Subversion Repositories ALCASAR

Rev

Rev 2454 | Rev 2458 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log

Rev Author Line No. Line
672 richard 1
#!/bin/bash
2454 tom.houday 2
#  $Id: alcasar.sh 2457 2017-12-10 14:11:01Z richard $
1 root 3
 
4
# alcasar.sh
959 franck 5
 
2454 tom.houday 6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...]
1157 stephane 7
# Ce programme est un logiciel libre ; This software is free and open source
2454 tom.houday 8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence.
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ;
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE.
11
# Voir la Licence Publique Générale GNU pour plus de détails.
959 franck 12
 
967 franck 13
#  team@alcasar.net
959 franck 14
 
1 root 15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
672 richard 18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
1007 richard 19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
1 root 20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
2454 tom.houday 21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
1534 richard 22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
1 root 23
 
24
# Options :
376 franck 25
#       -i or --install
26
#       -u or --uninstall
1 root 27
 
376 franck 28
# Functions :
1378 richard 29
#       testing                 : connectivity tests, free space test and mageia version test
1221 richard 30
#       init                    : Installation of RPM and scripts
31
#       network                 : Network parameters
32
#       ACC                     : ALCASAR Control Center installation
33
#       CA                      : Certification Authority initialization
1837 richard 34
#       time_server             : NTPd configuration
1221 richard 35
#       init_db                 : Initilization of radius database managed with MariaDB
2421 richard 36
#       freeradius              : FreeRadius initialisation
1389 richard 37
#       chilli                  : coovachilli initialisation (+authentication page)
38
#       dansguardian            : DansGuardian filtering HTTP proxy configuration
1221 richard 39
#       antivirus               : HAVP + libclamav configuration
1485 richard 40
#       tinyproxy               : little proxy for user filtered with "WL + antivirus" and "antivirus"
1389 richard 41
#       ulogd                   : log system in userland (match NFLOG target of iptables)
2454 tom.houday 42
#       nfsen                   : Configuration of Nfsen Netflow grapher
1253 richard 43
#       dnsmasq                 : Name server configuration
1541 richard 44
#       vnstat                  : little network stat daemon
1873 richard 45
#       BL                      : Adaptation of Toulouse University BlackList : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
1266 richard 46
#       cron                    : Logs export + watchdog + connexion statistics
1389 richard 47
#       fail2ban                : Fail2ban IDS installation and configuration
48
#       gammu_smsd              : Autoregister addon via SMS (gammu-smsd)
2202 richard 49
#       msec                    : Mandriva security package configuration
2304 tom.houday 50
#       letsencrypt             : Let's Encrypt client
1266 richard 51
#       post_install            : Security, log rotation, etc.
1 root 52
 
53
DATE=`date '+%d %B %Y - %Hh%M'`
54
DATE_SHORT=`date '+%d/%m/%Y'`
595 richard 55
Lang=`echo $LANG|cut -c 1-2`
1362 richard 56
mode="install"
1 root 57
# ******* Files parameters - paramètres fichiers *********
2454 tom.houday 58
DIR_INSTALL=`pwd`                               # current directory
1015 richard 59
DIR_CONF="$DIR_INSTALL/conf"                    # install directory (with conf files)
60
DIR_SCRIPTS="$DIR_INSTALL/scripts"              # install directory (with script files)
1938 richard 61
DIR_BLACKLIST="$DIR_INSTALL/blacklist"          # install directory (with blacklist files)
1564 richard 62
DIR_SAVE="/var/Save"                            # backup directory (traceability_log, user_db, security_log)
1015 richard 63
DIR_WEB="/var/www/html"                         # directory of APACHE
64
DIR_DG="/etc/dansguardian"                      # directory of DansGuardian
65
DIR_ACC="$DIR_WEB/acc"                          # directory of the 'ALCASAR Control Center'
66
DIR_DEST_BIN="/usr/local/bin"                   # directory of ALCASAR scripts
67
DIR_DEST_ETC="/usr/local/etc"                   # directory of ALCASAR conf files
68
DIR_DEST_SHARE="/usr/local/share"               # directory of share files used by ALCASAR (dnsmasq for instance)
69
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"          # central ALCASAR conf file
70
PASSWD_FILE="/root/ALCASAR-passwords.txt"       # text file with the passwords and shared secrets
1 root 71
# ******* DBMS parameters - paramètres SGBD ********
1243 richard 72
DB_RADIUS="radius"                              # database name used by FreeRadius server
73
DB_USER="radius"                                # user name allows to request the users database
1349 richard 74
DB_GAMMU="gammu"                                # database name used by Gammu-smsd
1 root 75
# ******* Network parameters - paramètres réseau *******
1469 richard 76
HOSTNAME="alcasar"                              # default hostname
1243 richard 77
DOMAIN="localdomain"                            # default local domain
1828 richard 78
EXTIF=`/usr/sbin/ip route|grep default|head -n1|cut -d" " -f5`                                                  # EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
79
INTIF=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`      # INTIF is connected to the consultation network
1148 crox53 80
MTU="1500"
1243 richard 81
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"      # Default ALCASAR IP address
1 root 82
# ****** Paths - chemin des commandes *******
83
SED="/bin/sed -i"
84
# ****************** End of global parameters *********************
85
 
959 franck 86
license ()
87
{
88
        if [ $Lang == "fr" ]
1538 richard 89
        then
90
                cat $DIR_INSTALL/gpl-warning.fr.txt | more
91
        else
92
                cat $DIR_INSTALL/gpl-warning.txt | more
959 franck 93
        fi
1538 richard 94
        response=0
95
        PTN='^[oOyYnN]$'
96
        until [[ $(expr $response : $PTN) -gt 0 ]]
97
        do
98
                if [ $Lang == "fr" ]
1563 franck 99
                        then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
1538 richard 100
                        else echo -n "Do you accept the terms of this license (Y/n)? : "
101
                fi
102
                read response
103
        done
104
        if [ "$response" = "n" ] || [ "$response" = "N" ]
105
        then
106
                exit 1
107
        fi
959 franck 108
}
109
 
1 root 110
header_install ()
111
{
112
        clear
113
        echo "-----------------------------------------------------------------------------"
460 richard 114
        echo "                     ALCASAR V$VERSION Installation"
1 root 115
        echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
116
        echo "-----------------------------------------------------------------------------"
1389 richard 117
}
1 root 118
 
119
##################################################################
1221 richard 120
##                      Function "testing"                      ##
1378 richard 121
## - Test of Mageia version                                     ##
1529 richard 122
## - Test of ALCASAR version (if already installed)             ##
1342 richard 123
## - Test of free space on /var  (>10G)                         ##
1005 richard 124
## - Test of Internet access                                    ##
29 richard 125
##################################################################
126
testing ()
127
{
1529 richard 128
# Test of Mageia version
129
# extract the current Mageia version and hardware architecture (i586 ou X64)
130
        fic=`cat /etc/product.id`
131
        unknown_os=0
132
        old="$IFS"
133
        IFS=","
134
        set $fic
135
        for i in $*
136
        do
137
                if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
2454 tom.houday 138
                        then
1529 richard 139
                        DISTRIBUTION=`echo $i|cut -d"=" -f2`
140
                        unknown_os=`expr $unknown_os + 1`
141
                fi
142
                if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
2454 tom.houday 143
                        then
1529 richard 144
                        CURRENT_VERSION=`echo $i|cut -d"=" -f2`
145
                        unknown_os=`expr $unknown_os + 1`
146
                fi
147
                if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
2454 tom.houday 148
                        then
1529 richard 149
                        ARCH=`echo $i|cut -d"=" -f2`
150
                        unknown_os=`expr $unknown_os + 1`
151
                fi
152
        done
2149 richard 153
        if [ "$ARCH" == "i586" ]
154
                then
155
                if [ $Lang == "fr" ]
156
                        then echo -n "Votre architecture matérielle doit être en 64bits"
157
                        else echo -n "You hardware architecture must be 64bits"
158
                        exit 0
159
                fi
160
        fi
1529 richard 161
        IFS="$old"
1362 richard 162
# Test if ALCASAR is already installed
163
        if [ -e $CONF_FILE ]
164
        then
2396 tom.houday 165
                current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
1342 richard 166
                if [ $Lang == "fr" ]
1362 richard 167
                        then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
168
                        else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
1342 richard 169
                fi
1362 richard 170
                response=0
171
                PTN='^[oOnNyY]$'
172
                until [[ $(expr $response : $PTN) -gt 0 ]]
173
                do
174
                        if [ $Lang == "fr" ]
175
                                then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
176
                                else echo -n "Do you want to update (Y/n)?";
177
                         fi
178
                        read response
179
                done
2454 tom.houday 180
                if [ "$response" = "n" ] || [ "$response" = "N" ]
1362 richard 181
                then
182
                        rm -f /tmp/alcasar-conf*
183
                else
1684 richard 184
# Retrieve former NICname
185
                        EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`                           # EXTernal InterFace
186
                        INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`                           # INTernal InterFace
1564 richard 187
# Create the current conf file
1362 richard 188
                        $DIR_SCRIPTS/alcasar-conf.sh --create
189
                        mode="update"
190
                fi
1529 richard 191
        fi
2416 richard 192
        if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "6" ) ]]
1529 richard 193
                then
194
                if [ -e /tmp/alcasar-conf.tar.gz ] # update
1365 richard 195
                        then
1529 richard 196
                        echo
1378 richard 197
                        if [ $Lang == "fr" ]
2454 tom.houday 198
                                then
1529 richard 199
                                echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
1961 richard 200
                                echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
2416 richard 201
                                echo "2 - Installez Linux-Mageia 6.0 (64bits) et ALCASAR (cf. doc d'installation)"
1961 richard 202
                                echo "3 - Importez votre base des usagers"
1378 richard 203
                        else
204
                                echo "The automatic update of ALCASAR can't be performed."
1961 richard 205
                                echo "1 - Save your traceability files and the user database"
2416 richard 206
                                echo "2 - Install Linux-Mageia 6 (64bits) & ALCASAR (cf. installation doc)"
1961 richard 207
                                echo "3 - Import your users database"
1378 richard 208
                        fi
1529 richard 209
                else
210
                        if [ $Lang == "fr" ]
2454 tom.houday 211
                                then
1529 richard 212
                                echo "L'installation d'ALCASAR ne peut pas être réalisée."
213
                        else
214
                                echo "The installation of ALCASAR can't be performed."
1378 richard 215
                        fi
216
                fi
1529 richard 217
                echo
218
                if [ $Lang == "fr" ]
2454 tom.houday 219
                        then
2416 richard 220
                        echo "Le système d'exploitation doit être remplacé (Mageia6-64bits)"
1529 richard 221
                else
2416 richard 222
                        echo "The OS must be replaced (Mageia6-64bits)"
1529 richard 223
                fi
224
                exit 0
1342 richard 225
        fi
1529 richard 226
        if [ ! -d /var/log/netflow/porttracker ]
227
                then
2290 richard 228
# Test free space on /var
1529 richard 229
                free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
230
                if [ $free_space -lt 10 ]
231
                        then
232
                        if [ $Lang == "fr" ]
233
                                then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
234
                                else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
235
                        fi
236
                exit 0
237
                fi
238
        fi
2290 richard 239
        if [ $Lang == "fr" ]
240
                then echo -n "Tests des paramètres réseau : "
241
                else echo -n "Network parameters tests : "
242
        fi
243
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
2282 richard 244
        cd /etc/sysconfig/network-scripts/
2290 richard 245
        IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
2282 richard 246
        for i in $IF_INTERFACES
247
        do
2454 tom.houday 248
                IP_INTERFACE=`/usr/sbin/ip link|grep $i`
2282 richard 249
                if [ -z "$IP_INTERFACE" ]
250
                then
251
                        rm -f ifcfg-$i
2454 tom.houday 252
 
2282 richard 253
                        if [ $Lang == "fr" ]
254
                                then echo "Suppression : ifcfg-$i"
255
                                else echo "Deleting : ifcfg-$i"
256
                        fi
257
                fi
258
        done
259
        cd $DIR_INSTALL
2290 richard 260
        echo -n "."
2454 tom.houday 261
# Test Ethernet NIC links state
2290 richard 262
        DOWN_IF=`/usr/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "|grep -v "^w"`
1471 richard 263
        for i in $DOWN_IF
264
        do
2290 richard 265
                echo $i
1471 richard 266
                if [ $Lang == "fr" ]
2454 tom.houday 267
                then
1471 richard 268
                        echo "Échec"
269
                        echo "Le lien réseau de la carte $i n'est pas actif."
270
                        echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
271
                else
272
                        echo "Failed"
273
                        echo "The link state of $i interface is down."
274
                        echo "Make sure that this network card is connected to a switch or an A.P."
275
                fi
276
                exit 0
277
        done
278
        echo -n "."
279
# Test EXTIF config files
1499 richard 280
        PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
281
        PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
1686 richard 282
        PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
1471 richard 283
        if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
284
        then
784 richard 285
                if [ $Lang == "fr" ]
2454 tom.houday 286
                then
784 richard 287
                        echo "Échec"
288
                        echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
289
                        echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
1362 richard 290
                        echo "Appliquez les changements : 'systemctl restart network'"
784 richard 291
                else
292
                        echo "Failed"
293
                        echo "The Internet connected network card ($EXTIF) isn't well configured."
294
                        echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
1362 richard 295
                        echo "Apply the new configuration 'systemctl restart network'"
784 richard 296
                fi
830 richard 297
                echo "DEVICE=$EXTIF"
784 richard 298
                echo "IPADDR="
299
                echo "NETMASK="
300
                echo "GATEWAY="
301
                echo "DNS1="
302
                echo "DNS2="
830 richard 303
                echo "ONBOOT=yes"
784 richard 304
                exit 0
305
        fi
306
        echo -n "."
2290 richard 307
# Test if default GW is set on EXTIF (router or ISP provider equipment)
1686 richard 308
        if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
595 richard 309
                if [ $Lang == "fr" ]
2454 tom.houday 310
                then
595 richard 311
                        echo "Échec"
312
                        echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
313
                        echo "Réglez ce problème puis relancez ce script."
314
                else
315
                        echo "Failed"
316
                        echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
317
                        echo "Resolv this problem, then restart this script."
318
                fi
29 richard 319
                exit 0
320
        fi
308 richard 321
        echo -n "."
2290 richard 322
# Test if default GW is alive
1499 richard 323
        arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
527 richard 324
        if [ $(expr $arp_reply) -eq 0 ]
2454 tom.houday 325
                then
595 richard 326
                if [ $Lang == "fr" ]
2454 tom.houday 327
                then
595 richard 328
                        echo "Échec"
2290 richard 329
                        echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
595 richard 330
                        echo "Réglez ce problème puis relancez ce script."
331
                else
332
                        echo "Failed"
2290 richard 333
                        echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
595 richard 334
                        echo "Resolv this problem, then restart this script."
335
                fi
308 richard 336
                exit 0
337
        fi
338
        echo -n "."
2290 richard 339
# Test Internet connectivity
29 richard 340
        rm -rf /tmp/con_ok.html
308 richard 341
        /usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
29 richard 342
        if [ ! -e /tmp/con_ok.html ]
343
        then
595 richard 344
                if [ $Lang == "fr" ]
2454 tom.houday 345
                then
595 richard 346
                        echo "La tentative de connexion vers Internet a échoué (google.fr)."
347
                        echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
348
                        echo "Vérifiez la validité des adresses IP des DNS."
349
                else
350
                        echo "The Internet connection try failed (google.fr)."
351
                        echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
352
                        echo "Verify the DNS IP addresses"
353
                fi
29 richard 354
                exit 0
355
        fi
356
        rm -rf /tmp/con_ok.html
308 richard 357
        echo ". : ok"
1389 richard 358
} # end of testing ()
302 richard 359
 
360
##################################################################
1221 richard 361
##                      Function "init"                         ##
2290 richard 362
## - Création du fichier "/root/ALCASAR_parametres.tx          ##
302 richard 363
## - Installation et modification des scripts du portail        ##
364
##################################################################
365
init ()
366
{
527 richard 367
        if [ "$mode" != "update" ]
302 richard 368
        then
369
# On affecte le nom d'organisme
597 richard 370
                header_install
302 richard 371
                ORGANISME=!
372
                PTN='^[a-zA-Z0-9-]*$'
580 richard 373
                until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
2454 tom.houday 374
                do
595 richard 375
                        if [ $Lang == "fr" ]
2454 tom.houday 376
                                then echo -n "Entrez le nom de votre organisme : "
597 richard 377
                                else echo -n "Enter the name of your organism : "
595 richard 378
                        fi
330 franck 379
                        read ORGANISME
613 richard 380
                        if [ "$ORGANISME" == "" ]
330 franck 381
                                then
382
                                ORGANISME=!
383
                        fi
384
                done
302 richard 385
        fi
1 root 386
# On crée aléatoirement les mots de passe et les secrets partagés
2419 richard 387
# We create random passwords and shared secrets
628 richard 388
        rm -f $PASSWD_FILE
2419 richard 389
        echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
390
        grub2pwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
2454 tom.houday 391
        pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
392
                LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
393
                grep -v '[eE]nter password:' | \
394
                sed -e "s/PBKDF2 hash of your password is //"`
395
        echo "GRUB2_PASSWORD=$pbkdf2" > /boot/grub2/user.cfg
396
        [ -e /root/grub.default ] || cp /etc/grub.d/10_linux /root/grub.default
397
        cp -f $DIR_CONF/grub-10_linux /etc/grub.d/10_linux  # Request password only on menu editing attempts (not when selecting an entry)
398
        chmod 0600 /boot/grub2/user.cfg
2419 richard 399
        echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
2454 tom.houday 400
        echo "GRUB2_user=root" >> $PASSWD_FILE
401
        echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
2399 tom.houday 402
        mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
2419 richard 403
        echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
2412 tom.houday 404
        echo "db_root=$mysqlpwd" >> $PASSWD_FILE
2399 tom.houday 405
        radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
2419 richard 406
        echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
2421 richard 407
        echo "db_user=$DB_USER" >> $PASSWD_FILE
408
        echo "db_password=$radiuspwd" >> $PASSWD_FILE
2399 tom.houday 409
        secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
2412 tom.houday 410
        echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
411
        echo "secret_uam=$secretuam" >> $PASSWD_FILE
2399 tom.houday 412
        secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
2412 tom.houday 413
        echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
414
        echo "secret_radius=$secretradius" >> $PASSWD_FILE
628 richard 415
        chmod 640 $PASSWD_FILE
1828 richard 416
#  copy scripts in in /usr/local/bin
5 franck 417
        cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
1828 richard 418
#  copy conf files in /usr/local/etc
1954 richard 419
        cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
1828 richard 420
        $SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mysql.sh
628 richard 421
# generate central conf file
422
        cat <<EOF > $CONF_FILE
612 richard 423
##########################################
424
##                                      ##
425
##          ALCASAR Parameters          ##
426
##                                      ##
427
##########################################
1 root 428
 
612 richard 429
INSTALL_DATE=$DATE
430
VERSION=$VERSION
431
ORGANISM=$ORGANISME
1748 richard 432
HOSTNAME=$HOSTNAME
923 franck 433
DOMAIN=$DOMAIN
612 richard 434
EOF
628 richard 435
        chmod o-rwx $CONF_FILE
1 root 436
} # End of init ()
437
 
438
##################################################################
1221 richard 439
##                      Function "network"                      ##
1 root 440
## - Définition du plan d'adressage du réseau de consultation ##
595 richard 441
## - Nommage DNS du système                                    ##
1336 richard 442
## - Configuration de l'interface INTIF (réseau de consultation)##
1 root 443
## - Modification du fichier /etc/hosts                         ##
444
## - Renseignement des fichiers hosts.allow et hosts.deny       ##
445
##################################################################
446
network ()
447
{
448
        header_install
636 richard 449
        if [ "$mode" != "update" ]
450
                then
451
                if [ $Lang == "fr" ]
452
                        then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
453
                        else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
454
                fi
455
                response=0
456
                PTN='^[oOyYnN]$'
457
                until [[ $(expr $response : $PTN) -gt 0 ]]
1 root 458
                do
595 richard 459
                        if [ $Lang == "fr" ]
659 richard 460
                                then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
618 richard 461
                                else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
595 richard 462
                        fi
1 root 463
                        read response
464
                done
636 richard 465
                if [ "$response" = "n" ] || [ "$response" = "N" ]
466
                then
467
                        PRIVATE_IP_MASK="0"
468
                        PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
469
                        until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
1 root 470
                        do
595 richard 471
                                if [ $Lang == "fr" ]
597 richard 472
                                        then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
473
                                        else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
595 richard 474
                                fi
597 richard 475
                                read PRIVATE_IP_MASK
1 root 476
                        done
636 richard 477
                else
2454 tom.houday 478
                                PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
636 richard 479
                fi
595 richard 480
        else
2454 tom.houday 481
                PRIVATE_IP_MASK=`grep ^PRIVATE_IP= conf/etc/alcasar.conf|cut -d"=" -f2`
637 richard 482
                rm -rf conf/etc/alcasar.conf
1 root 483
        fi
861 richard 484
# Define LAN side global parameters
1740 richard 485
        hostnamectl set-hostname $HOSTNAME.$DOMAIN
977 richard 486
        PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`                               # private network address (ie.: 192.168.182.0)
1499 richard 487
        private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`                                  # last octet of LAN address
977 richard 488
        PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`                               # private network mask (ie.: 255.255.255.0)
1499 richard 489
        PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`                                 # network prefix (ie. 24)
977 richard 490
        PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`                                              # ALCASAR private ip address (consultation LAN side)
1499 richard 491
        if [ $PRIVATE_IP == $PRIVATE_NETWORK ]                                                          # when entering network address instead of ip address
492
                then
2454 tom.houday 493
                PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`
1499 richard 494
                PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
2454 tom.houday 495
        fi
1499 richard 496
        private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`                                            # last octet of LAN address
497
        PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`          # second network address (ex.: 192.168.182.2)
977 richard 498
        PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX                                           # ie.: 192.168.182.0/24
1499 richard 499
        classe=$((PRIVATE_PREFIX/8))                                                                    # ie.: 2=classe B, 3=classe C
977 richard 500
        PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.                          # compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
501
        PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`                        # private network broadcast (ie.: 192.168.182.255)
1499 richard 502
        private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`                              # last octet of LAN broadcast
503
        PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1` # First network address (ex.: 192.168.182.1)
837 richard 504
        PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`      # last network address (ex.: 192.168.182.254)
1828 richard 505
        PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'`      # MAC address of INTIF
841 richard 506
# Define Internet parameters
2457 richard 507
        DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`       # 1st DNS server
508
        if [ "$DNS1" != "" ] && [ "$DNS1" != "127.0.0.1" ]
509
        then
510
                if [ $Lang == "fr" ]
511
                then
512
                        echo "L'adresse IP des serveurs DNS ne sont pas corrects"
513
                        echo "Vérifiez la configuration de la carte réseau externe ($EXTIF)"
514
                else
515
                        echo "The IP address of DNS servers are not set correctly"
516
                        echo "Check the extern network card configuration ($EXTIF)"
517
                fi
518
                exit 0
519
        fi
2396 tom.houday 520
        nb_dns=`grep -c ^nameserver /etc/resolv.conf`
1499 richard 521
        if [ $nb_dns == 2 ]
522
                then
523
                DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`                        # 2nd DNS server (if exist)
524
        fi
70 franck 525
        DNS1=${DNS1:=208.67.220.220}
526
        DNS2=${DNS2:=208.67.222.222}
1499 richard 527
        PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
1052 richard 528
        PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
1069 richard 529
        PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
1499 richard 530
# Wrtie the conf file
1469 richard 531
        echo "EXTIF=$EXTIF" >> $CONF_FILE
532
        echo "INTIF=$INTIF" >> $CONF_FILE
2282 richard 533
        ######## Récupération des interfaces du ou des réseaux de consultation supplémentaires #################
534
        INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
535
 
536
        for i in $INTERFACES
537
        do
538
                SUB=`echo ${i:0:2}`
539
                if [ $SUB = "wl" ]
540
                        then WIFIF=$i
2454 tom.houday 541
                elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ]
2282 richard 542
                        then LANIF=$i
543
                fi
544
        done
545
 
546
        if [ -n "$WIFIF" ]
547
                then echo "WIFIF=$WIFIF" >> $CONF_FILE
548
        elif [ -n "$LANIF" ]
549
                then echo "LANIF=$LANIF" >> $CONF_FILE
550
        fi
2454 tom.houday 551
        #########################################################################################################
552
 
1499 richard 553
        IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`           # IP setting (static or dynamic)
554
        if [ $IP_SETTING == "dhcp" ]
555
                then
556
                echo "PUBLIC_IP=dhcp" >> $CONF_FILE
1585 richard 557
                echo "GW=dhcp" >> $CONF_FILE
1499 richard 558
        else
559
                echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
1585 richard 560
                echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
1499 richard 561
        fi
1587 richard 562
        echo "DNS1=$DNS1" >> $CONF_FILE
563
        echo "DNS2=$DNS2" >> $CONF_FILE
994 franck 564
        echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
628 richard 565
        echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
1484 richard 566
        echo "DHCP=on" >> $CONF_FILE
914 franck 567
        echo "EXT_DHCP_IP=none" >> $CONF_FILE
568
        echo "RELAY_DHCP_IP=none" >> $CONF_FILE
569
        echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
1610 franck 570
        echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
571
        echo "INT_DNS_IP=none" >> $CONF_FILE
572
        echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
1499 richard 573
# network default
597 richard 574
        [ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
1 root 575
        cat <<EOF > /etc/sysconfig/network
576
NETWORKING=yes
577
FORWARD_IPV4=true
578
EOF
1499 richard 579
# /etc/hosts config
1 root 580
        [ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
581
        cat <<EOF > /etc/hosts
503 richard 582
127.0.0.1       localhost
1736 richard 583
$PRIVATE_IP     $HOSTNAME.$DOMAIN $HOSTNAME
1 root 584
EOF
1499 richard 585
# EXTIF (Internet) config
586
        [ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
587
        if [ $IP_SETTING == "dhcp" ]
588
                then
589
                cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
14 richard 590
DEVICE=$EXTIF
1585 richard 591
BOOTPROTO=dhcp
592
DNS1=127.0.0.1
593
PEERDNS=no
594
RESOLV_MODS=yes
595
ONBOOT=yes
1613 franck 596
NOZEROCONF=yes
1585 richard 597
METRIC=10
598
MII_NOT_SUPPORTED=yes
599
IPV6INIT=no
600
IPV6TO4INIT=no
601
ACCOUNTING=no
602
USERCTL=no
603
MTU=$MTU
604
EOF
2454 tom.houday 605
                else
1585 richard 606
                cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
607
DEVICE=$EXTIF
14 richard 608
BOOTPROTO=static
597 richard 609
IPADDR=$PUBLIC_IP
610
NETMASK=$PUBLIC_NETMASK
611
GATEWAY=$PUBLIC_GATEWAY
14 richard 612
DNS1=127.0.0.1
1499 richard 613
RESOLV_MODS=yes
14 richard 614
ONBOOT=yes
615
METRIC=10
1610 franck 616
NOZEROCONF=yes
14 richard 617
MII_NOT_SUPPORTED=yes
618
IPV6INIT=no
619
IPV6TO4INIT=no
620
ACCOUNTING=no
621
USERCTL=no
994 franck 622
MTU=$MTU
14 richard 623
EOF
1499 richard 624
        fi
1336 richard 625
# Config INTIF (consultation LAN) in normal mode
841 richard 626
        cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
627
DEVICE=$INTIF
628
BOOTPROTO=static
629
ONBOOT=yes
630
NOZEROCONF=yes
631
MII_NOT_SUPPORTED=yes
632
IPV6INIT=no
633
IPV6TO4INIT=no
634
ACCOUNTING=no
635
USERCTL=no
636
EOF
1558 richard 637
        cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
1336 richard 638
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
1554 richard 639
        cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
1 root 640
DEVICE=$INTIF
641
BOOTPROTO=static
642
IPADDR=$PRIVATE_IP
604 richard 643
NETMASK=$PRIVATE_NETMASK
1 root 644
ONBOOT=yes
645
METRIC=10
646
NOZEROCONF=yes
647
MII_NOT_SUPPORTED=yes
14 richard 648
IPV6INIT=no
649
IPV6TO4INIT=no
650
ACCOUNTING=no
651
USERCTL=no
1 root 652
EOF
2282 richard 653
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
654
        if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
655
        then
656
                cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
657
DEVICE=$WIFIF
658
BOOTPROTO=static
659
ONBOOT=yes
660
NOZEROCONF=yes
661
MII_NOT_SUPPORTED=yes
662
IPV6INIT=no
663
IPV6TO4INIT=no
664
ACCOUNTING=no
665
USERCTL=no
666
EOF
667
        elif [ -n "$LANIF" ]
668
        then
669
                cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
670
DEVICE=$LANIF
671
BOOTPROTO=static
672
ONBOOT=yes
673
NOZEROCONF=yes
674
MII_NOT_SUPPORTED=yes
675
IPV6INIT=no
676
IPV6TO4INIT=no
677
ACCOUNTING=no
678
USERCTL=no
679
EOF
680
        fi
2454 tom.houday 681
        #########################################################################################################
1 root 682
# Renseignement des fichiers hosts.allow et hosts.deny
683
        [ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
684
        cat <<EOF > /etc/hosts.allow
685
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
604 richard 686
sshd: ALL
1 root 687
ntpd: $PRIVATE_NETWORK_SHORT
688
EOF
689
        [ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
690
        cat <<EOF > /etc/hosts.deny
691
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
692
EOF
790 richard 693
        chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
860 richard 694
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
1069 richard 695
        echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
790 richard 696
# load conntrack ftp module
697
        [ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
1705 richard 698
        echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
1159 crox53 699
# load ipt_NETFLOW module
700
        echo "ipt_NETFLOW" >>  /etc/modprobe.preload
1513 richard 701
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
702
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
703
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
704
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
1833 richard 705
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
2454 tom.houday 706
#
860 richard 707
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
1 root 708
} # End of network ()
709
 
710
##################################################################
1221 richard 711
##                      Function "ACC"                          ##
1898 richard 712
## - installation of then ALCASAR Control Center (ACC)  )       ##
713
## - configuration of the web server (Apache)                   ##
714
## - creation of the first ACC admin account                    ##
715
## - secure the access                                          ##
1 root 716
##################################################################
1221 richard 717
ACC ()
1 root 718
{
719
        [ -d $DIR_WEB ] && rm -rf $DIR_WEB
720
        mkdir $DIR_WEB
1833 richard 721
# Copy & adapt ACC files
316 richard 722
        cp -rf $DIR_INSTALL/web/* $DIR_WEB/
723
        $SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
724
        $SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
725
        $SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
726
        $SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
727
        chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
5 franck 728
        chown -R apache:apache $DIR_WEB/*
1833 richard 729
# copy & adapt "freeradius-web" files
730
        cp -rf $DIR_CONF/freeradius-web/ /etc/
731
        [ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
732
        $SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
733
        $SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
734
        $SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
735
        cat <<EOF > /etc/freeradius-web/naslist.conf
736
nas1_name: alcasar-$ORGANISME
737
nas1_model: Network Access Controler
738
nas1_ip: $PRIVATE_IP
739
nas1_port_num: 0
740
nas1_community: public
741
EOF
742
        chown -R apache:apache /etc/freeradius-web/
743
# create the log & backup structure :
1489 richard 744
# - base = users database
745
# - archive = tarball of "base + http firewall + netflow"
1833 richard 746
# - security = watchdog log
2138 richard 747
        for i in base archive security activity_report;
1 root 748
        do
749
                [ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
750
        done
5 franck 751
        chown -R root:apache $DIR_SAVE
1833 richard 752
# Configuring & securing php
71 richard 753
        [ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
534 richard 754
        timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
755
        $SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
411 richard 756
        $SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
757
        $SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
2397 tom.houday 758
        $SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
759
        $SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
71 richard 760
        $SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
761
        $SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
2397 tom.houday 762
        $SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
1833 richard 763
# Configuring & sécuring Apache
790 richard 764
        rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
1 root 765
        [ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
1243 richard 766
        $SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
303 richard 767
        $SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
1532 richard 768
        $SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
769
        echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
770
        echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
771
        [ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
772
        $SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
773
        $SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
774
        $SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
775
        $SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
776
        $SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
777
        $SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
1359 richard 778
        [ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
1702 richard 779
        echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
780
        echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
781
        echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
782
        echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
783
        echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
784
        echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
785
        echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
1532 richard 786
# Error page management
1534 richard 787
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
788
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
1532 richard 789
Alias /error/ "/var/www/html/"
790
<Directory "/usr/share/httpd/error">
791
    AllowOverride None
792
    Options IncludesNoExec
793
    AddOutputFilter Includes html
794
    AddHandler type-map var
795
    Require all granted
796
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
797
    ForceLanguagePriority Prefer Fallback
798
</Directory>
799
ErrorDocument 400 /error/error.php?error=400
800
ErrorDocument 401 /error/error.php?error=401
801
ErrorDocument 403 /error/error.php?error=403
1992 richard 802
ErrorDocument 404 /error/index.php
1532 richard 803
ErrorDocument 405 /error/error.php?error=405
804
ErrorDocument 408 /error/error.php?error=408
805
ErrorDocument 410 /error/error.php?error=410
806
ErrorDocument 411 /error/error.php?error=411
807
ErrorDocument 412 /error/error.php?error=412
808
ErrorDocument 413 /error/error.php?error=413
809
ErrorDocument 414 /error/error.php?error=414
810
ErrorDocument 415 /error/error.php?error=415
811
ErrorDocument 500 /error/error.php?error=500
812
ErrorDocument 501 /error/error.php?error=501
813
ErrorDocument 502 /error/error.php?error=502
814
ErrorDocument 503 /error/error.php?error=503
815
ErrorDocument 506 /error/error.php?error=506
816
EOF
1359 richard 817
        [ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
818
        $SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
819
        [ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
820
        cat <<EOF > /usr/share/httpd/error/include/bottom.html
1 root 821
</body>
822
</html>
823
EOF
824
# Définition du premier compte lié au profil 'admin'
2293 tom.houday 825
        if [ "$mode" = "install" ]
826
                then
613 richard 827
                        header_install
2293 tom.houday 828
                        admin_portal=!
829
                        PTN='^[a-zA-Z0-9-]*$'
830
                        until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
831
                                do
832
                                header_install
833
                                if [ $Lang == "fr" ]
2454 tom.houday 834
                                then
2293 tom.houday 835
                                        echo ""
836
                                        echo "Définissez un premier compte d'administration d'ALCASAR :"
837
                                        echo
838
                                        echo -n "Nom : "
839
                                else
840
                                        echo ""
841
                                        echo "Define the first account allow to administrate ALCASAR :"
842
                                        echo
843
                                        echo -n "Account : "
844
                                fi
845
                                read admin_portal
846
                                if [ "$admin_portal" == "" ]
847
                                        then
848
                                        admin_portal=!
849
                                fi
850
                                done
1268 richard 851
# Creation of keys file for the admin account ("admin")
2293 tom.houday 852
                        [ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
853
                        mkdir -p $DIR_DEST_ETC/digest
854
                        chmod 755 $DIR_DEST_ETC/digest
855
                        until [ -s $DIR_DEST_ETC/digest/key_admin ]
856
                                do
857
                                        /usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin "ALCASAR Control Center (ACC)" $admin_portal
858
                                done
859
                        $DIR_DEST_BIN/alcasar-profil.sh --list
860
        fi
1833 richard 861
# ACC partitioning
988 franck 862
        rm -f /etc/httpd/conf/webapps.d/alcasar*
1 root 863
        cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
2293 tom.houday 864
<Directory $DIR_WEB>
865
        AllowOverride None
866
        Order deny,allow
867
        Deny from all
868
        Allow from 127.0.0.1
869
        Allow from $PRIVATE_NETWORK_MASK
870
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
871
</Directory>
872
<Directory $DIR_WEB/certs>
873
        AddType application/x-x509-ca-cert crt
874
</Directory>
316 richard 875
<Directory $DIR_ACC>
1 root 876
        SSLRequireSSL
877
        AllowOverride None
878
        Order deny,allow
879
        Deny from all
880
        Allow from 127.0.0.1
881
        Allow from $PRIVATE_NETWORK_MASK
882
        require valid-user
883
        AuthType digest
2454 tom.houday 884
        AuthName "ALCASAR Control Center (ACC)"
1747 richard 885
        AuthDigestDomain $HOSTNAME.$DOMAIN
1 root 886
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
434 richard 887
        AuthUserFile $DIR_DEST_ETC/digest/key_all
1243 richard 888
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1 root 889
</Directory>
316 richard 890
<Directory $DIR_ACC/admin>
1 root 891
        SSLRequireSSL
892
        AllowOverride None
893
        Order deny,allow
894
        Deny from all
895
        Allow from 127.0.0.1
896
        Allow from $PRIVATE_NETWORK_MASK
897
        require valid-user
898
        AuthType digest
2454 tom.houday 899
        AuthName "ALCASAR Control Center (ACC)"
1747 richard 900
        AuthDigestDomain $HOSTNAME.$DOMAIN
1 root 901
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
434 richard 902
        AuthUserFile $DIR_DEST_ETC/digest/key_admin
1243 richard 903
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1 root 904
</Directory>
344 richard 905
<Directory $DIR_ACC/manager>
1 root 906
        SSLRequireSSL
907
        AllowOverride None
908
        Order deny,allow
909
        Deny from all
910
        Allow from 127.0.0.1
911
        Allow from $PRIVATE_NETWORK_MASK
912
        require valid-user
913
        AuthType digest
2454 tom.houday 914
        AuthName "ALCASAR Control Center (ACC)"
1747 richard 915
        AuthDigestDomain $HOSTNAME.$DOMAIN
1 root 916
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
434 richard 917
        AuthUserFile $DIR_DEST_ETC/digest/key_manager
1243 richard 918
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1 root 919
</Directory>
316 richard 920
<Directory $DIR_ACC/backup>
921
        SSLRequireSSL
922
        AllowOverride None
923
        Order deny,allow
924
        Deny from all
925
        Allow from 127.0.0.1
926
        Allow from $PRIVATE_NETWORK_MASK
927
        require valid-user
928
        AuthType digest
2454 tom.houday 929
        AuthName "ALCASAR Control Center (ACC)"
1747 richard 930
        AuthDigestDomain $HOSTNAME.$DOMAIN
316 richard 931
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
434 richard 932
        AuthUserFile $DIR_DEST_ETC/digest/key_backup
1243 richard 933
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
316 richard 934
</Directory>
811 richard 935
Alias /save/ "$DIR_SAVE/"
936
<Directory $DIR_SAVE>
937
        SSLRequireSSL
938
        Options Indexes
939
        Order deny,allow
940
        Deny from all
941
        Allow from 127.0.0.1
942
        Allow from $PRIVATE_NETWORK_MASK
943
        require valid-user
944
        AuthType digest
2454 tom.houday 945
        AuthName "ALCASAR Control Center (ACC)"
1747 richard 946
        AuthDigestDomain $HOSTNAME.$DOMAIN
811 richard 947
        AuthUserFile $DIR_DEST_ETC/digest/key_backup
1243 richard 948
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
811 richard 949
</Directory>
1 root 950
EOF
2293 tom.houday 951
        # Launch after coova (in order to wait tun0 to be up)
952
        $SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
953
        # Log file for ACC access imputability
954
        [ -e /var/Save/security/acc_access.log ] || touch /var/Save/security/acc_access.log
955
        chown root:apache /var/Save/security/acc_access.log
956
        chmod 664 /var/Save/security/acc_access.log
1389 richard 957
} # End of ACC ()
1 root 958
 
1893 richard 959
##########################################################################
960
##                              Fonction "CA"                           ##
1898 richard 961
## - Creating the CA and the server certificate (apache)                ##
1893 richard 962
##########################################################################
1221 richard 963
CA ()
1 root 964
{
510 richard 965
        $DIR_DEST_BIN/alcasar-CA.sh
800 richard 966
        FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
303 richard 967
        [ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
1410 richard 968
        cat <<EOF > $FIC_VIRTUAL_SSL
969
# default SSL virtual host, used for all HTTPS requests that do not
970
# match a ServerName or ServerAlias in any <VirtualHost> block.
971
 
972
<VirtualHost _default_:443>
973
# general configuration
974
    ServerAdmin root@localhost
1748 richard 975
    ServerName $HOSTNAME.$DOMAIN
1410 richard 976
 
977
# SSL configuration
978
    SSLEngine on
979
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
980
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
981
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
982
    CustomLog logs/ssl_request_log \
983
        "%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
984
    ErrorLog logs/ssl_error_log
985
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
986
</VirtualHost>
987
EOF
5 franck 988
        chown -R root:apache /etc/pki
1 root 989
        chmod -R 750 /etc/pki
1389 richard 990
} # End of CA ()
1 root 991
 
1837 richard 992
##################################################################
993
##                      Function "time_server"                  ##
994
## - Configuring NTP server                                     ##
995
##################################################################
996
time_server ()
997
{
998
# Set the Internet time server
999
        [ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
1000
        cat <<EOF > /etc/ntp/step-tickers
1001
0.fr.pool.ntp.org       # adapt to your country
1002
1.fr.pool.ntp.org
1003
2.fr.pool.ntp.org
1004
EOF
1005
        [ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
1006
        cat <<EOF > /etc/ntp.conf
1007
server 0.fr.pool.ntp.org        # adapt to your country
1008
server 1.fr.pool.ntp.org
1009
server 2.fr.pool.ntp.org
1010
server 127.127.1.0              # local clock si NTP internet indisponible ...
1011
fudge 127.127.1.0 stratum 10
1012
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
1013
restrict 127.0.0.1
1014
driftfile /var/lib/ntp/drift
1015
logfile /var/log/ntp.log
1016
disable monitor
1017
EOF
1018
        chown -R ntp:ntp /var/lib/ntp
1019
# Synchronize now
1020
        ntpd -q -g &
1021
} # End of time_server ()
1022
 
1 root 1023
##########################################################################################
1221 richard 1024
##                      Fonction "init_db"                                              ##
1 root 1025
## - Initialisation de la base Mysql                                                    ##
1026
## - Affectation du mot de passe de l'administrateur (root)                             ##
1027
## - Suppression des bases et des utilisateurs superflus                                ##
1028
## - Création de la base 'radius'                                                      ##
1029
## - Installation du schéma de cette base                                              ##
1030
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)  ##
1031
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)              ##
1032
##########################################################################################
1033
init_db ()
1034
{
1990 richard 1035
        if [ `systemctl is-active mysqld` == "active" ]
1036
        then
1037
                systemctl stop mysqld
1038
        fi
1355 richard 1039
        rm -rf /var/lib/mysql # to be sure that there is no former installation
1 root 1040
        [ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1355 richard 1041
        $SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
1979 richard 1042
        $SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
1980 richard 1043
        $SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf
1044
        $SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf  # accentuated user names are allowed
1045
        $SED "s?^plugin-load.*?#&?g" /etc/my.cnf.d/feedback.cnf # remove the feedback plugin (ALCASAR doesn't report anything !)
2416 richard 1046
        /usr/sbin/mysqld-prepare-db-dir > /dev/null 2>&1
1047
        /usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
1048
        /usr/bin/systemctl start mysqld
1963 richard 1049
        nb_round=1
1981 richard 1050
        while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1963 richard 1051
        do
1052
                nb_round=`expr $nb_round + 1`
1053
                sleep 2
1054
        done
1981 richard 1055
        if [ ! -S /var/lib/mysql/mysql.sock ]
1963 richard 1056
        then
1981 richard 1057
                echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1963 richard 1058
                exit
1955 richard 1059
        fi
2416 richard 1060
        MYSQL="/usr/bin/mysql --execute"
1355 richard 1061
# Secure the server
2416 richard 1062
        $MYSQL="GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$mysqlpwd';"
1063
        MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1355 richard 1064
        $MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
2454 tom.houday 1065
        $MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;"
615 richard 1066
# Create 'radius' database
1317 richard 1067
        $MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
615 richard 1068
# Add an empty radius database structure
1800 richard 1069
        mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
615 richard 1070
# modify the start script in order to close accounting connexion when the system is comming down or up
1357 richard 1071
        [ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
2416 richard 1072
        $SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
1073
        $SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
1074
        /usr/bin/systemctl unset-environment MYSQLD_OPTS
1574 richard 1075
        /usr/bin/systemctl daemon-reload
1389 richard 1076
} # End of init_db ()
1 root 1077
 
2423 richard 1078
###################################################################
1079
##                       Function "freeradius"                   ##
1080
## - Set the configuration files                                 ##
1081
## - Set the shared secret between coova-chilli and freeradius   ##
1082
## - Adapt the Mysql conf file and counters                      ##
1083
###################################################################
2421 richard 1084
freeradius ()
1 root 1085
{
1800 richard 1086
        cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1 root 1087
        chown -R radius:radius /etc/raddb
1088
        [ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
2420 richard 1089
# Set radius global parameters (radius.conf)
1 root 1090
        $SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1091
        $SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1092
        $SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
2420 richard 1093
        $SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1094
        $SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
2419 richard 1095
 
2420 richard 1096
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1 root 1097
        [ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1098
        cat << EOF > /etc/raddb/clients.conf
2438 richard 1099
client localhost {
1100
        ipaddr = 127.0.0.1
1 root 1101
        secret = $secretradius
2438 richard 1102
        shortname = chilli
2454 tom.houday 1103
        nas_type = other
1 root 1104
}
1105
EOF
2420 richard 1106
# Set Virtual server (remvove all except "alcasar virtual site")
1107
        rm -f /etc/raddb/sites-enabled/*
2454 tom.houday 1108
        cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
2420 richard 1109
        chown radius:apache /etc/raddb/sites-available/alcasar
1110
        chmod 660 /etc/raddb/sites-available/alcasar
1111
        ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
2454 tom.houday 1112
# INFO : To connect from outside (EAP), add the EAP virtual server (link in sites-enabled) and inner-tunnel modules (link in mods-enabled)
2420 richard 1113
 
2454 tom.houday 1114
# Set modules
2422 richard 1115
# Set only usefull modules for ALCASAR (ldap is enabled only via ACC)
2454 tom.houday 1116
        rm -rf  /etc/raddb/mods-enabled/*
1117
        for mods in sql sqlcounter attr_filter expiration logintime pap expr
1118
        do
1119
                ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1120
        done
2423 richard 1121
# Configure SQL mod
2420 richard 1122
        [ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
2423 richard 1123
        $SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1124
        $SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
2420 richard 1125
        $SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
2423 richard 1126
        $SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1127
        $SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1128
        $SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1129
        $SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
2454 tom.houday 1130
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.
2420 richard 1131
        [ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1132
        cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1133
        chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
2421 richard 1134
# sqlcounter modifications
1135
        [ -e /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default
1136
        cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf
2422 richard 1137
query = "\
1138
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)),0)) \
1139
    FROM radacct \
1140
    WHERE username = '%{\${key}}' \
1141
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
2421 richard 1142
EOF
1143
        [ -e /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default
1144
        cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf
2422 richard 1145
query = "\
1146
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)), 0)) \
1147
    FROM radacct \
1148
    WHERE username='%{\${key}}' \
1149
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
2421 richard 1150
EOF
1151
        [ -e /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default
1152
        cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf
1153
# This is the query modified for ALCASAR needs (thanks to Daniel Laliberte --> authorized period after the first connection)
2422 richard 1154
query = "\
1155
    SELECT IFNULL((SELECT TIME_TO_SEC(TIMEDIFF(NOW(), acctstarttime)) \
2421 richard 1156
    FROM radacct \
2422 richard 1157
    WHERE UserName='%{\${key}}' \
2421 richard 1158
    ORDER BY acctstarttime \
1159
    LIMIT 1),0)"
1160
EOF
1161
# make certain that mysql is up before freeradius start
1358 richard 1162
        [ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
1163
        $SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
1574 richard 1164
        /usr/bin/systemctl daemon-reload
2420 richard 1165
 # Allow apache to change some conf files (ie : ldap on/off)
1166
 chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
2454 tom.houday 1167
 
2421 richard 1168
} # End freeradius ()
1 root 1169
 
2423 richard 1170
#############################################################################
1171
##                              Fonction "chilli"                          ##
1172
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1173
## - Adapt the authentication web page (intercept.php)                     ##
1174
#############################################################################
1389 richard 1175
chilli ()
1 root 1176
{
1370 richard 1177
# chilli unit for systemd
2324 tom.houday 1178
        cat << EOF > /lib/systemd/system/chilli.service
1372 richard 1179
#  This file is part of systemd.
1180
#
1181
#  systemd is free software; you can redistribute it and/or modify it
1182
#  under the terms of the GNU General Public License as published by
1183
#  the Free Software Foundation; either version 2 of the License, or
1184
#  (at your option) any later version.
1370 richard 1185
[Unit]
1186
Description=chilli is a captive portal daemon
1187
After=network.target
1188
 
1189
[Service]
1379 richard 1190
Type=forking
1370 richard 1191
ExecStart=/usr/libexec/chilli start
1192
ExecStop=/usr/libexec/chilli stop
1193
ExecReload=/usr/libexec/chilli reload
1194
PIDFile=/var/run/chilli.pid
1195
 
1196
[Install]
1197
WantedBy=multi-user.target
1198
EOF
799 richard 1199
# init file creation
1370 richard 1200
        [ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1801 richard 1201
        cat <<EOF > /etc/init.d/chilli
799 richard 1202
#!/bin/sh
1203
#
1204
# chilli CoovaChilli init
1205
#
1206
# chkconfig: 2345 65 35
1207
# description: CoovaChilli
1208
### BEGIN INIT INFO
1209
# Provides:       chilli
2454 tom.houday 1210
# Required-Start: network
1211
# Should-Start:
799 richard 1212
# Required-Stop:  network
2454 tom.houday 1213
# Should-Stop:
799 richard 1214
# Default-Start:  2 3 5
1215
# Default-Stop:
1216
# Description:    CoovaChilli access controller
1217
### END INIT INFO
1218
 
1219
[ -f /usr/sbin/chilli ] || exit 0
1220
. /etc/init.d/functions
1221
CONFIG=/etc/chilli.conf
1222
pidfile=/var/run/chilli.pid
1223
[ -f \$CONFIG ] || {
2394 tom.houday 1224
        echo "\$CONFIG Not found"
1225
        exit 0
799 richard 1226
}
2376 tom.houday 1227
current_users_file="/var/tmp/havp/current_users.txt"    # file containing active users
799 richard 1228
RETVAL=0
1229
prog="chilli"
1230
case \$1 in
2394 tom.houday 1231
        start)
2454 tom.houday 1232
                if [ -f \$pidfile ] ; then
2394 tom.houday 1233
                        gprintf "chilli is already running"
1234
                else
1235
                        gprintf "Starting \$prog: "
1236
                        echo '' > \$current_users_file && chown apache:apache \$current_users_file
1237
                        rm -f /var/run/chilli* # cleaning
1238
                        /usr/sbin/modprobe tun >/dev/null 2>&1
1239
                        echo 1 > /proc/sys/net/ipv4/ip_forward
1240
                        [ -e /dev/net/tun ] || {
2454 tom.houday 1241
                                (cd /dev;
1242
                                mkdir net;
1243
                                cd net;
2394 tom.houday 1244
                                mknod tun c 10 200)
1245
                        }
1246
                        ifconfig $INTIF 0.0.0.0
1247
                        /usr/sbin/ethtool -K $INTIF gro off
1248
                        daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1249
                        RETVAL=\$?
1250
                fi
1251
                ;;
799 richard 1252
 
2394 tom.houday 1253
        reload)
1254
                killall -HUP chilli
1255
                ;;
799 richard 1256
 
2394 tom.houday 1257
        restart)
1258
                \$0 stop
1259
                sleep 2
1260
                \$0 start
1261
                ;;
799 richard 1262
 
2394 tom.houday 1263
        status)
1264
                status chilli
1265
                RETVAL=0
1266
                ;;
1267
 
1268
        stop)
2454 tom.houday 1269
                if [ -f \$pidfile ] ; then
2394 tom.houday 1270
                        gprintf "Shutting down \$prog: "
1271
                        killproc /usr/sbin/chilli
1272
                        RETVAL=\$?
1273
                        [ \$RETVAL = 0 ] && rm -f \$pidfile
1274
                        [ -e \$current_users_file ] && rm -f \$current_users_file
2454 tom.houday 1275
                else
2394 tom.houday 1276
                        gprintf "chilli is not running"
1277
                fi
1278
                ;;
1279
 
1280
        *)
1281
                echo "Usage: \$0 {start|stop|restart|reload|status}"
1282
                exit 1
799 richard 1283
esac
1284
echo
1285
EOF
2324 tom.houday 1286
        chmod a+x /etc/init.d/chilli
1287
        ln -s /etc/init.d/chilli /usr/libexec/chilli
799 richard 1288
# conf file creation
346 richard 1289
        [ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
2016 raphael.pi 1290
        #NTP Option configuration for DHCP
2032 richard 1291
        #DHCP Options : rfc2132
1292
                #dhcp option value will be convert in hexa.
1293
                #NTP option (or 'option 42') is like :
2454 tom.houday 1294
                #
2032 richard 1295
                #    Code   Len         Address 1               Address 2
1296
                #   +-----+-----+-----+-----+-----+-----+-----+-----+--
1297
                #   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1298
                #   +-----+-----+-----+-----+-----+-----+-----+-----+--
1299
                #
1300
                #Code : 42 => 2a
1301
                #Len : 4 => 04
2016 raphael.pi 1302
        PRIVATE_IP_HEXA=$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f1))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f2))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f3))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f4))
346 richard 1303
        cat <<EOF > /etc/chilli.conf
1304
# coova config for ALCASAR
1305
cmdsocket       /var/run/chilli.sock
1336 richard 1306
unixipc         chilli.$INTIF.ipc
1551 richard 1307
pidfile         /var/run/chilli.pid
346 richard 1308
net             $PRIVATE_NETWORK_MASK
595 richard 1309
dhcpif          $INTIF
841 richard 1310
ethers          $DIR_DEST_ETC/alcasar-ethers
861 richard 1311
#nodynip
865 richard 1312
#statip
1313
dynip           $PRIVATE_NETWORK_MASK
1249 richard 1314
domain          $DOMAIN
355 richard 1315
dns1            $PRIVATE_IP
1316
dns2            $PRIVATE_IP
346 richard 1317
uamlisten       $PRIVATE_IP
503 richard 1318
uamport         3990
2370 tom.houday 1319
uamuiport       3991
837 richard 1320
macauth
1321
macpasswd       password
1697 richard 1322
strictmacauth
1243 richard 1323
locationname    $HOSTNAME.$DOMAIN
346 richard 1324
radiusserver1   127.0.0.1
1325
radiusserver2   127.0.0.1
1326
radiussecret    $secretradius
1327
radiusauthport  1812
1328
radiusacctport  1813
1243 richard 1329
uamserver       https://$HOSTNAME.$DOMAIN/intercept.php
2374 tom.houday 1330
redirurl
1243 richard 1331
radiusnasid     $HOSTNAME.$DOMAIN
346 richard 1332
uamsecret       $secretuam
1249 richard 1333
uamallowed      $HOSTNAME,$HOSTNAME.$DOMAIN
346 richard 1334
coaport         3799
1379 richard 1335
conup           $DIR_DEST_BIN/alcasar-conup.sh
1336
condown         $DIR_DEST_BIN/alcasar-condown.sh
503 richard 1337
include         $DIR_DEST_ETC/alcasar-uamallowed
1338
include         $DIR_DEST_ETC/alcasar-uamdomain
2016 raphael.pi 1339
dhcpopt         2a04$PRIVATE_IP_HEXA
1613 franck 1340
#dhcpgateway            none
1341
#dhcprelayagent         none
1610 franck 1342
#dhcpgatewayport        none
2234 richard 1343
sslkeyfile      /etc/pki/tls/private/alcasar.key
1344
sslcertfile     /etc/pki/tls/certs/alcasar.crt
1345
redirssl
2370 tom.houday 1346
uamuissl
346 richard 1347
EOF
2274 richard 1348
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
977 richard 1349
        echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
2274 richard 1350
        echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
840 richard 1351
# create files for trusted domains and urls
1148 crox53 1352
        touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
503 richard 1353
        chown root:apache $DIR_DEST_ETC/alcasar-*
1354
        chmod 660 $DIR_DEST_ETC/alcasar-*
847 richard 1355
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
526 stephane 1356
        $SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
796 richard 1357
# user 'chilli' creation (in order to run conup/off and up/down scripts
2396 tom.houday 1358
        chilli_exist=`grep -c ^chilli: /etc/passwd`
796 richard 1359
        if [ "$chilli_exist" == "1" ]
1360
        then
2454 tom.houday 1361
                userdel -r chilli 2>/dev/null
796 richard 1362
        fi
1363
        groupadd -f chilli
1364
        useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1389 richard 1365
}  # End of chilli ()
1349 richard 1366
 
1 root 1367
##################################################################
1389 richard 1368
##              Fonction "dansguardian"                         ##
1 root 1369
## - Paramètrage du gestionnaire de contenu Dansguardian       ##
1370
##################################################################
1389 richard 1371
dansguardian ()
1 root 1372
{
1841 richard 1373
        mkdir -p /var/dansguardian /var/log/dansguardian
1374
        chown -R dansguardian /var/dansguardian /var/log/dansguardian
1375 richard 1375
        $SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1391 richard 1376
        $SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
497 richard 1377
        [ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
2454 tom.houday 1378
# By default the filter is off
1556 richard 1379
        $SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1293 richard 1380
# French deny HTML page
497 richard 1381
        $SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1293 richard 1382
# Listen only on LAN side
497 richard 1383
        $SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1342 richard 1384
# DG send its flow to HAVP
1385
        $SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1293 richard 1386
# replace the default deny HTML page
1 root 1387
        cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1388
        cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1293 richard 1389
# Don't log
1390
        $SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1 root 1391
# on désactive par défaut le controle de contenu des pages html
497 richard 1392
        $SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1393
        cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1394
        $SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1 root 1395
# on désactive par défaut le contrôle d'URL par expressions régulières
497 richard 1396
        cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1397
        $SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1721 richard 1398
 
1399
# Configure Dansguardian for large site
1400
# Minimum number of processus to handle connections
1401
        $SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1402
# Maximum number of processus to handle connections
1403
        $SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1404
# Run at least 8 daemons
1405
        $SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1406
# minimum number of processes to spawn
1407
        $SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1408
# maximum age of a child process before it croaks it
1409
        $SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
2454 tom.houday 1410
 
1 root 1411
# on désactive par défaut le contrôle de téléchargement de fichiers
497 richard 1412
        [ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1413
        $SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1414
        [ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1415
        [ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1416
        touch $DIR_DG/lists/bannedextensionlist
1417
        touch $DIR_DG/lists/bannedmimetypelist
1418
# 'Safesearch' regex actualisation
498 richard 1419
        $SED "s?images?search?g" $DIR_DG/lists/urlregexplist
497 richard 1420
# empty LAN IP list that won't be WEB filtered
1421
        [ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1422
        touch $DIR_DG/lists/exceptioniplist
1423
# Keep a copy of URL & domain filter configuration files
1424
        [ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1425
        [ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1389 richard 1426
} # End of dansguardian ()
1 root 1427
 
71 richard 1428
##################################################################
1221 richard 1429
##                      Fonction "antivirus"                    ##
1357 richard 1430
## - configuration of havp, libclamav and freshclam             ##
71 richard 1431
##################################################################
2454 tom.houday 1432
antivirus ()
71 richard 1433
{
1358 richard 1434
# create 'havp' user
2396 tom.houday 1435
        havp_exist=`grep -c ^havp: /etc/passwd`
307 richard 1436
        if [ "$havp_exist" == "1" ]
288 richard 1437
        then
2454 tom.houday 1438
                userdel -r havp 2>/dev/null
1439
                groupdel havp 2>/dev/null
288 richard 1440
        fi
307 richard 1441
        groupadd -f havp
1486 richard 1442
        useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1841 richard 1443
        mkdir -p /var/tmp/havp /var/log/havp /var/run/havp /var/log/clamav /var/lib/clamav
1484 richard 1444
        chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1841 richard 1445
        chown -R clamav:clamav /var/log/clamav /var/lib/clamav
109 richard 1446
        [ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1447
        $SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1484 richard 1448
        $SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config    # pidfile
1449
        $SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config             # transparent mode
631 richard 1450
        $SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config       # we listen only on loopback
1485 richard 1451
        $SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config                            # datas come on port 8090 (on loopback)
990 franck 1452
        $SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config   # Log format
631 richard 1453
        $SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config            # active libclamav AV
1454
        $SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config                     # log only when malware matches
659 richard 1455
        $SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config              # 10 daemons are started simultaneously
835 richard 1456
        $SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config               # doesn't scan image files
1457
        $SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1007 richard 1458
# skip checking of youtube flow (too heavy load / risk too low)
1459
        [ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1460
        echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1461
        echo "*.youtube.com/*" >> /etc/havp/whitelist
1544 richard 1462
# adapt init script and systemd unit
335 richard 1463
        [ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
481 franck 1464
        cp -f $DIR_CONF/havp-init /etc/init.d/havp
1547 richard 1465
        [ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1466
        $SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1544 richard 1467
        $SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1358 richard 1468
# replace of the intercept page (template)
340 richard 1469
        cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1470
        cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1358 richard 1471
# update virus database every 4 hours (24h/6)
1357 richard 1472
        [ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1473
        $SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
489 richard 1474
        $SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1357 richard 1475
        $SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1358 richard 1476
        $SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1477
        $SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1385 richard 1478
# update now
1382 richard 1479
        /usr/bin/freshclam --no-warnings
1389 richard 1480
} # End of antivirus ()
71 richard 1481
 
1486 richard 1482
##########################################################################
1483
##                      Fonction "tinyproxy"                            ##
1484
## - configuration of tinyproxy (proxy between filterde users and havp) ##
1485
##########################################################################
2454 tom.houday 1486
tinyproxy ()
1485 richard 1487
{
2396 tom.houday 1488
        tinyproxy_exist=`grep -c ^tinyproxy: /etc/passwd`
1486 richard 1489
        if [ "$tinyproxy_exist" == "1" ]
1490
        then
2454 tom.houday 1491
                userdel -r tinyproxy 2>/dev/null
1492
                groupdel tinyproxy 2>/dev/null
1486 richard 1493
        fi
1494
        groupadd -f tinyproxy
1488 richard 1495
        useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1668 richard 1496
        mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1497
        chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1486 richard 1498
        [ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1499
        $SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1500
        $SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1501
        $SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf                      # Listen Port
1502
        $SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf          # Listen NIC (only intif)
1508 richard 1503
        $SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1518 richard 1504
        $SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1486 richard 1505
        $SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf             # Only errors are logged
1506
        $SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf   # forward to HAVP
1507
        $SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf      # Stealth mode
1544 richard 1508
        $SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf   # Allow from LAN
1509 richard 1509
# Create the systemd unit
1510
cat << EOF > /lib/systemd/system/tinyproxy.service
1511
#  This file is part of systemd.
1512
#
1513
#  systemd is free software; you can redistribute it and/or modify it
1514
#  under the terms of the GNU General Public License as published by
1515
#  the Free Software Foundation; either version 2 of the License, or
1516
#  (at your option) any later version.
1485 richard 1517
 
1509 richard 1518
# This unit launches tinyproxy (a very light proxy).
1518 richard 1519
# The "sleep 2" is needed because the pid file isn't ready for systemd
1509 richard 1520
[Unit]
1521
Description=Tinyproxy Web Proxy Server
1522
After=network.target iptables.service
1523
 
1524
[Service]
1525
Type=forking
1518 richard 1526
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1527
ExecStartPre=/bin/sleep 2
1528
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1509 richard 1529
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1530
 
1531
[Install]
1532
WantedBy=multi-user.target
1533
EOF
1534
 
1485 richard 1535
} # end of tinyproxy
1 root 1536
##################################################################################
1389 richard 1537
##                      function "ulogd"                                        ##
476 richard 1538
## - Ulog config for multi-log files                                            ##
1539
##################################################################################
1389 richard 1540
ulogd ()
476 richard 1541
{
1542
# Three instances of ulogd (three different logfiles)
1543
        [ -d /var/log/firewall ] || mkdir -p /var/log/firewall
478 richard 1544
        nl=1
1358 richard 1545
        for log_type in traceability ssh ext-access
478 richard 1546
        do
1365 richard 1547
                [ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1369 richard 1548
                [ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1375 richard 1549
                cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1704 richard 1550
                $SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
478 richard 1551
                cat << EOF >> /etc/ulogd-$log_type.conf
1452 richard 1552
[emu1]
478 richard 1553
file="/var/log/firewall/$log_type.log"
1554
sync=1
1555
EOF
1452 richard 1556
                $SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
478 richard 1557
                nl=`expr $nl + 1`
1558
        done
476 richard 1559
        chown -R root:apache /var/log/firewall
1560
        chmod 750 /var/log/firewall
1561
        chmod 640 /var/log/firewall/*
1389 richard 1562
}  # End of ulogd ()
476 richard 1563
 
1159 crox53 1564
 
1565
##########################################################
1389 richard 1566
##              Function "nfsen"                        ##
1567 richard 1567
## - install the nfsen grapher                          ##
1568
## - install the two plugins porttracker & surfmap      ##
1159 crox53 1569
##########################################################
1389 richard 1570
nfsen()
1 root 1571
{
2330 tom.houday 1572
        tar xzf ./conf/nfsen/nfsen-*.tar.gz -C /tmp/
1365 richard 1573
# Add PortTracker plugin
1534 richard 1574
        for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1395 richard 1575
        do
2330 tom.houday 1576
                [ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1395 richard 1577
        done
2330 tom.houday 1578
        $SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-*/contrib/PortTracker/PortTracker.pm
1365 richard 1579
# use of our conf file and init unit
2330 tom.houday 1580
        cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-*/etc/
1570 richard 1581
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1221 richard 1582
        DirTmp=$(pwd)
2330 tom.houday 1583
        cd /tmp/nfsen-*/
1570 richard 1584
        /usr/bin/perl install.pl etc/nfsen.conf
1585
        /usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1365 richard 1586
# Create RRD DB for porttracker (only in it still doesn't exist)
1570 richard 1587
        cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1588
        cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1395 richard 1589
        if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1590
        chmod -R 770 /var/log/netflow/porttracker
1372 richard 1591
# nfsen unit for systemd
2330 tom.houday 1592
        cat << EOF > /lib/systemd/system/nfsen.service
1372 richard 1593
#  This file is part of systemd.
1594
#
1595
#  systemd is free software; you can redistribute it and/or modify it
1596
#  under the terms of the GNU General Public License as published by
1597
#  the Free Software Foundation; either version 2 of the License, or
1598
#  (at your option) any later version.
1599
 
1600
# This unit launches nfsen (a Netflow grapher).
1601
[Unit]
1602
Description= NfSen init script
1603
After=network.target iptables.service
1604
 
1605
[Service]
1606
Type=oneshot
1607
RemainAfterExit=yes
1393 richard 1608
PIDFile=/var/run/nfsen/nfsen.pid
1609
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1610
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
2454 tom.houday 1611
ExecStart=/usr/bin/nfsen start
1372 richard 1612
ExecStop=/usr/bin/nfsen stop
1393 richard 1613
ExecReload=/usr/bin/nfsen restart
1372 richard 1614
TimeoutSec=0
1615
 
1616
[Install]
1617
WantedBy=multi-user.target
1618
EOF
1365 richard 1619
# Add the listen port to collect netflow packet (nfcapd)
2454 tom.houday 1620
        $SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm
1365 richard 1621
# expire delay for the profile "live"
1574 richard 1622
        /usr/bin/systemctl start nfsen
1393 richard 1623
        /bin/nfsen -m live -e 62d 2>/dev/null
1397 richard 1624
# add SURFmap plugin
2330 tom.houday 1625
        cp $DIR_CONF/nfsen/SURFmap_*.tar.gz /tmp/
1512 richard 1626
        cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
2330 tom.houday 1627
        tar xzf /tmp/SURFmap_*.tar.gz -C /tmp/
1512 richard 1628
        cd /tmp/
1629
        /usr/bin/sh SURFmap/install.sh
2330 tom.houday 1630
        chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1365 richard 1631
# clear the installation
1221 richard 1632
        cd $DirTmp
2330 tom.houday 1633
        rm -rf /tmp/nfsen-*
2331 tom.houday 1634
        rm -rf /tmp/SURFmap*
1389 richard 1635
} # End of nfsen ()
1 root 1636
 
1390 richard 1637
##################################################
1541 richard 1638
##              Function "vnstat"               ##
1639
## Initialization of Vnstat and vnstat phpFE    ##
1640
##################################################
1641
vnstat ()
1642
{
2330 tom.houday 1643
        [ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1644
        $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1645
        [ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1646
        $SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?" $DIR_ACC/manager/stats/config.php
1647
        $SED "s?\$iface_title\['.*?\$iface_title\['$EXTIF'\] = \$title;?" $DIR_ACC/manager/stats/config.php
1541 richard 1648
        /usr/bin/vnstat -u -i $EXTIF
2281 tom.houday 1649
} # End of vnstat
1650
 
1541 richard 1651
##################################################
1389 richard 1652
##              Function "dnsmasq"              ##
1390 richard 1653
##################################################
1389 richard 1654
dnsmasq ()
219 jeremy 1655
{
1656
        [ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1472 richard 1657
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
2454 tom.houday 1658
        [ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1659
        cat << EOF > /etc/dnsmasq.conf
520 richard 1660
# Configuration file for "dnsmasq in forward mode"
1387 richard 1661
conf-file=$DIR_DEST_ETC/alcasar-dns-name        # local DNS resolutions
259 richard 1662
listen-address=$PRIVATE_IP
1390 richard 1663
pid-file=/var/run/dnsmasq.pid
259 richard 1664
listen-address=127.0.0.1
286 richard 1665
no-dhcp-interface=$INTIF
1387 richard 1666
no-dhcp-interface=tun0
1667
no-dhcp-interface=lo
259 richard 1668
bind-interfaces
1721 richard 1669
cache-size=2048
259 richard 1670
domain-needed
1671
expand-hosts
1672
bogus-priv
1673
filterwin2k
1674
server=$DNS1
1675
server=$DNS2
1387 richard 1676
# DHCP service is configured. It will be enabled in "bypass" mode
1610 franck 1677
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1678
#dhcp-option=option:router,$PRIVATE_IP
1679
#dhcp-option=option:ntp-server,$PRIVATE_IP
1961 richard 1680
#domain=$DOMAIN
259 richard 1681
 
1387 richard 1682
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
420 franck 1683
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
259 richard 1684
EOF
1356 richard 1685
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1928 richard 1686
        cat << EOF > /etc/dnsmasq-blacklist.conf
1390 richard 1687
# Configuration file for "dnsmasq with blacklist"
1873 richard 1688
# Add Toulouse University blacklist domains
1472 richard 1689
conf-file=$DIR_DEST_ETC/alcasar-dns-name        # local DNS resolutions
1015 richard 1690
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1390 richard 1691
pid-file=/var/run/dnsmasq-blacklist.pid
498 richard 1692
listen-address=$PRIVATE_IP
1693
port=54
1694
no-dhcp-interface=$INTIF
1387 richard 1695
no-dhcp-interface=tun0
1472 richard 1696
no-dhcp-interface=lo
498 richard 1697
bind-interfaces
1721 richard 1698
cache-size=2048
498 richard 1699
domain-needed
1700
expand-hosts
1701
bogus-priv
1702
filterwin2k
2009 raphael.pi 1703
log-queries
1704
log-facility=/var/log/dnsmasq/dnsmasq-blacklist.log
498 richard 1705
server=$DNS1
1706
server=$DNS2
1707
EOF
1379 richard 1708
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1928 richard 1709
        cat << EOF > /etc/dnsmasq-whitelist.conf
1390 richard 1710
# Configuration file for "dnsmasq with whitelist"
1873 richard 1711
# ADD Toulouse university whitelist domains
1472 richard 1712
conf-file=$DIR_DEST_ETC/alcasar-dns-name        # local DNS resolutions
1356 richard 1713
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1472 richard 1714
pid-file=/var/run/dnsmasq-whitelist.pid
1356 richard 1715
listen-address=$PRIVATE_IP
1716
port=55
1717
no-dhcp-interface=$INTIF
1387 richard 1718
no-dhcp-interface=tun0
1472 richard 1719
no-dhcp-interface=lo
1356 richard 1720
bind-interfaces
1721 richard 1721
cache-size=1024
1356 richard 1722
domain-needed
1723
expand-hosts
1724
bogus-priv
1725
filterwin2k
1867 raphael.pi 1726
ipset=/#/wl_ip_allowed                  # dynamicly add the resolv IP address in the Firewall rules
2454 tom.houday 1727
address=/#/$PRIVATE_IP                          # for Domain name without local resolution (WL)
1356 richard 1728
EOF
1472 richard 1729
# 4th dnsmasq listen on udp 56 ("blackhole")
1928 richard 1730
        cat << EOF > /etc/dnsmasq-blackhole.conf
1472 richard 1731
# Configuration file for "dnsmasq as a blackhole"
1732
conf-file=$DIR_DEST_ETC/alcasar-dns-name        # local DNS resolutions
1733
address=/#/$PRIVATE_IP                          # redirect all on ALCASAR IP address
1734
pid-file=/var/run/dnsmasq-blackhole.pid
1735
listen-address=$PRIVATE_IP
1736
port=56
1737
no-dhcp-interface=$INTIF
1738
no-dhcp-interface=tun0
1739
no-dhcp-interface=lo
1740
bind-interfaces
1741
cache-size=256
1742
domain-needed
1743
expand-hosts
1744
bogus-priv
1745
filterwin2k
1746
EOF
1747
 
1517 richard 1748
# the main instance should start after network and chilli (which create tun0)
1547 richard 1749
        [ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1517 richard 1750
        $SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1474 richard 1751
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1752
        for list in blacklist whitelist blackhole
1753
        do
1754
                cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1755
                $SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1756
                $SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1757
        done
308 richard 1758
} # End dnsmasq
1759
 
1760
##########################################################
1221 richard 1761
##              Fonction "BL"                           ##
308 richard 1762
##########################################################
1763
BL ()
1764
{
1930 richard 1765
        # copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
648 richard 1766
        rm -rf $DIR_DG/lists/blacklists
1930 richard 1767
        mkdir -p /tmp/blacklists
1938 richard 1768
        cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
1383 richard 1769
# creation of file for the rehabilited domains and urls
648 richard 1770
        [ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
673 richard 1771
        [ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
648 richard 1772
        touch $DIR_DG/lists/exceptionsitelist
1773
        touch $DIR_DG/lists/exceptionurllist
311 richard 1774
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
648 richard 1775
        cat <<EOF > $DIR_DG/lists/bannedurllist
311 richard 1776
# Dansguardian filter config for ALCASAR
1777
EOF
648 richard 1778
        cat <<EOF > $DIR_DG/lists/bannedsitelist
311 richard 1779
# Dansguardian domain filter config for ALCASAR
1780
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1781
#**
1782
# block all SSL and CONNECT tunnels
1783
**s
1784
# block all SSL and CONNECT tunnels specified only as an IP
1785
*ips
1786
# block all sites specified only by an IP
1787
*ip
1788
EOF
1852 raphael.pi 1789
# Add Bing to the safesearch url regext list (parental control)
878 richard 1790
        cat <<EOF >> $DIR_DG/lists/urlregexplist
1791
# Bing - add 'adlt=strict'
1792
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1793
EOF
1913 richard 1794
# change the google safesearch ("safe=strict" instead of "safe=vss")
1003 richard 1795
        $SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1925 richard 1796
# creation of the custom BL and WL categorie named "ossi" (for domain names & ip only)
1957 richard 1797
        mkdir -p $DIR_DG/lists/blacklists/ossi-bl
1798
        touch $DIR_DG/lists/blacklists/ossi-bl/domains
1799
        echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1800
        mkdir -p $DIR_DG/lists/blacklists/ossi-wl
1801
        touch $DIR_DG/lists/blacklists/ossi-wl/domains
1802
        echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
1927 richard 1803
# add custom ALCASAR BL files
1957 richard 1804
        for x in $(ls $DIR_BLACKLIST | grep -v "^blacklist")
1805
        do
1806
                mkdir $DIR_DG/lists/blacklists/ossi-bl-$x
1807
                cp $DIR_BLACKLIST/$x  $DIR_DG/lists/blacklists/ossi-bl-$x/domains
1808
                echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1809
        done
1810
        chown -R dansguardian:apache $DIR_DG
1811
        chown -R root:apache $DIR_DEST_SHARE
1812
        chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1927 richard 1813
# adapt the Toulouse BL to ALCASAR architecture
1957 richard 1814
        $DIR_DEST_BIN/alcasar-bl.sh --adapt
1925 richard 1815
# enable the default categories
1957 richard 1816
        $DIR_DEST_BIN/alcasar-bl.sh --cat_choice
2314 richard 1817
} # End BL()
219 jeremy 1818
 
1 root 1819
##########################################################
1221 richard 1820
##              Fonction "cron"                         ##
1 root 1821
## - Mise en place des différents fichiers de cron     ##
1822
##########################################################
1823
cron ()
1824
{
1825
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1826
        [ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1827
        cat <<EOF > /etc/crontab
1828 richard 1828
SHELL=/usr/bin/bash
1829
PATH=/usr/sbin:/usr/bin
1 root 1830
MAILTO=root
1831
HOME=/
1832
 
1833
# run-parts
1834
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1835
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1836
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1837
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1838
EOF
1839
        [ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1840
        cat <<EOF >> /etc/anacrontab
2454 tom.houday 1841
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1842
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
667 franck 1843
7       20      cron.importClean        nice /etc/cron.d/alcasar-clean_import
1 root 1844
EOF
1247 crox53 1845
 
811 richard 1846
        cat <<EOF > /etc/cron.d/alcasar-mysql
868 richard 1847
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1828 richard 1848
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mysql.sh --dump
905 franck 1849
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1828 richard 1850
40 4 * * * root $DIR_DEST_BIN/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1 root 1851
EOF
952 franck 1852
        cat <<EOF > /etc/cron.d/alcasar-archive
1853
# Archive des logs et de la base de données (tous les lundi à 5h35)
1854
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1855
EOF
2454 tom.houday 1856
        cat <<EOF > /etc/cron.d/alcasar-ticket-clean
1566 richard 1857
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1858
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
168 franck 1859
EOF
2454 tom.houday 1860
        cat <<EOF > /etc/cron.d/alcasar-distrib-updates
722 franck 1861
# mise à jour automatique de la distribution tous les jours 3h30
762 franck 1862
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
722 franck 1863
EOF
1159 crox53 1864
 
2454 tom.houday 1865
        cat <<EOF > /etc/cron.d/alcasar-connections-stats
1808 richard 1866
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
1867
# 'alcasar-tot_stats' (everyday at 01h01 pm) : aggregating the daily connections of users (write in the table 'totacct')
1868
# 'alcasar-monthly_tot_stat' (everyday at 01h05 pm) : aggregating the monthly connections of users (write in table 'mtotacct')
1869
# 'alcasar-truncate_raddact' (every month, the first at 01h10 pm) : removing the log sessions of users older than 365 days
1870
# 'alcasar-clean_radacct' (every month, the first at 01h15 pm) : closing the sessions openned for more than 30 days
2009 raphael.pi 1871
# 'alcasar-activity_report.sh' (every sunday at 5h35 pm) : generate an activity report in PDF
1808 richard 1872
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1873
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1874
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1875
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
2009 raphael.pi 1876
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1 root 1877
EOF
2454 tom.houday 1878
        cat <<EOF > /etc/cron.d/alcasar-watchdog
1945 richard 1879
# run the "watchdog" every 3'
1880
# empty the IPSET of the whitelisted IP (loaded dynamically with dnsmasq-whitelist) when every whitelisted users are logged out (every sunday at 0h05
2395 tom.houday 1881
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1905 raphael.pi 1882
 
2228 franck 1883
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1 root 1884
EOF
1808 richard 1885
# Enabling the watchdog every 18'
2454 tom.houday 1886
        cat <<EOF > /etc/cron.d/alcasar-daemon-watchdog
1945 richard 1887
# activate  the daemon-watchdog after boot process
1851 franck 1888
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1945 richard 1889
# activate the daemon-watchdog every 18'
808 franck 1890
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1891
EOF
1862 raphael.pi 1892
 
1874 raphael.pi 1893
# Enabling category update from rsync
2454 tom.houday 1894
        cat <<EOF > /etc/cron.d/alcasar-rsync-bl
1895
# Automatic update of BL via rsync every 12 hours. The categories are listed in the file '/usr/local/etc/update_cat.conf' (no sync if empty).
1905 raphael.pi 1896
 
1874 raphael.pi 1897
EOF
1862 raphael.pi 1898
 
2304 tom.houday 1899
# Renew the Let's Encrypt certificate
1900
        cat <<EOF > /etc/cron.d/alcasar-letsencrypt
1901
# Automatic renew of the Let's Encrypt certificate
1902
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1903
EOF
1904
 
1808 richard 1905
# removing the users crons
522 richard 1906
        rm -f /var/spool/cron/*
2314 richard 1907
} # End cron()
1 root 1908
 
1909
##################################################################
1221 richard 1910
##                      Fonction "Fail2Ban"                     ##
1163 crox53 1911
##- Modification de la configuration de fail2ban                ##
1912
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...      ##
1913
##################################################################
1914
fail2ban()
1915
{
2243 tom.houday 1916
        /usr/bin/sh $DIR_CONF/fail2ban.sh
1474 richard 1917
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1192 crox53 1918
        [ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1489 richard 1919
        [ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1165 crox53 1920
        chmod 644 /var/log/fail2ban.log
1489 richard 1921
        chmod 644 /var/Save/security/watchdog.log
1418 richard 1922
        /usr/bin/touch /var/log/auth.log
1515 richard 1923
# fail2ban unit
1924
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1925
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1926
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1418 richard 1927
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
2314 richard 1928
} # End fail2ban()
1163 crox53 1929
 
1930
##################################################################
1376 richard 1931
##                      Fonction "gammu_smsd"                   ##
1932
## - Creation de la base de donnée Gammu                       ##
1933
## - Creation du fichier de config: gammu_smsd_conf             ##
1934
##################################################################
1935
gammu_smsd()
1936
{
1937
# Create 'gammu' databse
2421 richard 1938
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1376 richard 1939
        $MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1940
# Add a gammu database structure
1800 richard 1941
        mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1376 richard 1942
 
2314 richard 1943
# Config file for the daemon
1376 richard 1944
cat << EOF > /etc/gammu_smsd_conf
1945
[gammu]
1946
port = /dev/ttyUSB0
1947
connection = at115200
1948
 
1949
;########################################################
1950
 
1951
[smsd]
1952
 
1953
PIN = 1234
1954
 
1955
logfile = /var/log/gammu-smsd/gammu-smsd.log
1956
logformat = textall
1957
debuglevel = 0
1958
 
1959
service = sql
1960
driver = native_mysql
1961
user = $DB_USER
1962
password = $radiuspwd
1963
pc = localhost
1964
database = $DB_GAMMU
1965
 
1828 richard 1966
RunOnReceive = $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1376 richard 1967
 
1968
StatusFrequency = 30
1380 richard 1969
;LoopSleep = 2
1376 richard 1970
 
1971
;ResetFrequency = 300
1972
;HardResetFrequency = 120
1973
 
2454 tom.houday 1974
CheckSecurity = 1
1376 richard 1975
CheckSignal = 1
1976
CheckBattery = 0
1977
EOF
1978
 
1979
chmod 755 /etc/gammu_smsd_conf
1980
 
2314 richard 1981
# Log folder for gammu-smsd
1382 richard 1982
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1376 richard 1983
chmod 755 /var/log/gammu-smsd
1984
 
2314 richard 1985
# Write radius credentials in the gammu script
1452 richard 1986
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1987
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1376 richard 1988
 
2314 richard 1989
# Udev rule for Huawei GSM MODEM (idVendor: 12d1) --> run "modeswitch" to switch from "mass_storage" mode to "ttyUSB" (modem) mode
1990
cat << EOF > /lib/udev/rules.d/66-huawei.rules
1828 richard 1991
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
1380 richard 1992
EOF
1993
 
2314 richard 1994
} # End gammu_smsd()
1376 richard 1995
 
2202 richard 1996
 
1997
##################################################################
1998
##                      Fonction "msec"                         ##
2203 richard 1999
## - Apply the "fileserver" security level                      ##
2000
## - remove the "system request" for rebboting                  ##
2001
## - Fix several file permissions                               ##
2202 richard 2002
##################################################################
2003
msec()
2004
{
2005
 
2006
# Apply fileserver security level
2211 richard 2007
[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
2008
echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
2202 richard 2009
 
2203 richard 2010
# Set permissions monitoring and enforcement
2202 richard 2011
cat <<EOF > /etc/security/msec/perm.local
2012
/var/log/firefwall/                     root.apache     750
2013
/var/log/firewall/*                     root.apache     640
2014
/etc/security/msec/perm.local           root.root       640
2015
/etc/security/msec/level.local          root.root       640
2016
/etc/freeradius-web                     root.apache     750
2017
/etc/freeradius-web/admin.conf          root.apache     640
2420 richard 2018
/etc/raddb/client.conf                  radius.radius   640
2019
/etc/raddb/radius.conf                  radius.radius   640
2020
/etc/raddb/mods-available/ldap          radius.apache   660
2202 richard 2021
/etc/raddb/sites-available/alcasar      radius.apache   660
2022
/etc/pki/*                              root.apache     750
2211 richard 2023
/var/log/netflow/porttracker            root.apache     770
2024
/var/log/netflow/porttracker/*          root.apache     660
2202 richard 2025
EOF
2454 tom.houday 2026
# apply now hourly & daily checks
2202 richard 2027
/usr/sbin/msec
2211 richard 2028
/etc/cron.weekly/msec
2202 richard 2029
 
2314 richard 2030
} # End msec()
2202 richard 2031
 
2304 tom.houday 2032
 
2202 richard 2033
##################################################################
2304 tom.houday 2034
##                      Fonction "letsencrypt"                  ##
2035
## - Install Let's Encrypt client                               ##
2036
## - Prepare Let's Encrypt ALCASAR configuration file           ##
2037
##################################################################
2038
letsencrypt()
2039
{
2040
        echo "Installing Let's Encrypt client..."
2041
 
2042
        # Extract acme.sh
2043
        tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2044
 
2045
        pwdInstall=$(pwd)
2046
        cd /tmp/acme.sh-*
2047
 
2048
        acmesh_installDir="/opt/acme.sh"
2049
        acmesh_confDir="/usr/local/etc/letsencrypt"
2354 tom.houday 2050
        acmesh_userAgent="ALCASAR"
2304 tom.houday 2051
 
2052
        # Install acme.sh
2053
        ./acme.sh --install \
2054
                --home $acmesh_installDir \
2055
                --config-home $acmesh_confDir/data \
2056
                --certhome $acmesh_confDir/certs \
2057
                --accountkey $acmesh_confDir/ca/account.key \
2058
                --accountconf $acmesh_confDir/data/account.conf \
2059
                --useragent $acmesh_userAgent \
2308 tom.houday 2060
                --nocron \
2061
                > /dev/null
2304 tom.houday 2062
 
2063
        if [ $? -ne 0 ]; then
2064
                echo "Error during installation of Let's Encrypt client (acme.sh)."
2065
        fi
2066
 
2067
        # Create configuration file
2068
        cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2069
email=
2070
dateIssueRequest=
2071
domainRequest=
2072
challenge=
2073
dateIssued=
2074
dnsapi=
2075
dateNextRenewal=
2076
EOF
2077
 
2078
        cd $pwdInstall
2079
        rm -rf /tmp/acme.sh-*
2080
 
2081
} # END letsencrypt()
2082
 
2083
##################################################################
2195 richard 2084
##              Fonction "post_install"                 ##
2085
## - Modifying banners (locals et ssh) & prompts        ##
2086
## - SSH config                                         ##
2087
## - sudoers config & files security                    ##
2088
## - log rotate & ANSSI security parameters             ##
2089
## - Apply former conf in case of an update             ##
2090
##########################################################
1 root 2091
post_install()
2092
{
2195 richard 2093
# change the SSH banner
2094
        cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
2095
        echo " V$VERSION" >> /etc/ssh/alcasar-banner-ssh
5 franck 2096
        chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1 root 2097
        [ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2098
        $SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2099
        $SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
793 richard 2100
# postfix banner anonymisation
2101
        $SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1841 richard 2102
        chown -R postfix:postfix /var/lib/postfix
2195 richard 2103
# sshd liste on EXTIF & INTIF
1548 richard 2104
        $SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2195 richard 2105
# sshd authorized certificate for root login
1696 franck 2106
        $SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2195 richard 2107
# ALCASAR conf file
2327 richard 2108
        echo "HTTPS_LOGIN=on" >> $CONF_FILE
2409 tom.houday 2109
        echo "HTTPS_CHILLI=off" >> $CONF_FILE
1839 richard 2110
        echo "SSH=on" >> $CONF_FILE
1631 richard 2111
        echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
628 richard 2112
        echo "LDAP=off" >> $CONF_FILE
2447 richard 2113
        echo "LDAP_SERVER=127.0.0.1" >> $CONF_FILE
2454 tom.houday 2114
        echo "LDAP_BASE=ou=my_lan;dc=server_name;dc=localdoamin" >> $CONF_FILE
2115
        echo "LDAP_UID=sAMAccountName" >> $CONF_FILE
2116
        echo "LDAP_FILTER=" >> $CONF_FILE
2117
        echo "LDAP_USER=alcasar" >> $CONF_FILE
2118
        echo "LDAP_PASSWORD=" >> $CONF_FILE
2119
        echo "MULTIWAN=off" >> $CONF_FILE
1078 franck 2120
        echo "FAILOVER=30" >> $CONF_FILE
2121
        echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1336 richard 2122
        echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
2123
        echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
2195 richard 2124
# Prompt customisation (colors)
1 root 2125
        [ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
5 franck 2126
        cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
630 franck 2127
        $SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2195 richard 2128
# sudoers configuration for "apache" & "sysadmin"
1 root 2129
        [ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
5 franck 2130
        cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
629 richard 2131
        $SED "s?^Host_Alias.*?Host_Alias        LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost             #réseau de l'organisme?g" /etc/sudoers
1543 richard 2132
# Modify some logrotate files (gammu, ulogd)
1 root 2133
        cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2134
        chmod 644 /etc/logrotate.d/*
2195 richard 2135
# Log compression
706 franck 2136
        $SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2137
# actualisation des fichiers logs compressés
1342 richard 2138
        for dir in firewall dansguardian httpd
706 franck 2139
        do
2454 tom.houday 2140
                find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
706 franck 2141
        done
1221 richard 2142
# create the alcasar-load_balancing unit
2143
        cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1184 crox53 2144
#  This file is part of systemd.
2145
#
2146
#  systemd is free software; you can redistribute it and/or modify it
2147
#  under the terms of the GNU General Public License as published by
2148
#  the Free Software Foundation; either version 2 of the License, or
2149
#  (at your option) any later version.
2150
 
2151
# This unit lauches alcasar-load-balancing.sh script.
2152
[Unit]
2153
Description=alcasar-load_balancing.sh execution
2154
After=network.target iptables.service
2155
 
2156
[Service]
2157
Type=oneshot
2158
RemainAfterExit=yes