $5}' | grep -w 80`
  249. Port443=`netstat -tlpn | awk -F '[: ]+' '$1=="tcp"{print $5}' | grep -w 443`
  250. if [ -n "$Port80" ]; then
  251. process80=`netstat -tlpn | awk -F '[: ]+' '$5=="80"{print $9}'`
  252. red "==========================================================="
  253. red "Se detectó que el puerto 80 está ocupado, el proceso que lo\nocupa es:${process80},La instalación ha finalizado."
  254. red "==========================================================="
  255. exit 1
  256. fi
  257. if [ -n "$Port443" ]; then
  258. process443=`netstat -tlpn | awk -F '[: ]+' '$5=="443"{print $9}'`
  259. red "============================================================="
  260. red "Se detectó que el puerto 443 está ocupado, el proceso que lo\nocupa es::${process443},La instalación ha finalizado."
  261. red "============================================================="
  262. exit 1
  263. fi
  264. if [ -f "/etc/selinux/config" ]; then
  265. CHECK=$(grep SELINUX= /etc/selinux/config | grep -v "#")
  266. if [ "$CHECK" != "SELINUX=disabled" ]; then
  267. green "Se detectó que SELinux está activado, se agregaran las reglas del puerto 80/443"
  268. yum install -y policycoreutils-python >/dev/null 2>&1
  269. semanage port -m -t http_port_t -p tcp 80
  270. semanage port -m -t http_port_t -p tcp 443
  271. fi
  272. fi
  273. if [ "$release" == "centos" ]; then
  274. if [ -n "$(grep ' 6\.' /etc/redhat-release)" ] ;then
  275. red "==============="
  276. red "El sistema actual no es compatible."
  277. red "==============="
  278. exit
  279. fi
  280. if [ -n "$(grep ' 5\.' /etc/redhat-release)" ] ;then
  281. red "==============="
  282. red "El sistema actual no es compatible."
  283. red "==============="
  284. exit
  285. fi
  286. firewall_status=`systemctl status firewalld | grep "Active: active"`
  287. if [ -n "$firewall_status" ]; then
  288. green "Se detectó que el firewall está activado, se agregaran las reglas del puerto 80/443"
  289. firewall-cmd --zone=public --add-port=80/tcp --permanent
  290. firewall-cmd --zone=public --add-port=443/tcp --permanent
  291. firewall-cmd --reload
  292. fi
  293. rpm -Uvh http://nginx.org/packages/centos/7/noarch/RPMS/nginx-release-centos-7-0.el7.ngx.noarch.rpm
  294. elif [ "$release" == "ubuntu" ]; then
  295. if [ -n "$(grep ' 14\.' /etc/os-release)" ] ;then
  296. red "==============="
  297. red "El sistema actual no es compatible."
  298. red "==============="
  299. exit
  300. fi
  301. if [ -n "$(grep ' 12\.' /etc/os-release)" ] ;then
  302. red "==============="
  303. red "El sistema actual no es compatible."
  304. red "==============="
  305. exit
  306. fi
  307. ufw_status=`systemctl status ufw | grep "Active: active"`
  308. if [ -n "$ufw_status" ]; then
  309. ufw allow 80/tcp
  310. ufw allow 443/tcp
  311. fi
  312. apt-get update
  313. elif [ "$release" == "debian" ]; then
  314. ufw_status=`systemctl status ufw | grep "Active: active"`
  315. if [ -n "$ufw_status" ]; then
  316. ufw allow 80/tcp
  317. ufw allow 443/tcp
  318. fi
  319. apt-get update
  320. fi
  321. $systemPackage -y install wget unzip zip curl tar >/dev/null 2>&1
  322. green "======================="
  323. blue "Ingrese el dominio vinculado a esta VPS " && read -p ": " your_domain
  324. green "======================="
  325. real_addr=`ping ${your_domain} -c 1 | sed '1{s/[^(]*(//;s/).*//;q}'`
  326. local_addr=`curl ipv4.icanhazip.com`
  327. if [ $real_addr == $local_addr ] ; then
  328. green "=========================================="
  329. green "La resolución del dominio es normal, se intalará trojan"
  330. green "=========================================="
  331. sleep 1s
  332. install_trojan
  333. else
  334. red "===================================="
  335. red "La resolución de dominio es inconsistente con la dirección IP de la VPS"
  336. red "Si cree que el análisis es correcto, puede forzar a que el script continúe"
  337. red "===================================="
  338. read -p "¿Forzar el script? Seleccione [Y/n] :" yn
  339. [ -z "${yn}" ] && yn="y"
  340. if [[ $yn == [Yy] ]]; then
  341. green "Forzar el script"
  342. sleep 1s
  343. install_trojan
  344. else
  345. exit 1
  346. fi
  347. fi
  348. }
  349. function repair_cert(){
  350. systemctl stop nginx
  351. iptables -I INPUT -p tcp --dport 80 -j ACCEPT
  352. iptables -I INPUT -p tcp --dport 443 -j ACCEPT
  353. Port80=`netstat -tlpn | awk -F '[: ]+' '$1=="tcp"{print $5}' | grep -w 80`
  354. if [ -n "$Port80" ]; then
  355. process80=`netstat -tlpn | awk -F '[: ]+' '$5=="80"{print $9}'`
  356. red "==========================================================="
  357. red "Se detectó que el puerto 80 está ocupado, el proceso que lo\nocupa es:${process80},La instalación ha finalizado."
  358. red "==========================================================="
  359. exit 1
  360. fi
  361. green "======================="
  362. blue "Ingrese el dominio vinculado a esta VPS."
  363. blue "Debe ser el mismo dominio que no pudo usar antes."
  364. green "======================="
  365. read your_domain
  366. real_addr=`ping ${your_domain} -c 1 | sed '1{s/[^(]*(//;s/).*//;q}'`
  367. local_addr=`curl ipv4.icanhazip.com`
  368. if [ $real_addr == $local_addr ] ; then
  369. ~/.acme.sh/acme.sh --issue -d $your_domain --standalone
  370. ~/.acme.sh/acme.sh --installcert -d $your_domain \
  371. --key-file /usr/src/trojan-cert/private.key \
  372. --fullchain-file /usr/src/trojan-cert/fullchain.cer \
  373. --reloadcmd "systemctl restart trojan"
  374. if test -s /usr/src/trojan-cert/fullchain.cer; then
  375. green "Solicitud de certificado exitosa."
  376. green "Descargue fullchain.cer en /usr/src/trojan-cert/ en la carpeta del cliente trojan-cli"
  377. systemctl restart trojan
  378. systemctl start nginx
  379. else
  380. red "No se pudo solicitar el certificado."
  381. fi
  382. else
  383. red "================================"
  384. red "La resolución de dominio es inconsistente con la dirección IP de la VPS"
  385. red "La instalación falló, asegúrese de que la resolución del dominio sea normal"
  386. red "================================"
  387. fi
  388. }
  389. function remove_trojan(){
  390. red "================================"
  391. red "Trojan se desintalará"
  392. red "Nginx también se desintalará"
  393. red "================================"
  394. systemctl stop trojan
  395. systemctl disable trojan
  396. rm -f ${systempwd}trojan.service
  397. if [ "$release" == "centos" ]; then
  398. yum remove -y nginx
  399. else
  400. apt autoremove -y nginx
  401. fi
  402. rm -rf /usr/src/trojan*
  403. rm -rf /usr/share/nginx/html/*
  404. rm -rf /root/.acme.sh/
  405. green "=============="
  406. green "Trojan desinstalado."
  407. green "=============="
  408. }
  409. function update_trojan(){
  410. /usr/src/trojan/trojan -v 2>trojan.tmp
  411. curr_version=`cat trojan.tmp | grep "trojan" | awk '{print $4}'`
  412. wget https://api.github.com/repos/trojan-gfw/trojan/releases/latest >/dev/null 2>&1
  413. latest_version=`grep tag_name latest| awk -F '[:,"v]' '{print $6}'`
  414. rm -f latest
  415. rm -f trojan.tmp
  416. if version_lt "$curr_version" "$latest_version"; then
  417. green "Versión actual: $curr_version, Última versión: $latest_version, actualizando……"
  418. mkdir trojan_update_temp && cd trojan_update_temp
  419. wget https://github.com/trojan-gfw/trojan/releases/download/v${latest_version}/trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1
  420. tar xf trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1
  421. mv ./trojan/trojan /usr/src/trojan/
  422. cd .. && rm -rf trojan_update_temp
  423. systemctl restart trojan
  424. /usr/src/trojan/trojan -v 2>trojan.tmp
  425. green "Se completó la actualización de trojan, la versión actual es:`cat trojan.tmp | grep "trojan" | awk '{print $4}'`"
  426. rm -f trojan.tmp
  427. else
  428. green "Versión actual: $curr_version, Última versión: $latest_version, no es necesario actualizar."
  429. fi
  430. }
  431. start_menu(){
  432. clear
  433. green " ======================================="
  434. green " Script de Instalación de Trojan "
  435. green " Sistemas:centos7+/debian9+/ubuntu16.04+"
  436. green " Edicion ChumoGH - ADM "
  437. blue " Declaración:"
  438. red " *No use este script en ningún entorno de producción."
  439. red " *No debe tener ocupados los puertos 80/443."
  440. red " *Siga las instrucciones."
  441. green " ======================================="
  442. echo
  443. green " 1. Instalar trojan"
  444. red " 2. Desinstalar trojan"
  445. green " 3. Actualizar trojan"
  446. green " 4. Reparar certificado"
  447. blue " 0. Salir del script"
  448. echo
  449. read -p "Ingrese una opción:" num
  450. case "$num" in
  451. 1)
  452. preinstall_check
  453. ;;
  454. 2)
  455. remove_trojan
  456. ;;
  457. 3)
  458. update_trojan
  459. ;;
  460. 4)
  461. repair_cert
  462. ;;
  463. 0)
  464. adm 1
  465. ;;
  466. *)
  467. clear
  468. red "Ingrese una opción correcta."
  469. sleep 1s
  470. start_menu
  471. ;;
  472. esac
  473. }
  474. start_menu