Subversion Repositories ALCASAR

Rev

Rev 2664 | Rev 2670 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log

Rev Author Line No. Line
672 richard 1
#!/bin/bash
2454 tom.houday 2
#  $Id: alcasar.sh 2669 2018-12-08 17:30:01Z tom.houdayer $
1 root 3
 
4
# alcasar.sh
2466 richard 5
# ALCASAR is a Free and open source NAC created by Franck BOUIJOUX (3abtux), Pascal LEVANT and Richard REY (Rexy)
6
# This script is distributed under the Gnu General Public License (GPL)
7
#  team@alcasar.net
959 franck 8
 
2454 tom.houday 9
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...]
1157 stephane 10
# Ce programme est un logiciel libre ; This software is free and open source
2454 tom.houday 11
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence.
12
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ;
13
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE.
14
# Voir la Licence Publique Générale GNU pour plus de détails.
959 franck 15
 
672 richard 16
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
1007 richard 17
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
1 root 18
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
2454 tom.houday 19
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
2466 richard 20
 
2521 armand.ito 21
# Coovachilli, freeradius, mariaDB, lighttpd, netfilter, e2guardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
1 root 22
 
23
# Options :
376 franck 24
#       -i or --install
25
#       -u or --uninstall
1 root 26
 
376 franck 27
# Functions :
1378 richard 28
#       testing                 : connectivity tests, free space test and mageia version test
1221 richard 29
#       init                    : Installation of RPM and scripts
30
#       network                 : Network parameters
2552 rexy 31
#       ACC                             : ALCASAR Control Center installation
32
#       CA                              : Certification Authority initialization
1837 richard 33
#       time_server             : NTPd configuration
1221 richard 34
#       init_db                 : Initilization of radius database managed with MariaDB
2421 richard 35
#       freeradius              : FreeRadius initialisation
1389 richard 36
#       chilli                  : coovachilli initialisation (+authentication page)
2521 armand.ito 37
#       e2guardian              : E2Guardian filtering HTTP proxy configuration
1221 richard 38
#       antivirus               : HAVP + libclamav configuration
1485 richard 39
#       tinyproxy               : little proxy for user filtered with "WL + antivirus" and "antivirus"
1389 richard 40
#       ulogd                   : log system in userland (match NFLOG target of iptables)
2454 tom.houday 41
#       nfsen                   : Configuration of Nfsen Netflow grapher
1253 richard 42
#       dnsmasq                 : Name server configuration
1541 richard 43
#       vnstat                  : little network stat daemon
2552 rexy 44
#       BL                              : Adaptation of Toulouse University BlackList : split into 3 BL (for Dnsmasq, for e2guardian and for Netfilter)
1266 richard 45
#       cron                    : Logs export + watchdog + connexion statistics
1389 richard 46
#       fail2ban                : Fail2ban IDS installation and configuration
47
#       gammu_smsd              : Autoregister addon via SMS (gammu-smsd)
2202 richard 48
#       msec                    : Mandriva security package configuration
2304 tom.houday 49
#       letsencrypt             : Let's Encrypt client
2552 rexy 50
#       post_install    : Security, log rotation, etc.
1 root 51
 
2499 tom.houday 52
DEBUG_ALCASAR='off'; export DEBUG_ALCASAR       # Debug mode = wait (hit key) after each function
1 root 53
DATE=`date '+%d %B %Y - %Hh%M'`
54
DATE_SHORT=`date '+%d/%m/%Y'`
595 richard 55
Lang=`echo $LANG|cut -c 1-2`
1362 richard 56
mode="install"
1 root 57
# ******* Files parameters - paramètres fichiers *********
2552 rexy 58
DIR_INSTALL=`pwd`                                               # current directory
1015 richard 59
DIR_CONF="$DIR_INSTALL/conf"                    # install directory (with conf files)
60
DIR_SCRIPTS="$DIR_INSTALL/scripts"              # install directory (with script files)
2552 rexy 61
DIR_BLACKLIST="$DIR_INSTALL/blacklist"  # install directory (with blacklist files)
62
DIR_SAVE="/var/Save"                                    # backup directory (traceability_log, user_db, security_log)
63
DIR_WEB="/var/www/html"                                 # directory of Lighttpd
64
DIR_DG="/etc/e2guardian"                                # directory of E2Guardian
65
DIR_ACC="$DIR_WEB/acc"                                  # directory of the 'ALCASAR Control Center'
1015 richard 66
DIR_DEST_BIN="/usr/local/bin"                   # directory of ALCASAR scripts
67
DIR_DEST_ETC="/usr/local/etc"                   # directory of ALCASAR conf files
68
DIR_DEST_SHARE="/usr/local/share"               # directory of share files used by ALCASAR (dnsmasq for instance)
2552 rexy 69
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"  # central ALCASAR conf file
1015 richard 70
PASSWD_FILE="/root/ALCASAR-passwords.txt"       # text file with the passwords and shared secrets
1 root 71
# ******* DBMS parameters - paramètres SGBD ********
2552 rexy 72
DB_RADIUS="radius"                                              # database name used by FreeRadius server
73
DB_USER="radius"                                                # user name allows to request the users database
74
DB_GAMMU="gammu"                                                # database name used by Gammu-smsd
1 root 75
# ******* Network parameters - paramètres réseau *******
2552 rexy 76
HOSTNAME="alcasar"                                              # default hostname
77
DOMAIN="localdomain"                                    # default local domain
2669 tom.houday 78
EXTIF=''                                        # EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
79
INTIF=''                                        # INTIF is connected to the consultation network
1148 crox53 80
MTU="1500"
1243 richard 81
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"      # Default ALCASAR IP address
1 root 82
# ****** Paths - chemin des commandes *******
83
SED="/bin/sed -i"
84
# ****************** End of global parameters *********************
85
 
959 franck 86
license ()
87
{
88
        if [ $Lang == "fr" ]
1538 richard 89
        then
90
                cat $DIR_INSTALL/gpl-warning.fr.txt | more
91
        else
92
                cat $DIR_INSTALL/gpl-warning.txt | more
959 franck 93
        fi
1538 richard 94
        response=0
95
        PTN='^[oOyYnN]$'
96
        until [[ $(expr $response : $PTN) -gt 0 ]]
97
        do
98
                if [ $Lang == "fr" ]
1563 franck 99
                        then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
1538 richard 100
                        else echo -n "Do you accept the terms of this license (Y/n)? : "
101
                fi
102
                read response
103
        done
104
        if [ "$response" = "n" ] || [ "$response" = "N" ]
105
        then
106
                exit 1
107
        fi
959 franck 108
}
109
 
1 root 110
header_install ()
111
{
112
        clear
113
        echo "-----------------------------------------------------------------------------"
460 richard 114
        echo "                     ALCASAR V$VERSION Installation"
1 root 115
        echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
116
        echo "-----------------------------------------------------------------------------"
1389 richard 117
}
1 root 118
 
2552 rexy 119
########################################################
120
##                  Function "testing"                ##
121
## - Test Mageia version                              ##
122
## - Test ALCASAR version (if already installed)      ##
123
## - Test free space on /var  (>10G)                  ##
124
## - Test Internet access                             ##
125
########################################################
29 richard 126
testing ()
127
{
1529 richard 128
# Test of Mageia version
129
# extract the current Mageia version and hardware architecture (i586 ou X64)
130
        fic=`cat /etc/product.id`
131
        unknown_os=0
132
        old="$IFS"
133
        IFS=","
134
        set $fic
135
        for i in $*
136
        do
137
                if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
2454 tom.houday 138
                        then
1529 richard 139
                        DISTRIBUTION=`echo $i|cut -d"=" -f2`
140
                        unknown_os=`expr $unknown_os + 1`
141
                fi
142
                if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
2454 tom.houday 143
                        then
1529 richard 144
                        CURRENT_VERSION=`echo $i|cut -d"=" -f2`
145
                        unknown_os=`expr $unknown_os + 1`
146
                fi
147
                if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
2454 tom.houday 148
                        then
1529 richard 149
                        ARCH=`echo $i|cut -d"=" -f2`
150
                        unknown_os=`expr $unknown_os + 1`
151
                fi
152
        done
2669 tom.houday 153
        if [ "$ARCH" != "x86_64" ]
2149 richard 154
                then
155
                if [ $Lang == "fr" ]
2669 tom.houday 156
                        then echo "Votre architecture matérielle doit être en 64bits"
157
                        else echo "You hardware architecture must be 64bits"
2149 richard 158
                fi
2482 lucas.echa 159
                exit 1
2149 richard 160
        fi
1529 richard 161
        IFS="$old"
2669 tom.houday 162
        if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "6" ) ]]
163
                then
164
                if [ -e /var/tmp/alcasar-conf.tar.gz ] # update
165
                        then
166
                        echo
167
                        if [ $Lang == "fr" ]
168
                                then
169
                                echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
170
                                echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
171
                                echo "2 - Installez Linux-Mageia 6.0 (64bits) et ALCASAR (cf. doc d'installation)"
172
                                echo "3 - Importez votre base des usagers"
173
                        else
174
                                echo "The automatic update of ALCASAR can't be performed."
175
                                echo "1 - Save your traceability files and the user database"
176
                                echo "2 - Install Linux-Mageia 6 (64bits) & ALCASAR (cf. installation doc)"
177
                                echo "3 - Import your users database"
178
                        fi
179
                else
180
                        if [ $Lang == "fr" ]
181
                                then echo "L'installation d'ALCASAR ne peut pas être réalisée."
182
                                else echo "The installation of ALCASAR can't be performed."
183
                        fi
184
                fi
185
                echo
186
                if [ $Lang == "fr" ]
187
                        then echo "Le système d'exploitation doit être remplacé (Mageia6-64bits)"
188
                        else echo "The OS must be replaced (Mageia6-64bits)"
189
                fi
190
                exit 0
191
        fi
192
 
1362 richard 193
# Test if ALCASAR is already installed
194
        if [ -e $CONF_FILE ]
195
        then
2396 tom.houday 196
                current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
1342 richard 197
                if [ $Lang == "fr" ]
2669 tom.houday 198
                        then echo "La version $current_version d'ALCASAR est déjà installée"
199
                        else echo "ALCASAR version $current_version is already installed"
1342 richard 200
                fi
1362 richard 201
                response=0
2458 richard 202
                PTN='^[12]$'
1362 richard 203
                until [[ $(expr $response : $PTN) -gt 0 ]]
204
                do
205
                        if [ $Lang == "fr" ]
2669 tom.houday 206
                                then echo -n "Tapez '1' pour une mise à jour; Tapez '2' pour une réinstallation : "
207
                                else echo -n "Hit '1' for an update; Hit '2' for a reinstallation : "
2499 tom.houday 208
                        fi
1362 richard 209
                        read response
210
                done
2458 richard 211
                if [ "$response" = "2" ]
1362 richard 212
                then
2560 rexy 213
                        rm -f /var/tmp/alcasar-conf*
1362 richard 214
                else
1684 richard 215
# Retrieve former NICname
2549 tom.houday 216
                        EXTIF_saved=`grep ^EXTIF= $CONF_FILE | cut -d'=' -f2-`  # EXTernal InterFace
217
                        INTIF_saved=`grep ^INTIF= $CONF_FILE | cut -d'=' -f2-`  # INTernal InterFace
218
                        [ $(/usr/sbin/ip link | grep -c " $EXTIF_saved:") -ne 0 ] && EXTIF=$EXTIF_saved || echo "Warning: Network card \"$EXTIF_saved\" is not connected, so \"$EXTIF\" will be used for external network."
219
                        [ $(/usr/sbin/ip link | grep -c " $INTIF_saved:") -ne 0 ] && INTIF=$INTIF_saved || echo "Warning: Network card \"$INTIF_saved\" is not connected, so \"$INTIF\" will be used for internal network."
1564 richard 220
# Create the current conf file
1362 richard 221
                        $DIR_SCRIPTS/alcasar-conf.sh --create
222
                        mode="update"
223
                fi
1529 richard 224
        fi
2669 tom.houday 225
# Test free space on /var
1529 richard 226
        if [ ! -d /var/log/netflow/porttracker ]
227
                then
228
                free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
229
                if [ $free_space -lt 10 ]
230
                        then
231
                        if [ $Lang == "fr" ]
232
                                then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
233
                                else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
234
                        fi
235
                exit 0
236
                fi
237
        fi
2669 tom.houday 238
 
239
# Detect external/internal interfaces
240
        if [ -z "$EXTIF" ]; then
241
                EXTIF=$(/usr/sbin/ip route list | awk '/^default / {print $5}')
242
                if [ -z "$EXTIF" ]; then
243
                        if [ "$Lang" == 'fr' ]
244
                                then echo -n "Aucune passerelle par défaut configurée"
245
                                else echo -n "No default gateway configured"
246
                        fi
247
                        exit 1
248
                fi
249
        fi
250
        if [ "$Lang" == 'fr' ]
251
                then echo "Interface externe (Internet) utilisée : $EXTIF"
252
                else echo "External interface (Internet) used: $EXTIF"
253
        fi
254
 
255
        if [ -z "$INTIF" ]; then
256
                interfacesList=$(/usr/sbin/ip -br link show | cut -d' ' -f1 | grep -v "^\(lo\|tun0\|$EXTIF\)\$")
257
                interfacesCount=$(echo "$interfacesList" | wc -l)
258
                if [ $interfacesCount -eq 0 ]; then
259
                        if [ "$Lang" == 'fr' ]
260
                                then echo "Aucune interface de disponible pour le réseau interne"
261
                                else echo "No interface available for the internal network"
262
                        fi
263
                        exit 1
264
                elif [ $interfacesCount -eq 1 ]; then
265
                        INTIF="$interfacesList"
266
                else
267
                        interfacesSorted=$(/usr/sbin/ip -br addr | grep -v "^\(lo\|tun0\|$EXTIF\) " | sort -b -k3n -k2r -k1)
268
                        interfacePreferred=$(echo "$interfacesSorted" | head -1 | cut -d' ' -f1)
269
 
270
                        if [ "$Lang" == 'fr' ]
271
                                then echo 'Liste des interfaces disponible :'
272
                                else echo 'List of available interfaces:'
273
                        fi
274
                        echo "$interfacesSorted"
275
                        response=''
276
                        while true; do
277
                                if [ "$Lang" == 'fr' ]
278
                                        then echo -n "Choix de l'interface interne ? [$interfacePreferred] "
279
                                        else echo -n "Choice of internal interface ? [$interfacePreferred] "
280
                                fi
281
                                read response
282
 
283
                                [ -z "$response" ] && response="$interfacePreferred"
284
 
285
                                # Check if interface exist
286
                                if [ $(echo "$interfacesList" | grep -c "^$response\$") -eq 1 ]; then
287
                                        INTIF="$response"
288
                                        break
289
                                else
290
                                        if [ "$Lang" == 'fr' ]
291
                                                then echo "Interface \"$response\" introuvable"
292
                                                else echo "Interface \"$response\" not found"
293
                                        fi
294
                                fi
295
                        done
296
                fi
297
        fi
298
        if [ "$Lang" == 'fr' ]
299
                then echo "Interface interne utilisée : $INTIF"
300
                else echo "Internal interface used: $INTIF"
301
        fi
302
 
2290 richard 303
        if [ $Lang == "fr" ]
304
                then echo -n "Tests des paramètres réseau : "
2549 tom.houday 305
                else echo -n "Network parameters tests: "
2290 richard 306
        fi
307
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
2282 richard 308
        cd /etc/sysconfig/network-scripts/
2290 richard 309
        IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
2282 richard 310
        for i in $IF_INTERFACES
311
        do
2549 tom.houday 312
                if [ $(/usr/sbin/ip link | grep -c " $i:") -eq 0 ]; then
2282 richard 313
                        rm -f ifcfg-$i
2454 tom.houday 314
 
2282 richard 315
                        if [ $Lang == "fr" ]
316
                                then echo "Suppression : ifcfg-$i"
2549 tom.houday 317
                                else echo "Deleting: ifcfg-$i"
2282 richard 318
                        fi
319
                fi
320
        done
321
        cd $DIR_INSTALL
2290 richard 322
        echo -n "."
2454 tom.houday 323
# Test Ethernet NIC links state
2669 tom.houday 324
        interfacesDown=$(/usr/sbin/ip -br link | grep "^\($EXTIF\|$INTIF\) " | grep 'NO-CARRIER' | cut -d' ' -f1)
325
        if [ ! -z "$interfacesDown" ]; then
326
                for i in $interfacesDown; do
327
                        if [ $Lang == "fr" ]
328
                        then
329
                                echo -e "\nÉchec"
330
                                echo "Le lien réseau de la carte $i n'est pas actif."
331
                                echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
332
                        else
333
                                echo -e "\nFailed"
334
                                echo "The link state of $i interface is down."
335
                                echo "Make sure that this network card is connected to a switch or an A.P."
336
                        fi
337
                done
338
                exit 1
339
        fi
1471 richard 340
        echo -n "."
341
# Test EXTIF config files
2669 tom.houday 342
        PUBLIC_IP=`/usr/sbin/ip addr show $EXTIF | grep '^\s*inet\s' | awk '{ print $2 }' | cut -d'/' -f1`
343
        PUBLIC_GATEWAY=`/usr/sbin/ip route list | awk '/^default / {print $3}'`
1471 richard 344
        if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
345
        then
784 richard 346
                if [ $Lang == "fr" ]
2454 tom.houday 347
                then
2669 tom.houday 348
                        echo -e "\nÉchec"
784 richard 349
                        echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
350
                        echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
1362 richard 351
                        echo "Appliquez les changements : 'systemctl restart network'"
784 richard 352
                else
2669 tom.houday 353
                        echo -e "\nFailed"
784 richard 354
                        echo "The Internet connected network card ($EXTIF) isn't well configured."
355
                        echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
2669 tom.houday 356
                        echo "Apply the new configuration: 'systemctl restart network'"
784 richard 357
                fi
830 richard 358
                echo "DEVICE=$EXTIF"
784 richard 359
                echo "IPADDR="
360
                echo "NETMASK="
361
                echo "GATEWAY="
362
                echo "DNS1="
363
                echo "DNS2="
830 richard 364
                echo "ONBOOT=yes"
2669 tom.houday 365
                exit 1
784 richard 366
        fi
367
        echo -n "."
2290 richard 368
# Test if default GW is set on EXTIF (router or ISP provider equipment)
2669 tom.houday 369
        if [ `/usr/sbin/ip route list|grep " $EXTIF "|grep -c '^default '` -ne 1 ] ; then
595 richard 370
                if [ $Lang == "fr" ]
2454 tom.houday 371
                then
2669 tom.houday 372
                        echo -e "\nÉchec"
595 richard 373
                        echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
374
                        echo "Réglez ce problème puis relancez ce script."
375
                else
2669 tom.houday 376
                        echo -e "\nFailed"
595 richard 377
                        echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
378
                        echo "Resolv this problem, then restart this script."
379
                fi
2669 tom.houday 380
                exit 1
29 richard 381
        fi
308 richard 382
        echo -n "."
2290 richard 383
# Test if default GW is alive
1499 richard 384
        arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
527 richard 385
        if [ $(expr $arp_reply) -eq 0 ]
2454 tom.houday 386
                then
595 richard 387
                if [ $Lang == "fr" ]
2454 tom.houday 388
                then
2669 tom.houday 389
                        echo -e "\nÉchec"
2290 richard 390
                        echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
595 richard 391
                        echo "Réglez ce problème puis relancez ce script."
392
                else
2669 tom.houday 393
                        echo -e "\nFailed"
2290 richard 394
                        echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
595 richard 395
                        echo "Resolv this problem, then restart this script."
396
                fi
2669 tom.houday 397
                exit 1
308 richard 398
        fi
399
        echo -n "."
2290 richard 400
# Test Internet connectivity
2669 tom.houday 401
        domainTested='www.google.com'
402
        /usr/bin/curl -s --head "$domainTested" &>/dev/null
403
        if [ $? -ne 0 ]; then
595 richard 404
                if [ $Lang == "fr" ]
2454 tom.houday 405
                then
2669 tom.houday 406
                        echo -e "\nLa tentative de connexion vers Internet a échoué ($domainTested)."
595 richard 407
                        echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
408
                        echo "Vérifiez la validité des adresses IP des DNS."
409
                else
2669 tom.houday 410
                        echo -e "\nThe Internet connection try failed ($domainTested)."
595 richard 411
                        echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
412
                        echo "Verify the DNS IP addresses"
413
                fi
2669 tom.houday 414
                exit 1
29 richard 415
        fi
308 richard 416
        echo ". : ok"
1389 richard 417
} # end of testing ()
302 richard 418
 
2552 rexy 419
#######################################################################
420
##                    Function "init"                                ##
421
## - Creation of ALCASAR conf file "/usr/local/etc/alcasar.conf      ##
422
## - Creation of random password for GRUB, mariadb (admin and user)  ##
423
#######################################################################
302 richard 424
init ()
425
{
527 richard 426
        if [ "$mode" != "update" ]
302 richard 427
        then
428
# On affecte le nom d'organisme
597 richard 429
                header_install
302 richard 430
                ORGANISME=!
431
                PTN='^[a-zA-Z0-9-]*$'
580 richard 432
                until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
2454 tom.houday 433
                do
595 richard 434
                        if [ $Lang == "fr" ]
2454 tom.houday 435
                                then echo -n "Entrez le nom de votre organisme : "
597 richard 436
                                else echo -n "Enter the name of your organism : "
595 richard 437
                        fi
330 franck 438
                        read ORGANISME
613 richard 439
                        if [ "$ORGANISME" == "" ]
330 franck 440
                                then
441
                                ORGANISME=!
442
                        fi
443
                done
302 richard 444
        fi
1 root 445
# On crée aléatoirement les mots de passe et les secrets partagés
2419 richard 446
# We create random passwords and shared secrets
628 richard 447
        rm -f $PASSWD_FILE
2419 richard 448
        echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
449
        grub2pwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
2454 tom.houday 450
        pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
451
                LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
452
                grep -v '[eE]nter password:' | \
453
                sed -e "s/PBKDF2 hash of your password is //"`
454
        echo "GRUB2_PASSWORD=$pbkdf2" > /boot/grub2/user.cfg
455
        [ -e /root/grub.default ] || cp /etc/grub.d/10_linux /root/grub.default
456
        cp -f $DIR_CONF/grub-10_linux /etc/grub.d/10_linux  # Request password only on menu editing attempts (not when selecting an entry)
457
        chmod 0600 /boot/grub2/user.cfg
2419 richard 458
        echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
2454 tom.houday 459
        echo "GRUB2_user=root" >> $PASSWD_FILE
460
        echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
2399 tom.houday 461
        mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
2419 richard 462
        echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
2412 tom.houday 463
        echo "db_root=$mysqlpwd" >> $PASSWD_FILE
2399 tom.houday 464
        radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
2419 richard 465
        echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
2421 richard 466
        echo "db_user=$DB_USER" >> $PASSWD_FILE
467
        echo "db_password=$radiuspwd" >> $PASSWD_FILE
2399 tom.houday 468
        secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
2412 tom.houday 469
        echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
470
        echo "secret_uam=$secretuam" >> $PASSWD_FILE
2399 tom.houday 471
        secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
2412 tom.houday 472
        echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
473
        echo "secret_radius=$secretradius" >> $PASSWD_FILE
628 richard 474
        chmod 640 $PASSWD_FILE
1828 richard 475
#  copy scripts in in /usr/local/bin
2664 tom.houday 476
        cp -fr $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown -R root:root $DIR_DEST_BIN/alcasar* ; chmod -R 740 $DIR_DEST_BIN/alcasar*
1828 richard 477
#  copy conf files in /usr/local/etc
1954 richard 478
        cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
1828 richard 479
        $SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mysql.sh
628 richard 480
# generate central conf file
481
        cat <<EOF > $CONF_FILE
612 richard 482
##########################################
483
##                                      ##
484
##          ALCASAR Parameters          ##
485
##                                      ##
486
##########################################
1 root 487
 
612 richard 488
INSTALL_DATE=$DATE
489
VERSION=$VERSION
490
ORGANISM=$ORGANISME
1748 richard 491
HOSTNAME=$HOSTNAME
923 franck 492
DOMAIN=$DOMAIN
612 richard 493
EOF
628 richard 494
        chmod o-rwx $CONF_FILE
1 root 495
} # End of init ()
496
 
2552 rexy 497
#########################################################
498
##                    Function "network"               ##
499
## - Define the several network address                ##
500
## - Define the DNS naming                             ##
501
## - INTIF parameters (consultation network)           ##
502
## - Write "/etc/hosts" file                           ##
503
## - write "hosts.allow" & "hosts.deny" files          ##
504
#########################################################
1 root 505
network ()
506
{
507
        header_install
636 richard 508
        if [ "$mode" != "update" ]
509
                then
510
                if [ $Lang == "fr" ]
511
                        then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
512
                        else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
513
                fi
514
                response=0
515
                PTN='^[oOyYnN]$'
516
                until [[ $(expr $response : $PTN) -gt 0 ]]
1 root 517
                do
595 richard 518
                        if [ $Lang == "fr" ]
659 richard 519
                                then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
618 richard 520
                                else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
595 richard 521
                        fi
1 root 522
                        read response
523
                done
636 richard 524
                if [ "$response" = "n" ] || [ "$response" = "N" ]
525
                then
526
                        PRIVATE_IP_MASK="0"
527
                        PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
528
                        until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
1 root 529
                        do
595 richard 530
                                if [ $Lang == "fr" ]
597 richard 531
                                        then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
532
                                        else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
595 richard 533
                                fi
597 richard 534
                                read PRIVATE_IP_MASK
1 root 535
                        done
636 richard 536
                else
2454 tom.houday 537
                                PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
636 richard 538
                fi
595 richard 539
        else
2454 tom.houday 540
                PRIVATE_IP_MASK=`grep ^PRIVATE_IP= conf/etc/alcasar.conf|cut -d"=" -f2`
637 richard 541
                rm -rf conf/etc/alcasar.conf
1 root 542
        fi
861 richard 543
# Define LAN side global parameters
1740 richard 544
        hostnamectl set-hostname $HOSTNAME.$DOMAIN
977 richard 545
        PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`                               # private network address (ie.: 192.168.182.0)
1499 richard 546
        private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`                                  # last octet of LAN address
977 richard 547
        PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`                               # private network mask (ie.: 255.255.255.0)
1499 richard 548
        PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`                                 # network prefix (ie. 24)
977 richard 549
        PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`                                              # ALCASAR private ip address (consultation LAN side)
1499 richard 550
        if [ $PRIVATE_IP == $PRIVATE_NETWORK ]                                                          # when entering network address instead of ip address
551
                then
2454 tom.houday 552
                PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`
1499 richard 553
                PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
2454 tom.houday 554
        fi
1499 richard 555
        private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`                                            # last octet of LAN address
556
        PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`          # second network address (ex.: 192.168.182.2)
977 richard 557
        PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX                                           # ie.: 192.168.182.0/24
1499 richard 558
        classe=$((PRIVATE_PREFIX/8))                                                                    # ie.: 2=classe B, 3=classe C
977 richard 559
        PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.                          # compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
560
        PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`                        # private network broadcast (ie.: 192.168.182.255)
1499 richard 561
        private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`                              # last octet of LAN broadcast
562
        PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1` # First network address (ex.: 192.168.182.1)
837 richard 563
        PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`      # last network address (ex.: 192.168.182.254)
1828 richard 564
        PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'`      # MAC address of INTIF
841 richard 565
# Define Internet parameters
2464 richard 566
        if [ "$mode" != "update" ]
2457 richard 567
        then
2464 richard 568
                DNS1=`cat /etc/sysconfig/network-scripts/ifcfg-$EXTIF | grep '^DNS1='| cut -d"=" -f2`   # 1st DNS server
569
                DNS2=`cat /etc/sysconfig/network-scripts/ifcfg-$EXTIF | grep '^DNS2=' | cut -d"=" -f2`  # 2nd DNS server
570
        else
571
                DNS1=`cat /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF | grep '^DNS1=' | cut -d"=" -f2`  # 1st DNS server
572
                DNS2=`cat /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF | grep '^DNS2=' | cut -d"=" -f2`  # 2nd DNS server
573
        fi
574
        if [ "$DNS1" == "" ]
575
        then
2457 richard 576
                if [ $Lang == "fr" ]
577
                then
2464 richard 578
                        echo "L'adresse IP des serveurs DNS ne sont pas corrects"
2457 richard 579
                        echo "Vérifiez la configuration de la carte réseau externe ($EXTIF)"
580
                else
2464 richard 581
                        echo "The IP address of DNS servers are not set correctly"
2457 richard 582
                        echo "Check the extern network card configuration ($EXTIF)"
583
                fi
584
                exit 0
585
        fi
70 franck 586
        DNS1=${DNS1:=208.67.220.220}
587
        DNS2=${DNS2:=208.67.222.222}
1499 richard 588
        PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
1052 richard 589
        PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
1069 richard 590
        PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
2552 rexy 591
# Write network parameters in the conf file
1469 richard 592
        echo "EXTIF=$EXTIF" >> $CONF_FILE
593
        echo "INTIF=$INTIF" >> $CONF_FILE
2282 richard 594
        ######## Récupération des interfaces du ou des réseaux de consultation supplémentaires #################
595
        INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
596
        for i in $INTERFACES
597
        do
598
                SUB=`echo ${i:0:2}`
599
                if [ $SUB = "wl" ]
600
                        then WIFIF=$i
2454 tom.houday 601
                elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ]
2282 richard 602
                        then LANIF=$i
603
                fi
604
        done
605
        if [ -n "$WIFIF" ]
606
                then echo "WIFIF=$WIFIF" >> $CONF_FILE
607
        elif [ -n "$LANIF" ]
608
                then echo "LANIF=$LANIF" >> $CONF_FILE
609
        fi
2454 tom.houday 610
        #########################################################################################################
2552 rexy 611
        IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2` # test static or dynamic
1499 richard 612
        if [ $IP_SETTING == "dhcp" ]
613
                then
614
                echo "PUBLIC_IP=dhcp" >> $CONF_FILE
1585 richard 615
                echo "GW=dhcp" >> $CONF_FILE
1499 richard 616
        else
617
                echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
1585 richard 618
                echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
1499 richard 619
        fi
1587 richard 620
        echo "DNS1=$DNS1" >> $CONF_FILE
621
        echo "DNS2=$DNS2" >> $CONF_FILE
994 franck 622
        echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
628 richard 623
        echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
1484 richard 624
        echo "DHCP=on" >> $CONF_FILE
914 franck 625
        echo "EXT_DHCP_IP=none" >> $CONF_FILE
626
        echo "RELAY_DHCP_IP=none" >> $CONF_FILE
627
        echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
1610 franck 628
        echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
629
        echo "INT_DNS_IP=none" >> $CONF_FILE
630
        echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
1499 richard 631
# network default
597 richard 632
        [ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
1 root 633
        cat <<EOF > /etc/sysconfig/network
634
NETWORKING=yes
635
FORWARD_IPV4=true
636
EOF
2552 rexy 637
# write "/etc/hosts"
1 root 638
        [ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
639
        cat <<EOF > /etc/hosts
503 richard 640
127.0.0.1       localhost
2558 rexy 641
$PRIVATE_IP     $HOSTNAME
1 root 642
EOF
2552 rexy 643
# write EXTIF (Internet) config
1499 richard 644
        [ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
645
        if [ $IP_SETTING == "dhcp" ]
646
                then
647
                cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
14 richard 648
DEVICE=$EXTIF
1585 richard 649
BOOTPROTO=dhcp
650
DNS1=127.0.0.1
651
PEERDNS=no
652
RESOLV_MODS=yes
653
ONBOOT=yes
1613 franck 654
NOZEROCONF=yes
1585 richard 655
METRIC=10
656
MII_NOT_SUPPORTED=yes
657
IPV6INIT=no
658
IPV6TO4INIT=no
659
ACCOUNTING=no
660
USERCTL=no
661
MTU=$MTU
662
EOF
2454 tom.houday 663
                else
1585 richard 664
                cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
665
DEVICE=$EXTIF
14 richard 666
BOOTPROTO=static
597 richard 667
IPADDR=$PUBLIC_IP
668
NETMASK=$PUBLIC_NETMASK
669
GATEWAY=$PUBLIC_GATEWAY
14 richard 670
DNS1=127.0.0.1
1499 richard 671
RESOLV_MODS=yes
14 richard 672
ONBOOT=yes
673
METRIC=10
1610 franck 674
NOZEROCONF=yes
14 richard 675
MII_NOT_SUPPORTED=yes
676
IPV6INIT=no
677
IPV6TO4INIT=no
678
ACCOUNTING=no
679
USERCTL=no
994 franck 680
MTU=$MTU
14 richard 681
EOF
1499 richard 682
        fi
2552 rexy 683
# write INTIF (consultation LAN) in normal mode
841 richard 684
        cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
685
DEVICE=$INTIF
686
BOOTPROTO=static
687
ONBOOT=yes
688
NOZEROCONF=yes
689
MII_NOT_SUPPORTED=yes
690
IPV6INIT=no
691
IPV6TO4INIT=no
692
ACCOUNTING=no
693
USERCTL=no
694
EOF
1558 richard 695
        cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
2552 rexy 696
# write INTIF in bypass mode (see "alcasar-bypass.sh")
1554 richard 697
        cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
1 root 698
DEVICE=$INTIF
699
BOOTPROTO=static
700
IPADDR=$PRIVATE_IP
604 richard 701
NETMASK=$PRIVATE_NETMASK
1 root 702
ONBOOT=yes
703
METRIC=10
704
NOZEROCONF=yes
705
MII_NOT_SUPPORTED=yes
14 richard 706
IPV6INIT=no
707
IPV6TO4INIT=no
708
ACCOUNTING=no
709
USERCTL=no
1 root 710
EOF
2282 richard 711
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
712
        if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
713
        then
714
                cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
715
DEVICE=$WIFIF
716
BOOTPROTO=static
717
ONBOOT=yes
718
NOZEROCONF=yes
719
MII_NOT_SUPPORTED=yes
720
IPV6INIT=no
721
IPV6TO4INIT=no
722
ACCOUNTING=no
723
USERCTL=no
724
EOF
725
        elif [ -n "$LANIF" ]
726
        then
727
                cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
728
DEVICE=$LANIF
729
BOOTPROTO=static
730
ONBOOT=yes
731
NOZEROCONF=yes
732
MII_NOT_SUPPORTED=yes
733
IPV6INIT=no
734
IPV6TO4INIT=no
735
ACCOUNTING=no
736
USERCTL=no
737
EOF
738
        fi
2454 tom.houday 739
        #########################################################################################################
2552 rexy 740
# write hosts.allow & hosts.deny
1 root 741
        [ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
742
        cat <<EOF > /etc/hosts.allow
743
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
604 richard 744
sshd: ALL
1 root 745
ntpd: $PRIVATE_NETWORK_SHORT
746
EOF
747
        [ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
748
        cat <<EOF > /etc/hosts.deny
749
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
750
EOF
790 richard 751
        chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
860 richard 752
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
1069 richard 753
        echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
790 richard 754
# load conntrack ftp module
755
        [ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
1705 richard 756
        echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
1159 crox53 757
# load ipt_NETFLOW module
758
        echo "ipt_NETFLOW" >>  /etc/modprobe.preload
1513 richard 759
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
760
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
761
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
762
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
1833 richard 763
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
2454 tom.houday 764
#
860 richard 765
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
1 root 766
} # End of network ()
767
 
2552 rexy 768
###################################################
769
##                  Function "ACC"               ##
770
## - copy ALCASAR Control Center (ACC) files     ##
771
## - configuration of the web server (Lighttpd)  ##
772
## - creation of the first ACC admin account     ##
773
## - secure the ACC access                       ##
774
###################################################
1221 richard 775
ACC ()
1 root 776
{
777
        [ -d $DIR_WEB ] && rm -rf $DIR_WEB
778
        mkdir $DIR_WEB
1833 richard 779
# Copy & adapt ACC files
316 richard 780
        cp -rf $DIR_INSTALL/web/* $DIR_WEB/
781
        $SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
782
        $SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
783
        $SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
784
        $SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
785
        chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
5 franck 786
        chown -R apache:apache $DIR_WEB/*
1833 richard 787
# copy & adapt "freeradius-web" files
788
        cp -rf $DIR_CONF/freeradius-web/ /etc/
789
        [ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
790
        $SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
791
        $SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
792
        $SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
793
        cat <<EOF > /etc/freeradius-web/naslist.conf
794
nas1_name: alcasar-$ORGANISME
795
nas1_model: Network Access Controler
796
nas1_ip: $PRIVATE_IP
797
nas1_port_num: 0
798
nas1_community: public
799
EOF
800
        chown -R apache:apache /etc/freeradius-web/
801
# create the log & backup structure :
1489 richard 802
# - base = users database
803
# - archive = tarball of "base + http firewall + netflow"
1833 richard 804
# - security = watchdog log
2138 richard 805
        for i in base archive security activity_report;
1 root 806
        do
807
                [ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
808
        done
5 franck 809
        chown -R root:apache $DIR_SAVE
1833 richard 810
# Configuring & securing php
71 richard 811
        [ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
534 richard 812
        timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
813
        $SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
411 richard 814
        $SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
815
        $SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
2397 tom.houday 816
        $SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
817
        $SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
71 richard 818
        $SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
819
        $SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
2397 tom.houday 820
        $SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
2488 lucas.echa 821
# Configuring & securing Lighttpd
790 richard 822
        rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
2488 lucas.echa 823
        [ -e /etc/lighttpd/lighttpd.conf.default ] || cp /etc/lighttpd/lighttpd.conf /etc/lighttpd/lighttpd.conf.default
824
        $SED "s?^server\.use-ipv6.*?server\.use-ipv6 = \"disable\"?g" /etc/lighttpd/lighttpd.conf
825
        $SED "s?^#server\.bind.*?server\.bind = \"$HOSTNAME.$DOMAIN\"?g" /etc/lighttpd/lighttpd.conf
2592 rexy 826
        $SED "s?^server\.bind.*?server\.bind = \"$HOSTNAME.$DOMAIN\"?g" /etc/lighttpd/lighttpd.conf
2488 lucas.echa 827
        $SED "s?^#server\.tag.*?server\.tag = \"\"?g" /etc/lighttpd/lighttpd.conf
828
        echo "include \"vhosts.d/alcasar.conf\"" >> /etc/lighttpd/lighttpd.conf
2592 rexy 829
 
830
        [ -e /etc/lighttpd/modules.conf.default ] || cp /etc/lighttpd/modules.conf /etc/lighttpd/modules.conf.default
2488 lucas.echa 831
        $SED "s?^#[ ]*\"mod_auth\",.*? \"mod_auth\",?g" /etc/lighttpd/modules.conf
832
        $SED "s?^#[ ]*\"mod_alias\",.*? \"mod_alias\",?g" /etc/lighttpd/modules.conf
833
        $SED "s?^#[ ]*\"mod_redirect\",.*? \"mod_redirect\",?g" /etc/lighttpd/modules.conf
834
        $SED "s?^#include \"conf.d/fastcgi.conf\".*?include \"conf.d/fastcgi.conf\"?g" /etc/lighttpd/modules.conf
835
 
2592 rexy 836
        [ -e /etc/lighttpd/conf.d/fastcgi.conf.default ] || cp /etc/lighttpd/conf.d/fastcgi.conf /etc/lighttpd/conf.d/fastcgi.conf.default
837
 
838
        [ -e /etc/php-fpm.conf.default ] || cp /etc/php-fpm.conf /etc/php-fpm.conf.default
839
        $SED "s?^;listen\.owner.*?listen\.owner = apache?g" /etc/php-fpm.conf
840
        $SED "s?^;listen\.group.*?listen\.group = apache?g" /etc/php-fpm.conf
841
        $SED "s?^;listen\.mode.*?listen\.mode = 0660?g" /etc/php-fpm.conf
842
 
843
        cp $DIR_CONF/lighttpd/conf.d/fastcgi.conf /etc/lighttpd/conf.d/fastcgi.conf
844
 
845
        [ -d /etc/lighttpd/vhosts.d ] || mkdir /etc/lighttpd/vhosts.d
846
        cp $DIR_CONF/lighttpd/vhosts.d/* /etc/lighttpd/vhosts.d/
847
        $SED 's/^$SERVER\["socket"\] == ".*:443.*/$SERVER\["socket"\] == "'"$HOSTNAME.$DOMAIN"':443" {/g' /etc/lighttpd/vhosts.d/alcasar-with-ssl.conf
848
        $SED 's/^$SERVER\["socket"\] == ".*:443.*/$SERVER\["socket"\] == "'"$HOSTNAME.$DOMAIN"':443" {/g' /etc/lighttpd/vhosts.d/alcasar-without-ssl.conf
849
        $SED "s/^\([\t ]*\)var.server_name.*/\1var.server_name = \"$HOSTNAME.$DOMAIN\"/g" /etc/lighttpd/vhosts.d/alcasar-with-ssl.conf
850
        $SED "s/^\([\t ]*\)var.server_name.*/\1var.server_name = \"$HOSTNAME.$DOMAIN\"/g" /etc/lighttpd/vhosts.d/alcasar-without-ssl.conf
2593 rexy 851
        ln -s /etc/lighttpd/vhosts.d/alcasar-with-ssl.conf /etc/lighttpd/vhosts.d/alcasar.conf
2592 rexy 852
 
2588 rexy 853
        [ -d /var/log/lighttpd ] || mkdir /var/log/lighttpd
854
        [ -e /var/log/lighttpd/access.log ] || touch /var/log/lighttpd/access.log
855
        [ -e /var/log/lighttpd/error.log ] || touch /var/log/lighttpd/error.log
856
        chown -R apache:apache /var/log/lighttpd
2488 lucas.echa 857
        /usr/bin/systemctl start lighttpd
2499 tom.houday 858
        /usr/bin/systemctl start php-fpm
2488 lucas.echa 859
 
2552 rexy 860
# Creation of the first account (in 'admin' profile)
2293 tom.houday 861
        if [ "$mode" = "install" ]
862
                then
613 richard 863
                        header_install
1268 richard 864
# Creation of keys file for the admin account ("admin")
2293 tom.houday 865
                        [ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
866
                        mkdir -p $DIR_DEST_ETC/digest
867
                        chmod 755 $DIR_DEST_ETC/digest
868
                        until [ -s $DIR_DEST_ETC/digest/key_admin ]
2488 lucas.echa 869
                        do
870
                                $DIR_DEST_BIN/alcasar-profil.sh --add admin
871
                        done
2293 tom.houday 872
        fi
2488 lucas.echa 873
 
2561 rexy 874
        # Run after coova (in order to wait tun0 to be up)
2488 lucas.echa 875
        $SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/lighttpd.service
2293 tom.houday 876
        # Log file for ACC access imputability
877
        [ -e /var/Save/security/acc_access.log ] || touch /var/Save/security/acc_access.log
878
        chown root:apache /var/Save/security/acc_access.log
879
        chmod 664 /var/Save/security/acc_access.log
1389 richard 880
} # End of ACC ()
1 root 881
 
2552 rexy 882
##################################################################
883
##                               Fonction "CA"                  ##
884
## - Creating the CA and the server certificate (lighttpd)      ##
885
##################################################################
1221 richard 886
CA ()
1 root 887
{
510 richard 888
        $DIR_DEST_BIN/alcasar-CA.sh
5 franck 889
        chown -R root:apache /etc/pki
1 root 890
        chmod -R 750 /etc/pki
1389 richard 891
} # End of CA ()
1 root 892
 
2552 rexy 893
#############################################################
894
##               Function "time_server"                    ##
895
## - Configuring NTP server                                ##
896
#############################################################
1837 richard 897
time_server ()
898
{
899
# Set the Internet time server
900
        [ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
901
        cat <<EOF > /etc/ntp/step-tickers
902
0.fr.pool.ntp.org       # adapt to your country
903
1.fr.pool.ntp.org
904
2.fr.pool.ntp.org
905
EOF
906
        [ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
907
        cat <<EOF > /etc/ntp.conf
908
server 0.fr.pool.ntp.org        # adapt to your country
909
server 1.fr.pool.ntp.org
910
server 2.fr.pool.ntp.org
911
server 127.127.1.0              # local clock si NTP internet indisponible ...
912
fudge 127.127.1.0 stratum 10
913
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
914
restrict 127.0.0.1
915
driftfile /var/lib/ntp/drift
916
logfile /var/log/ntp.log
917
disable monitor
918
EOF
919
        chown -R ntp:ntp /var/lib/ntp
920
# Synchronize now
921
        ntpd -q -g &
922
} # End of time_server ()
923
 
2541 rexy 924
#####################################################################
925
##                     Function "init_db"                          ##
926
## - Mysql initialization                                          ##
927
## - Set admin (root) password                                     ##
928
## - Remove unused users & databases                               ##
929
## - Radius database creation                                      ##
930
## - Copy of accounting tables (mtotacct, totacct) & userinfo      ##
931
#####################################################################
1 root 932
init_db ()
933
{
1990 richard 934
        if [ `systemctl is-active mysqld` == "active" ]
935
        then
936
                systemctl stop mysqld
937
        fi
1355 richard 938
        rm -rf /var/lib/mysql # to be sure that there is no former installation
1 root 939
        [ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1355 richard 940
        $SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
1979 richard 941
        $SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
1980 richard 942
        $SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf
943
        $SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf  # accentuated user names are allowed
2591 rexy 944
        [ -e /etc/my.cnf.d/feedback.cnf ] && $SED "s?^plugin-load.*?#&?g" /etc/my.cnf.d/feedback.cnf # remove the feedback plugin (ALCASAR doesn't report anything !)
2416 richard 945
        /usr/sbin/mysqld-prepare-db-dir > /dev/null 2>&1
946
        /usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
947
        /usr/bin/systemctl start mysqld
1963 richard 948
        nb_round=1
1981 richard 949
        while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1963 richard 950
        do
951
                nb_round=`expr $nb_round + 1`
952
                sleep 2
953
        done
1981 richard 954
        if [ ! -S /var/lib/mysql/mysql.sock ]
1963 richard 955
        then
1981 richard 956
                echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1963 richard 957
                exit
1955 richard 958
        fi
2416 richard 959
        MYSQL="/usr/bin/mysql --execute"
1355 richard 960
# Secure the server
2416 richard 961
        $MYSQL="GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$mysqlpwd';"
962
        MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1355 richard 963
        $MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
2454 tom.houday 964
        $MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;"
615 richard 965
# Create 'radius' database
1317 richard 966
        $MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
615 richard 967
# Add an empty radius database structure
1800 richard 968
        mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
615 richard 969
# modify the start script in order to close accounting connexion when the system is comming down or up
1357 richard 970
        [ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
2416 richard 971
        $SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
972
        $SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
973
        /usr/bin/systemctl unset-environment MYSQLD_OPTS
1574 richard 974
        /usr/bin/systemctl daemon-reload
1389 richard 975
} # End of init_db ()
1 root 976
 
2423 richard 977
###################################################################
978
##                       Function "freeradius"                   ##
979
## - Set the configuration files                                 ##
980
## - Set the shared secret between coova-chilli and freeradius   ##
981
## - Adapt the Mysql conf file and counters                      ##
982
###################################################################
2421 richard 983
freeradius ()
1 root 984
{
1800 richard 985
        cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1 root 986
        chown -R radius:radius /etc/raddb
987
        [ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
2420 richard 988
# Set radius global parameters (radius.conf)
1 root 989
        $SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
990
        $SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
991
        $SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
2420 richard 992
        $SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
993
        $SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
2419 richard 994
 
2501 tom.houday 995
# Add ALCASAR dictionary
996
        cp $DIR_CONF/radius/dictionary.alcasar /usr/share/freeradius/dictionary.alcasar
2512 tom.houday 997
        echo -e '\n$INCLUDE dictionary.alcasar' >> /usr/share/freeradius/dictionary
998
# Add CoovaChilli dictionary
999
        cp /usr/share/doc/coova-chilli/dictionary.coovachilli /usr/share/freeradius/dictionary.coovachilli
1000
        echo -e '\n$INCLUDE dictionary.coovachilli' >> /usr/share/freeradius/dictionary
2420 richard 1001
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1 root 1002
        [ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1003
        cat << EOF > /etc/raddb/clients.conf
2438 richard 1004
client localhost {
1005
        ipaddr = 127.0.0.1
1 root 1006
        secret = $secretradius
2438 richard 1007
        shortname = chilli
2454 tom.houday 1008
        nas_type = other
1 root 1009
}
1010
EOF
2420 richard 1011
# Set Virtual server (remvove all except "alcasar virtual site")
1012
        rm -f /etc/raddb/sites-enabled/*
2467 richard 1013
        cp $DIR_CONF/radius/alcasar /etc/raddb/sites-available/alcasar
1014
        cp $DIR_CONF/radius/alcasar-with-ldap /etc/raddb/sites-available/alcasar-with-ldap
1015
        chown radius:apache /etc/raddb/sites-available/alcasar*
1016
        chmod 660 /etc/raddb/sites-available/alcasar*
2420 richard 1017
        ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
2454 tom.houday 1018
# INFO : To connect from outside (EAP), add the EAP virtual server (link in sites-enabled) and inner-tunnel modules (link in mods-enabled)
2420 richard 1019
 
2454 tom.houday 1020
# Set modules
2465 richard 1021
# Add custom LDAP "available module"
1022
        cp -f $DIR_CONF/radius/ldap-alcasar /etc/raddb/mods-available/
1023
        chown -R radius:radius /etc/raddb/mods-available/ldap-alcasar
2422 richard 1024
# Set only usefull modules for ALCASAR (ldap is enabled only via ACC)
2454 tom.houday 1025
        rm -rf  /etc/raddb/mods-enabled/*
2615 tom.houday 1026
        for mods in sql sqlcounter attr_filter expiration logintime pap expr always
2454 tom.houday 1027
        do
1028
                ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1029
        done
2423 richard 1030
# Configure SQL mod
2420 richard 1031
        [ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
2423 richard 1032
        $SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1033
        $SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
2420 richard 1034
        $SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
2423 richard 1035
        $SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1036
        $SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1037
        $SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1038
        $SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
2454 tom.houday 1039
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.
2420 richard 1040
        [ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1041
        cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1042
        chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
2421 richard 1043
# sqlcounter modifications
2470 richard 1044
        [ -e /etc/raddb/mods-available/sqlcounter.default ] || cp /etc/raddb/mods-available/sqlcounter /etc/raddb/mods-available/sqlcounter.default
1045
        cp -f $DIR_CONF/radius/sqlcounter /etc/raddb/mods-available/sqlcounter
1046
        chown -R radius:radius /etc/raddb/mods-available/sqlcounter
2421 richard 1047
# make certain that mysql is up before freeradius start
1358 richard 1048
        [ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
1049
        $SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
1574 richard 1050
        /usr/bin/systemctl daemon-reload
2597 tom.houday 1051
# Allow apache to change some conf files (ie : ldap on/off)
1052
        chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
2454 tom.houday 1053
 
2421 richard 1054
} # End freeradius ()
1 root 1055
 
2423 richard 1056
#############################################################################
2552 rexy 1057
##                           Function "chilli"                             ##
2423 richard 1058
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1059
## - Adapt the authentication web page (intercept.php)                     ##
1060
#############################################################################
1389 richard 1061
chilli ()
1 root 1062
{
1370 richard 1063
# chilli unit for systemd
2324 tom.houday 1064
        cat << EOF > /lib/systemd/system/chilli.service
1372 richard 1065
#  This file is part of systemd.
1066
#
1067
#  systemd is free software; you can redistribute it and/or modify it
1068
#  under the terms of the GNU General Public License as published by
1069
#  the Free Software Foundation; either version 2 of the License, or
1070
#  (at your option) any later version.
1370 richard 1071
[Unit]
1072
Description=chilli is a captive portal daemon
1073
After=network.target
1074
 
1075
[Service]
1379 richard 1076
Type=forking
1370 richard 1077
ExecStart=/usr/libexec/chilli start
1078
ExecStop=/usr/libexec/chilli stop
1079
ExecReload=/usr/libexec/chilli reload
1080
PIDFile=/var/run/chilli.pid
1081
 
1082
[Install]
1083
WantedBy=multi-user.target
1084
EOF
799 richard 1085
# init file creation
1370 richard 1086
        [ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1801 richard 1087
        cat <<EOF > /etc/init.d/chilli
799 richard 1088
#!/bin/sh
1089
#
1090
# chilli CoovaChilli init
1091
#
1092
# chkconfig: 2345 65 35
1093
# description: CoovaChilli
1094
### BEGIN INIT INFO
1095
# Provides:       chilli
2454 tom.houday 1096
# Required-Start: network
1097
# Should-Start:
799 richard 1098
# Required-Stop:  network
2454 tom.houday 1099
# Should-Stop:
799 richard 1100
# Default-Start:  2 3 5
1101
# Default-Stop:
1102
# Description:    CoovaChilli access controller
1103
### END INIT INFO
1104
 
1105
[ -f /usr/sbin/chilli ] || exit 0
1106
. /etc/init.d/functions
1107
CONFIG=/etc/chilli.conf
1108
pidfile=/var/run/chilli.pid
1109
[ -f \$CONFIG ] || {
2394 tom.houday 1110
        echo "\$CONFIG Not found"
1111
        exit 0
799 richard 1112
}
2376 tom.houday 1113
current_users_file="/var/tmp/havp/current_users.txt"    # file containing active users
799 richard 1114
RETVAL=0
1115
prog="chilli"
1116
case \$1 in
2394 tom.houday 1117
        start)
2454 tom.houday 1118
                if [ -f \$pidfile ] ; then
2394 tom.houday 1119
                        gprintf "chilli is already running"
1120
                else
1121
                        gprintf "Starting \$prog: "
1122
                        echo '' > \$current_users_file && chown apache:apache \$current_users_file
1123
                        rm -f /var/run/chilli* # cleaning
1124
                        /usr/sbin/modprobe tun >/dev/null 2>&1
1125
                        echo 1 > /proc/sys/net/ipv4/ip_forward
1126
                        [ -e /dev/net/tun ] || {
2454 tom.houday 1127
                                (cd /dev;
1128
                                mkdir net;
1129
                                cd net;
2394 tom.houday 1130
                                mknod tun c 10 200)
1131
                        }
1132
                        ifconfig $INTIF 0.0.0.0
1133
                        /usr/sbin/ethtool -K $INTIF gro off
1134
                        daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1135
                        RETVAL=\$?
1136
                fi
1137
                ;;
799 richard 1138
 
2394 tom.houday 1139
        reload)
1140
                killall -HUP chilli
1141
                ;;
799 richard 1142
 
2394 tom.houday 1143
        restart)
1144
                \$0 stop
1145
                sleep 2
1146
                \$0 start
1147
                ;;
799 richard 1148
 
2394 tom.houday 1149
        status)
1150
                status chilli
1151
                RETVAL=0
1152
                ;;
1153
 
1154
        stop)
2454 tom.houday 1155
                if [ -f \$pidfile ] ; then
2394 tom.houday 1156
                        gprintf "Shutting down \$prog: "
1157
                        killproc /usr/sbin/chilli
1158
                        RETVAL=\$?
1159
                        [ \$RETVAL = 0 ] && rm -f \$pidfile
1160
                        [ -e \$current_users_file ] && rm -f \$current_users_file
2454 tom.houday 1161
                else
2394 tom.houday 1162
                        gprintf "chilli is not running"
1163
                fi
1164
                ;;
1165
 
1166
        *)
1167
                echo "Usage: \$0 {start|stop|restart|reload|status}"
1168
                exit 1
799 richard 1169
esac
1170
echo
1171
EOF
2324 tom.houday 1172
        chmod a+x /etc/init.d/chilli
1173
        ln -s /etc/init.d/chilli /usr/libexec/chilli
799 richard 1174
# conf file creation
346 richard 1175
        [ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
2016 raphael.pi 1176
        #NTP Option configuration for DHCP
2032 richard 1177
        #DHCP Options : rfc2132
1178
                #dhcp option value will be convert in hexa.
1179
                #NTP option (or 'option 42') is like :
2454 tom.houday 1180
                #
2032 richard 1181
                #    Code   Len         Address 1               Address 2
1182
                #   +-----+-----+-----+-----+-----+-----+-----+-----+--
1183
                #   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1184
                #   +-----+-----+-----+-----+-----+-----+-----+-----+--
1185
                #
1186
                #Code : 42 => 2a
1187
                #Len : 4 => 04
2016 raphael.pi 1188
        PRIVATE_IP_HEXA=$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f1))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f2))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f3))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f4))
346 richard 1189
        cat <<EOF > /etc/chilli.conf
1190
# coova config for ALCASAR
1191
cmdsocket       /var/run/chilli.sock
1336 richard 1192
unixipc         chilli.$INTIF.ipc
1551 richard 1193
pidfile         /var/run/chilli.pid
346 richard 1194
net             $PRIVATE_NETWORK_MASK
595 richard 1195
dhcpif          $INTIF
841 richard 1196
ethers          $DIR_DEST_ETC/alcasar-ethers
861 richard 1197
#nodynip
865 richard 1198
#statip
1199
dynip           $PRIVATE_NETWORK_MASK
1249 richard 1200
domain          $DOMAIN
355 richard 1201
dns1            $PRIVATE_IP
1202
dns2            $PRIVATE_IP
346 richard 1203
uamlisten       $PRIVATE_IP
503 richard 1204
uamport         3990
2370 tom.houday 1205
uamuiport       3991
837 richard 1206
macauth
1207
macpasswd       password
1697 richard 1208
strictmacauth
1243 richard 1209
locationname    $HOSTNAME.$DOMAIN
346 richard 1210
radiusserver1   127.0.0.1
1211
radiusserver2   127.0.0.1
1212
radiussecret    $secretradius
1213
radiusauthport  1812
1214
radiusacctport  1813
1243 richard 1215
uamserver       https://$HOSTNAME.$DOMAIN/intercept.php
2374 tom.houday 1216
redirurl
1243 richard 1217
radiusnasid     $HOSTNAME.$DOMAIN
346 richard 1218
uamsecret       $secretuam
1249 richard 1219
uamallowed      $HOSTNAME,$HOSTNAME.$DOMAIN
346 richard 1220
coaport         3799
1379 richard 1221
conup           $DIR_DEST_BIN/alcasar-conup.sh
1222
condown         $DIR_DEST_BIN/alcasar-condown.sh
2594 tom.houday 1223
macup           $DIR_DEST_BIN/alcasar-macup.sh
503 richard 1224
include         $DIR_DEST_ETC/alcasar-uamallowed
1225
include         $DIR_DEST_ETC/alcasar-uamdomain
2016 raphael.pi 1226
dhcpopt         2a04$PRIVATE_IP_HEXA
1613 franck 1227
#dhcpgateway            none
1228
#dhcprelayagent         none
1610 franck 1229
#dhcpgatewayport        none
2234 richard 1230
sslkeyfile      /etc/pki/tls/private/alcasar.key
1231
sslcertfile     /etc/pki/tls/certs/alcasar.crt
1232
redirssl
2370 tom.houday 1233
uamuissl
346 richard 1234
EOF
2274 richard 1235
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
977 richard 1236
        echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
2274 richard 1237
        echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
840 richard 1238
# create files for trusted domains and urls
1148 crox53 1239
        touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
503 richard 1240
        chown root:apache $DIR_DEST_ETC/alcasar-*
1241
        chmod 660 $DIR_DEST_ETC/alcasar-*
847 richard 1242
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
526 stephane 1243
        $SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
796 richard 1244
# user 'chilli' creation (in order to run conup/off and up/down scripts
2396 tom.houday 1245
        chilli_exist=`grep -c ^chilli: /etc/passwd`
796 richard 1246
        if [ "$chilli_exist" == "1" ]
1247
        then
2454 tom.houday 1248
                userdel -r chilli 2>/dev/null
796 richard 1249
        fi
1250
        groupadd -f chilli
1251
        useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1389 richard 1252
}  # End of chilli ()
1349 richard 1253
 
2541 rexy 1254
################################################################
2521 armand.ito 1255
##                   Function "e2guardian"                    ##
2541 rexy 1256
## - Set the parameters of this HTML proxy (as controler)     ##
1257
################################################################
2521 armand.ito 1258
e2guardian ()
1 root 1259
{
2521 armand.ito 1260
        mkdir -p /var/e2guardian /var/log/e2guardian
1261
        chown -R e2guardian /var/e2guardian /var/log/e2guardian
1262
        $SED "s?^ExecStart=.*?ExecStart=/usr/sbin/e2guardian -c /etc/e2guardian/e2guardian.conf?g" /lib/systemd/system/e2guardian.service
1263
        $SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/e2guardian.service
1264
        [ -e $DIR_DG/e2guardian.conf.default ] || cp $DIR_DG/e2guardian.conf $DIR_DG/e2guardian.conf.default
2454 tom.houday 1265
# By default the filter is off
2521 armand.ito 1266
        $SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/e2guardian.conf
1293 richard 1267
# French deny HTML page
2521 armand.ito 1268
        $SED "s?^language =.*?language = french?g" $DIR_DG/e2guardian.conf
1293 richard 1269
# Listen only on LAN side
2521 armand.ito 1270
        $SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/e2guardian.conf
1342 richard 1271
# DG send its flow to HAVP
2521 armand.ito 1272
        $SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/e2guardian.conf
1293 richard 1273
# replace the default deny HTML page
2521 armand.ito 1274
        cp -f $DIR_CONF/template.html /usr/share/e2guardian/languages/ukenglish/
1275
        cp -f $DIR_CONF/template-fr.html /usr/share/e2guardian/languages/french/template.html
1293 richard 1276
# Don't log
2521 armand.ito 1277
        $SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/e2guardian.conf
2519 rexy 1278
# # Change the default report page
2521 armand.ito 1279
        $SED "s?^accessdeniedaddress =.*?accessdeniedaddress = http://$HOSTNAME.$DOMAIN?g" $DIR_DG/e2guardian.conf
2519 rexy 1280
# Disable HTML content control
2521 armand.ito 1281
        $SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/e2guardian.conf
497 richard 1282
        cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1283
        $SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
2519 rexy 1284
# Disable URL control with regex
497 richard 1285
        cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1286
        $SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
2521 armand.ito 1287
# Configure E2guardian for large site
1721 richard 1288
# Minimum number of processus to handle connections
2521 armand.ito 1289
        $SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/e2guardian.conf
1721 richard 1290
# Maximum number of processus to handle connections
2521 armand.ito 1291
        $SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/e2guardian.conf
1721 richard 1292
# Run at least 8 daemons
2521 armand.ito 1293
        $SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/e2guardian.conf
1721 richard 1294
# minimum number of processes to spawn
2521 armand.ito 1295
        $SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/e2guardian.conf
1721 richard 1296
# maximum age of a child process before it croaks it
2521 armand.ito 1297
        $SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/e2guardian.conf
2519 rexy 1298
# Disable download files control
2521 armand.ito 1299
        [ -e $DIR_DG/e2guardianf1.conf.default ] || cp $DIR_DG/e2guardianf1.conf $DIR_DG/e2guardianf1.conf.default
1300
        $SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/e2guardianf1.conf
497 richard 1301
        [ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1302
        [ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1303
        touch $DIR_DG/lists/bannedextensionlist
1304
        touch $DIR_DG/lists/bannedmimetypelist
1305
# 'Safesearch' regex actualisation
498 richard 1306
        $SED "s?images?search?g" $DIR_DG/lists/urlregexplist
497 richard 1307
# empty LAN IP list that won't be WEB filtered
1308
        [ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1309
        touch $DIR_DG/lists/exceptioniplist
1310
# Keep a copy of URL & domain filter configuration files
1311
        [ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1312
        [ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
2521 armand.ito 1313
} # End of e2guardian ()
1 root 1314
 
71 richard 1315
##################################################################
2519 rexy 1316
##                     Function "antivirus"                     ##
1317
## - Set the parameters of havp, libclamav and freshclam        ##
71 richard 1318
##################################################################
2454 tom.houday 1319
antivirus ()
71 richard 1320
{
1358 richard 1321
# create 'havp' user
2396 tom.houday 1322
        havp_exist=`grep -c ^havp: /etc/passwd`
307 richard 1323
        if [ "$havp_exist" == "1" ]
288 richard 1324
        then
2454 tom.houday 1325
                userdel -r havp 2>/dev/null
1326
                groupdel havp 2>/dev/null
288 richard 1327
        fi
307 richard 1328
        groupadd -f havp
1486 richard 1329
        useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1841 richard 1330
        mkdir -p /var/tmp/havp /var/log/havp /var/run/havp /var/log/clamav /var/lib/clamav
1484 richard 1331
        chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1841 richard 1332
        chown -R clamav:clamav /var/log/clamav /var/lib/clamav
109 richard 1333
        [ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1334
        $SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1484 richard 1335
        $SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config    # pidfile
1336
        $SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config             # transparent mode
631 richard 1337
        $SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config       # we listen only on loopback
1485 richard 1338
        $SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config                            # datas come on port 8090 (on loopback)
990 franck 1339
        $SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config   # Log format
631 richard 1340
        $SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config            # active libclamav AV
1341
        $SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config                     # log only when malware matches
659 richard 1342
        $SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config              # 10 daemons are started simultaneously
835 richard 1343
        $SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config               # doesn't scan image files
1344
        $SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1007 richard 1345
# skip checking of youtube flow (too heavy load / risk too low)
1346
        [ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1347
        echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1348
        echo "*.youtube.com/*" >> /etc/havp/whitelist
1544 richard 1349
# adapt init script and systemd unit
335 richard 1350
        [ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
481 franck 1351
        cp -f $DIR_CONF/havp-init /etc/init.d/havp
1547 richard 1352
        [ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1353
        $SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1544 richard 1354
        $SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1358 richard 1355
# replace of the intercept page (template)
340 richard 1356
        cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1357
        cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1358 richard 1358
# update virus database every 4 hours (24h/6)
1357 richard 1359
        [ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1360
        $SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
489 richard 1361
        $SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1357 richard 1362
        $SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1358 richard 1363
        $SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1364
        $SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1385 richard 1365
# update now
1382 richard 1366
        /usr/bin/freshclam --no-warnings
1389 richard 1367
} # End of antivirus ()
71 richard 1368
 
2519 rexy 1369
################################################################################
1370
##                           Function "tinyproxy"                             ##
2552 rexy 1371
## - Set the parameters of tinyproxy (proxy between filtered users and havp)  ##
2519 rexy 1372
################################################################################
2454 tom.houday 1373
tinyproxy ()
1485 richard 1374
{
2396 tom.houday 1375
        tinyproxy_exist=`grep -c ^tinyproxy: /etc/passwd`
1486 richard 1376
        if [ "$tinyproxy_exist" == "1" ]
1377
        then
2454 tom.houday 1378
                userdel -r tinyproxy 2>/dev/null
1379
                groupdel tinyproxy 2>/dev/null
1486 richard 1380
        fi
1381
        groupadd -f tinyproxy
1488 richard 1382
        useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1668 richard 1383
        mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1384
        chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1486 richard 1385
        [ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1386
        $SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1387
        $SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1388
        $SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf                      # Listen Port
1389
        $SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf          # Listen NIC (only intif)
1508 richard 1390
        $SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1518 richard 1391
        $SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1486 richard 1392
        $SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf             # Only errors are logged
1393
        $SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf   # forward to HAVP
1394
        $SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf      # Stealth mode
1544 richard 1395
        $SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf   # Allow from LAN
1509 richard 1396
# Create the systemd unit
1397
cat << EOF > /lib/systemd/system/tinyproxy.service
1398
#  This file is part of systemd.
1399
#
1400
#  systemd is free software; you can redistribute it and/or modify it
1401
#  under the terms of the GNU General Public License as published by
1402
#  the Free Software Foundation; either version 2 of the License, or
1403
#  (at your option) any later version.
1485 richard 1404
 
1509 richard 1405
# This unit launches tinyproxy (a very light proxy).
1518 richard 1406
# The "sleep 2" is needed because the pid file isn't ready for systemd
1509 richard 1407
[Unit]
1408
Description=Tinyproxy Web Proxy Server
1409
After=network.target iptables.service
1410
 
1411
[Service]
1412
Type=forking
1518 richard 1413
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1414
ExecStartPre=/bin/sleep 2
1415
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1509 richard 1416
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1417
 
1418
[Install]
1419
WantedBy=multi-user.target
1420
EOF
1421
 
1485 richard 1422
} # end of tinyproxy
2519 rexy 1423
##############################################################################
1424
##                            function "ulogd"                              ##
1425
## - Ulog config for multi-log files                                        ##
1426
##############################################################################
1389 richard 1427
ulogd ()
476 richard 1428
{
1429
# Three instances of ulogd (three different logfiles)
1430
        [ -d /var/log/firewall ] || mkdir -p /var/log/firewall
478 richard 1431
        nl=1
1358 richard 1432
        for log_type in traceability ssh ext-access
478 richard 1433
        do
1365 richard 1434
                [ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1369 richard 1435
                [ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1375 richard 1436
                cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1704 richard 1437
                $SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
478 richard 1438
                cat << EOF >> /etc/ulogd-$log_type.conf
1452 richard 1439
[emu1]
478 richard 1440
file="/var/log/firewall/$log_type.log"
1441
sync=1
1442
EOF
1452 richard 1443
                $SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
478 richard 1444
                nl=`expr $nl + 1`
1445
        done
476 richard 1446
        chown -R root:apache /var/log/firewall
1447
        chmod 750 /var/log/firewall
1448
        chmod 640 /var/log/firewall/*
1389 richard 1449
}  # End of ulogd ()
476 richard 1450
 
1159 crox53 1451
 
1452
##########################################################
2519 rexy 1453
##                    Function "nfsen"                  ##
1454
## - install the nfsen grapher                          ##
1455
## - install the two plugins porttracker & surfmap      ##
1159 crox53 1456
##########################################################
1389 richard 1457
nfsen()
1 root 1458
{
2330 tom.houday 1459
        tar xzf ./conf/nfsen/nfsen-*.tar.gz -C /tmp/
1365 richard 1460
# Add PortTracker plugin
1534 richard 1461
        for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1395 richard 1462
        do
2330 tom.houday 1463
                [ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1395 richard 1464
        done
2330 tom.houday 1465
        $SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-*/contrib/PortTracker/PortTracker.pm
1365 richard 1466
# use of our conf file and init unit
2330 tom.houday 1467
        cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-*/etc/
1570 richard 1468
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1221 richard 1469
        DirTmp=$(pwd)
2330 tom.houday 1470
        cd /tmp/nfsen-*/
1570 richard 1471
        /usr/bin/perl install.pl etc/nfsen.conf
1472
        /usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1365 richard 1473
# Create RRD DB for porttracker (only in it still doesn't exist)
1570 richard 1474
        cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1475
        cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1395 richard 1476
        if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1477
        chmod -R 770 /var/log/netflow/porttracker
1372 richard 1478
# nfsen unit for systemd
2330 tom.houday 1479
        cat << EOF > /lib/systemd/system/nfsen.service
1372 richard 1480
#  This file is part of systemd.
1481
#
1482
#  systemd is free software; you can redistribute it and/or modify it
1483
#  under the terms of the GNU General Public License as published by
1484
#  the Free Software Foundation; either version 2 of the License, or
1485
#  (at your option) any later version.
1486
 
1487
# This unit launches nfsen (a Netflow grapher).
1488
[Unit]
1489
Description= NfSen init script
1490
After=network.target iptables.service
1491
 
1492
[Service]
1493
Type=oneshot
1494
RemainAfterExit=yes
1393 richard 1495
PIDFile=/var/run/nfsen/nfsen.pid
1496
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1497
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
2454 tom.houday 1498
ExecStart=/usr/bin/nfsen start
1372 richard 1499
ExecStop=/usr/bin/nfsen stop
1393 richard 1500
ExecReload=/usr/bin/nfsen restart
1372 richard 1501
TimeoutSec=0
1502
 
1503
[Install]
1504
WantedBy=multi-user.target
1505
EOF
1365 richard 1506
# Add the listen port to collect netflow packet (nfcapd)
2454 tom.houday 1507
        $SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm
1365 richard 1508
# expire delay for the profile "live"
1574 richard 1509
        /usr/bin/systemctl start nfsen
1393 richard 1510
        /bin/nfsen -m live -e 62d 2>/dev/null
2643 rexy 1511
# add SURFmap plugin (waiting for new technical solution)
1512
# see https://adullact.net/forum/forum.php?thread_id=319545&forum_id=1601&group_id=450
1513
#       cp $DIR_CONF/nfsen/SURFmap_*.tar.gz /tmp/
1514
#       cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1515
#       tar xzf /tmp/SURFmap_*.tar.gz -C /tmp/
1516
#       cd /tmp/
1517
#       /usr/bin/sh SURFmap/install.sh 
1518
# clear the installation
1519
#       rm -rf /tmp/SURFmap*
2657 tom.houday 1520
        rm -rf /tmp/nfsen-*
1521
        cd $DirTmp
2581 rexy 1522
        chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen /var/log/nfsen
1389 richard 1523
} # End of nfsen ()
1 root 1524
 
2552 rexy 1525
###########################################################
1526
##                     Function "vnstat"                 ##
1527
## - Initialization of Vnstat and vnstat phpFrontEnd     ##
1528
###########################################################
1541 richard 1529
vnstat ()
1530
{
2330 tom.houday 1531
        [ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
2589 rexy 1532
        $SED "s?^Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1533
    $SED "s?^DatabaseDir.*?DatabaseDir /var/log/vnstat?g" /etc/vnstat.conf
2330 tom.houday 1534
        [ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1535
        $SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?" $DIR_ACC/manager/stats/config.php
1536
        $SED "s?\$iface_title\['.*?\$iface_title\['$EXTIF'\] = \$title;?" $DIR_ACC/manager/stats/config.php
2589 rexy 1537
        /usr/bin/vnstat -i $EXTIF -u --force
2281 tom.houday 1538
} # End of vnstat
1539
 
2558 rexy 1540
##################################################################
1541
##                     Function "dnsmasq"                       ##
1542
## - creation of the conf files of the 4 intances of dnsmasq    ##
1543
## - creation of the file managing domain name (local & remote) ##
1544
##################################################################
1389 richard 1545
dnsmasq ()
219 jeremy 1546
{
1547
        [ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1472 richard 1548
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
2454 tom.houday 1549
        [ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1550
        cat << EOF > /etc/dnsmasq.conf
520 richard 1551
# Configuration file for "dnsmasq in forward mode"
2558 rexy 1552
conf-file=$DIR_DEST_ETC/alcasar-dns-name        # local & remote DNS domain name resolutions
259 richard 1553
listen-address=$PRIVATE_IP
1390 richard 1554
pid-file=/var/run/dnsmasq.pid
259 richard 1555
listen-address=127.0.0.1
286 richard 1556
no-dhcp-interface=$INTIF
1387 richard 1557
no-dhcp-interface=tun0
1558
no-dhcp-interface=lo
259 richard 1559
bind-interfaces
1721 richard 1560
cache-size=2048
259 richard 1561
domain-needed
1562
expand-hosts
1563
bogus-priv
1564
filterwin2k
1565
server=$DNS1
1566
server=$DNS2
1387 richard 1567
# DHCP service is configured. It will be enabled in "bypass" mode
1610 franck 1568
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1569
#dhcp-option=option:router,$PRIVATE_IP
1570
#dhcp-option=option:ntp-server,$PRIVATE_IP
259 richard 1571
 
1387 richard 1572
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
420 franck 1573
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
259 richard 1574
EOF
1356 richard 1575
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1928 richard 1576
        cat << EOF > /etc/dnsmasq-blacklist.conf
1390 richard 1577
# Configuration file for "dnsmasq with blacklist"
1873 richard 1578
# Add Toulouse University blacklist domains
2558 rexy 1579
conf-file=$DIR_DEST_ETC/alcasar-dns-name        # local & remote DNS domain name resolutions
1015 richard 1580
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1390 richard 1581
pid-file=/var/run/dnsmasq-blacklist.pid
498 richard 1582
listen-address=$PRIVATE_IP
1583
port=54
1584
no-dhcp-interface=$INTIF
1387 richard 1585
no-dhcp-interface=tun0
1472 richard 1586
no-dhcp-interface=lo
498 richard 1587
bind-interfaces
1721 richard 1588
cache-size=2048
498 richard 1589
domain-needed
1590
expand-hosts
1591
bogus-priv
1592
filterwin2k
2009 raphael.pi 1593
log-queries
1594
log-facility=/var/log/dnsmasq/dnsmasq-blacklist.log
498 richard 1595
server=$DNS1
1596
server=$DNS2
1597
EOF
1379 richard 1598
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1928 richard 1599
        cat << EOF > /etc/dnsmasq-whitelist.conf
1390 richard 1600
# Configuration file for "dnsmasq with whitelist"
1873 richard 1601
# ADD Toulouse university whitelist domains
2558 rexy 1602
conf-file=$DIR_DEST_ETC/alcasar-dns-name        # local & remote DNS domain name resolutions
1356 richard 1603
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1472 richard 1604
pid-file=/var/run/dnsmasq-whitelist.pid
1356 richard 1605
listen-address=$PRIVATE_IP
1606
port=55
1607
no-dhcp-interface=$INTIF
1387 richard 1608
no-dhcp-interface=tun0
1472 richard 1609
no-dhcp-interface=lo
1356 richard 1610
bind-interfaces
1721 richard 1611
cache-size=1024
1356 richard 1612
domain-needed
1613
expand-hosts
1614
bogus-priv
1615
filterwin2k
1867 raphael.pi 1616
ipset=/#/wl_ip_allowed                  # dynamicly add the resolv IP address in the Firewall rules
2454 tom.houday 1617
address=/#/$PRIVATE_IP                          # for Domain name without local resolution (WL)
1356 richard 1618
EOF
1472 richard 1619
# 4th dnsmasq listen on udp 56 ("blackhole")
1928 richard 1620
        cat << EOF > /etc/dnsmasq-blackhole.conf
1472 richard 1621
# Configuration file for "dnsmasq as a blackhole"
2558 rexy 1622
conf-file=$DIR_DEST_ETC/alcasar-dns-name        # local & remote DNS domain name resolutions
1472 richard 1623
address=/#/$PRIVATE_IP                          # redirect all on ALCASAR IP address
1624
pid-file=/var/run/dnsmasq-blackhole.pid
1625
listen-address=$PRIVATE_IP
1626
port=56
1627
no-dhcp-interface=$INTIF
1628
no-dhcp-interface=tun0
1629
no-dhcp-interface=lo
1630
bind-interfaces
1631
cache-size=256
1632
domain-needed
1633
expand-hosts
1634
bogus-priv
1635
filterwin2k
1636
EOF
2558 rexy 1637
# file managing domain name resolution (local & remote)
2651 tom.houday 1638
        cat << EOF > $DIR_DEST_ETC/alcasar-dns-name
2558 rexy 1639
# Vous pouvez définir ici votre nom de domain local ('localdomain' par défaut)
1640
# Here you can define your local domain name ('localdomain' by default)
2651 tom.houday 1641
local=/localdomain/
1642
domain=localdomain
1472 richard 1643
 
2558 rexy 1644
## Ajouter une ligne pour chaque nom de domaine géré par un autre seveur DNS
1645
## Add one line for each domain name managed by an other DNS server
1646
## server=/<your_domain>/<@IP_domain_server>
1647
## Exemple for an A.D. domain :  server=/Your.Domain.AD/110.120.100.100
1648
## Exemple for an other domain : server=/an_other_domain/10.20.30.40
1649
 
1650
## INFO : local hostnames are resolved in /etc/hosts file
1651
EOF
1652
 
1517 richard 1653
# the main instance should start after network and chilli (which create tun0)
1547 richard 1654
        [ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1517 richard 1655
        $SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1474 richard 1656
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1657
        for list in blacklist whitelist blackhole
1658
        do
1659
                cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1660
                $SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1661
                $SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1662
        done
308 richard 1663
} # End dnsmasq
1664
 
2552 rexy 1665
##########################################################
1666
##                      Function "BL"                   ##
1667
## - copy Toulouse BL                                   ##
1668
## - adapt this BL to ALCASAR architecture              ##
1669
##     - domain names for dnsmasq-bl & dnasmasq-wl      ##
1670
##     - URLs for E²guardian                            ##
1671
##     - IPs for NetFilter                              ##
1672
##########################################################
308 richard 1673
BL ()
1674
{
1930 richard 1675
        # copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
648 richard 1676
        rm -rf $DIR_DG/lists/blacklists
1930 richard 1677
        mkdir -p /tmp/blacklists
1938 richard 1678
        cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
1383 richard 1679
# creation of file for the rehabilited domains and urls
648 richard 1680
        [ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
673 richard 1681
        [ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
648 richard 1682
        touch $DIR_DG/lists/exceptionsitelist
1683
        touch $DIR_DG/lists/exceptionurllist
2521 armand.ito 1684
# On crée la configuration de base du filtrage de domaine et d'URL pour E2guardian
648 richard 1685
        cat <<EOF > $DIR_DG/lists/bannedurllist
2521 armand.ito 1686
# E2guardian filter config for ALCASAR
311 richard 1687
EOF
648 richard 1688
        cat <<EOF > $DIR_DG/lists/bannedsitelist
2521 armand.ito 1689
# E2guardian domain filter config for ALCASAR
311 richard 1690
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1691
#**
1692
# block all SSL and CONNECT tunnels
1693
**s
1694
# block all SSL and CONNECT tunnels specified only as an IP
1695
*ips
1696
# block all sites specified only by an IP
1697
*ip
1698
EOF
1852 raphael.pi 1699
# Add Bing to the safesearch url regext list (parental control)
878 richard 1700
        cat <<EOF >> $DIR_DG/lists/urlregexplist
1701
# Bing - add 'adlt=strict'
1702
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1703
EOF
1913 richard 1704
# change the google safesearch ("safe=strict" instead of "safe=vss")
1003 richard 1705
        $SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1925 richard 1706
# creation of the custom BL and WL categorie named "ossi" (for domain names & ip only)
1957 richard 1707
        mkdir -p $DIR_DG/lists/blacklists/ossi-bl
1708
        touch $DIR_DG/lists/blacklists/ossi-bl/domains
1709
        echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1710
        mkdir -p $DIR_DG/lists/blacklists/ossi-wl
1711
        touch $DIR_DG/lists/blacklists/ossi-wl/domains
1712
        echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
1927 richard 1713
# add custom ALCASAR BL files
1957 richard 1714
        for x in $(ls $DIR_BLACKLIST | grep -v "^blacklist")
1715
        do
1716
                mkdir $DIR_DG/lists/blacklists/ossi-bl-$x
1717
                cp $DIR_BLACKLIST/$x  $DIR_DG/lists/blacklists/ossi-bl-$x/domains
1718
                echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1719
        done
2521 armand.ito 1720
        chown -R e2guardian:apache $DIR_DG
1957 richard 1721
        chown -R root:apache $DIR_DEST_SHARE
1722
        chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1927 richard 1723
# adapt the Toulouse BL to ALCASAR architecture
1957 richard 1724
        $DIR_DEST_BIN/alcasar-bl.sh --adapt
1925 richard 1725
# enable the default categories
1957 richard 1726
        $DIR_DEST_BIN/alcasar-bl.sh --cat_choice
2560 rexy 1727
        rm -rf /tmp/blacklists
2314 richard 1728
} # End BL()
219 jeremy 1729
 
2552 rexy 1730
#######################################################
1731
##                  Function "cron"                  ##
1732
## - write all cron & anacron files                  ##
1733
#######################################################
1 root 1734
cron ()
1735
{
2640 rexy 1736
# 'crontab' with standard cron at midnight instead of 4:0 am (default)
1 root 1737
        [ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1738
        cat <<EOF > /etc/crontab
1828 richard 1739
SHELL=/usr/bin/bash
2640 rexy 1740
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1 root 1741
MAILTO=root
1742
HOME=/
1743
 
1744
# run-parts
1745
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1746
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1747
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1748
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1749
EOF
1750
        [ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1751
        cat <<EOF >> /etc/anacrontab
2454 tom.houday 1752
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1753
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1 root 1754
EOF
811 richard 1755
        cat <<EOF > /etc/cron.d/alcasar-mysql
2640 rexy 1756
# Verify, repair and export users database (every monday at 4:45 am)
1828 richard 1757
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mysql.sh --dump
2640 rexy 1758
# Remove users whose expiration date is exceeded for more more than 7 days (every Monday at 4:40 am)
1828 richard 1759
40 4 * * * root $DIR_DEST_BIN/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1 root 1760
EOF
952 franck 1761
        cat <<EOF > /etc/cron.d/alcasar-archive
2640 rexy 1762
# Archiving logs (traceability & users database) (every Monday at 5:35 am)
952 franck 1763
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1764
EOF
2454 tom.houday 1765
        cat <<EOF > /etc/cron.d/alcasar-ticket-clean
2640 rexy 1766
# Remove password files (created when importing users by CSV files) and user's PDF voucher (every hours at 30')
1566 richard 1767
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
168 franck 1768
EOF
2454 tom.houday 1769
        cat <<EOF > /etc/cron.d/alcasar-distrib-updates
2640 rexy 1770
# Update the system (everyday at 3:30 am)
762 franck 1771
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
722 franck 1772
EOF
2454 tom.houday 1773
        cat <<EOF > /etc/cron.d/alcasar-connections-stats
1808 richard 1774
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
2640 rexy 1775
# 'alcasar-tot_stats' : aggregate the daily connections of users and write it in the table 'totacct' (everyday at 1:01 pm)
1776
# 'alcasar-monthly_tot_stat' : aggregate the monthly connections of users and write it in table 'mtotacct' (everyday at 1h05 pm)
1777
# 'alcasar-truncate_raddact' : remove the user' session log older than 365 days (applying French law : "LCEN") (every month, the first at 01:10 pm)
1778
# 'alcasar-clean_radacct' : close the sessions openned for more than 30 days (every month, the first at 01:15 pm)
1779
# 'alcasar-activity_report.sh' : generate an activity report in PDF (every sunday at 5:35 pm)
1808 richard 1780
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1781
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1782
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1783
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
2009 raphael.pi 1784
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1 root 1785
EOF
2454 tom.houday 1786
        cat <<EOF > /etc/cron.d/alcasar-watchdog
2640 rexy 1787
# 'alcasar-watchdog.sh' : run the "watchdog" (every 10')
1788
# 'alcasar-flush_ipset_wl.sh' : empty the IPSET of the whitelisted IP loaded dynamically with dnsmasq-whitelist hook (every sunday at 0:05 am)
1789
# 'alcasar-watchdog-hl.sh' : (optionnaly) remove the IP 0.0.0.0 from chilli cache memory
2395 tom.houday 1790
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1905 raphael.pi 1791
 
2228 franck 1792
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1 root 1793
EOF
2454 tom.houday 1794
        cat <<EOF > /etc/cron.d/alcasar-daemon-watchdog
2640 rexy 1795
# start dead daemons (after boot process and every 18')
1851 franck 1796
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
808 franck 1797
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1798
EOF
2454 tom.houday 1799
        cat <<EOF > /etc/cron.d/alcasar-rsync-bl
2640 rexy 1800
# Automatic update the BL via rsync (every 12 hours). The enabled categories are listed in '/usr/local/etc/update_cat.conf' (no sync if empty).
1905 raphael.pi 1801
 
1874 raphael.pi 1802
EOF
2304 tom.houday 1803
        cat <<EOF > /etc/cron.d/alcasar-letsencrypt
2640 rexy 1804
# Automatic renew the Let's Encrypt certificate (daily --> see "cron.daily")
2304 tom.houday 1805
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1806
EOF
1807
 
1808 richard 1808
# removing the users crons
522 richard 1809
        rm -f /var/spool/cron/*
2314 richard 1810
} # End cron()
1 root 1811
 
2552 rexy 1812
######################################################################
1813
##                      Fonction "Fail2Ban"                         ##
1814
##- Adapt conf file to ALCASAR                                      ##
1815
##- Secure items : DDOS, SSH-Brute-Force, Intercept.php Brute-Force ##
1816
######################################################################
1163 crox53 1817
fail2ban()
1818
{
2243 tom.houday 1819
        /usr/bin/sh $DIR_CONF/fail2ban.sh
1474 richard 1820
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1192 crox53 1821
        [ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1489 richard 1822
        [ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1165 crox53 1823
        chmod 644 /var/log/fail2ban.log
1489 richard 1824
        chmod 644 /var/Save/security/watchdog.log
1418 richard 1825
        /usr/bin/touch /var/log/auth.log
1515 richard 1826
# fail2ban unit
1827
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1828
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1829
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
2488 lucas.echa 1830
$SED '/After=*/c After=syslog.target network.target lighttpd.service' /usr/lib/systemd/system/fail2ban.service
2314 richard 1831
} # End fail2ban()
1163 crox53 1832
 
2552 rexy 1833
#########################################################
1834
##                   Fonction "gammu_smsd"             ##
1835
## - Creating of SMS management database               ##
1836
## - Write the gammu a gammu_smsd conf files           ##
1837
#########################################################
1376 richard 1838
gammu_smsd()
1839
{
2601 tom.houday 1840
# Create 'gammu' system user
1841
        groupadd -f gammu_smsd
1842
        useradd --system -g gammu_smsd -s /bin/false -c "system user for gammu_smsd" gammu_smsd
1843
        usermod -a -G dialout gammu_smsd
1844
 
1845
# Create 'gammu' database
1846
        MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1847
        $MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU; GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd'; FLUSH PRIVILEGES;"
1376 richard 1848
# Add a gammu database structure
1800 richard 1849
        mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1376 richard 1850
 
2552 rexy 1851
# Config file for the gammu_smsd daemon & gammu (ttyUSB0 as default com port)
2601 tom.houday 1852
        cat << EOF > /etc/gammurc
2552 rexy 1853
[gammu]
1854
device = /dev/ttyUSB0
1855
connection = at115200
1856
EOF
1857
 
2601 tom.houday 1858
        cat << EOF > /etc/gammu_smsd_conf
1376 richard 1859
[gammu]
1860
port = /dev/ttyUSB0
1861
connection = at115200
1862
 
1863
[smsd]
1864
PIN = 1234
1865
logfile = /var/log/gammu-smsd/gammu-smsd.log
1866
logformat = textall
1867
debuglevel = 0
1868
 
1869
service = sql
1870
driver = native_mysql
1871
user = $DB_USER
1872
password = $radiuspwd
1873
pc = localhost
1874
database = $DB_GAMMU
1875
 
2631 rexy 1876
RunOnReceive = sudo $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1376 richard 1877
 
1878
StatusFrequency = 30
1380 richard 1879
;LoopSleep = 2
1376 richard 1880
 
1881
;ResetFrequency = 300
1882
;HardResetFrequency = 120
1883
 
2454 tom.houday 1884
CheckSecurity = 1
1376 richard 1885
CheckSignal = 1
1886
CheckBattery = 0
1887
EOF
2601 tom.houday 1888
        chmod 755 /etc/gammu_smsd_conf /etc/gammurc
1376 richard 1889
 
2601 tom.houday 1890
# Create the systemd unit
1891
        cat << EOF > /lib/systemd/system/gammu-smsd.service
1892
[Unit]
1893
Description=SMS daemon for Gammu
1894
Documentation=man:gammu-smsd(1)
1895
After=network.target mysql.service
1376 richard 1896
 
2601 tom.houday 1897
[Service]
1898
Type=forking
1899
ExecStart=/usr/bin/gammu-smsd --config /etc/gammu_smsd_conf --user=gammu_smsd --group=gammu_smsd --pid=/var/run/gammu-smsd.pid --daemon
1900
ExecReload=/bin/kill -HUP $MAINPID
1901
ExecStopPost=/bin/rm -f /var/run/gammu-smsd.pid
1902
PIDFile=/var/run/gammu-smsd.pid
1903
 
1904
[Install]
1905
WantedBy=multi-user.target
1906
EOF
1907
 
2314 richard 1908
# Log folder for gammu-smsd
2601 tom.houday 1909
        [ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1910
        chmod 755 /var/log/gammu-smsd
1376 richard 1911
 
2552 rexy 1912
# Udev rule for Modeswitch (switch from "mass_storage" mode to "ttyUSB" modem) needed with some Huawei MODEM (idVendor: 12d1)
1913
# normally not needed now since modeswitch is managed by udev (see Mageia RPM)
2542 rexy 1914
#cat << EOF > /lib/udev/rules.d/66-huawei.rules
1915
#KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
1916
#EOF
2552 rexy 1917
# Udev rule for fixing the enumeration of ttyUSB port on some MODEM (when they switch randomly the order of their ports at boot time)
1918
# example : http://hintshop.ludvig.co.nz/show/persistent-names-usb-serial-devices/
1919
 
2314 richard 1920
} # End gammu_smsd()
1376 richard 1921
 
2552 rexy 1922
############################################################
1923
##                 Fonction "msec"                        ##
1924
## - Apply the "fileserver" security level                ##
1925
## - remove the "system request" for rebboting            ##
1926
## - Fix several file permissions                         ##
1927
############################################################
2202 richard 1928
msec()
1929
{
1930
 
1931
# Apply fileserver security level
2211 richard 1932
[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
1933
echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
2202 richard 1934
 
2203 richard 1935
# Set permissions monitoring and enforcement
2202 richard 1936
cat <<EOF > /etc/security/msec/perm.local
1937
/var/log/firefwall/                     root.apache     750
1938
/var/log/firewall/*                     root.apache     640
1939
/etc/security/msec/perm.local           root.root       640
1940
/etc/security/msec/level.local          root.root       640
1941
/etc/freeradius-web                     root.apache     750
1942
/etc/freeradius-web/admin.conf          root.apache     640
2420 richard 1943
/etc/raddb/client.conf                  radius.radius   640
1944
/etc/raddb/radius.conf                  radius.radius   640
1945
/etc/raddb/mods-available/ldap          radius.apache   660
2202 richard 1946
/etc/raddb/sites-available/alcasar      radius.apache   660
1947
/etc/pki/*                              root.apache     750
2211 richard 1948
/var/log/netflow/porttracker            root.apache     770
1949
/var/log/netflow/porttracker/*          root.apache     660
2202 richard 1950
EOF
2454 tom.houday 1951
# apply now hourly & daily checks
2202 richard 1952
/usr/sbin/msec
2211 richard 1953
/etc/cron.weekly/msec
2202 richard 1954
 
2314 richard 1955
} # End msec()
2202 richard 1956
 
2304 tom.houday 1957
 
2202 richard 1958
##################################################################
2552 rexy 1959
##                   Fonction "letsencrypt"                     ##
1960
## - Install Let's Encrypt client                               ##
1961
## - Prepare Let's Encrypt ALCASAR configuration file           ##
2304 tom.houday 1962
##################################################################
1963
letsencrypt()
1964
{
1965
        echo "Installing Let's Encrypt client..."
1966
 
2586 tom.houday 1967
        # Remove potential old installers
1968
        rm -rf /tmp/acme.sh-*
1969
 
2304 tom.houday 1970
        # Extract acme.sh
1971
        tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
1972
 
1973
        pwdInstall=$(pwd)
1974
        cd /tmp/acme.sh-*
1975
 
1976
        acmesh_installDir="/opt/acme.sh"
1977
        acmesh_confDir="/usr/local/etc/letsencrypt"
2354 tom.houday 1978
        acmesh_userAgent="ALCASAR"
2304 tom.houday 1979
 
1980
        # Install acme.sh
1981
        ./acme.sh --install \
1982
                --home $acmesh_installDir \
1983
                --config-home $acmesh_confDir/data \
1984
                --certhome $acmesh_confDir/certs \
1985
                --accountkey $acmesh_confDir/ca/account.key \
1986
                --accountconf $acmesh_confDir/data/account.conf \
1987
                --useragent $acmesh_userAgent \
2308 tom.houday 1988
                --nocron \
1989
                > /dev/null
2304 tom.houday 1990
 
1991
        if [ $? -ne 0 ]; then
1992
                echo "Error during installation of Let's Encrypt client (acme.sh)."
1993
        fi
1994
 
1995
        # Create configuration file
1996
        cat <<EOF > /usr/local/etc/alcasar-letsencrypt
1997
email=
1998
dateIssueRequest=
1999
domainRequest=
2000
challenge=
2001
dateIssued=
2002
dnsapi=
2003
dateNextRenewal=
2004
EOF
2005
 
2006
        cd $pwdInstall
2007
        rm -rf /tmp/acme.sh-*
2008
 
2009
} # END letsencrypt()
2010
 
2011
##################################################################
2552 rexy 2012
##                    Fonction "post_install"                   ##
2013
## - Modifying banners (locals et ssh) & prompts                ##
2014
## - SSH config                                                 ##
2015
## - sudoers config & files security                            ##
2016
## - log rotate & ANSSI security parameters                     ##
2017
## - Apply former conf in case of an update                     ##
2018
##################################################################
1 root 2019
post_install()
2020
{
2195 richard 2021
# change the SSH banner
2022
        cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
2023
        echo " V$VERSION" >> /etc/ssh/alcasar-banner-ssh
5 franck 2024
        chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1 root 2025
        [ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2026
        $SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2027
        $SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
793 richard 2028
# postfix banner anonymisation
2029
        $SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1841 richard 2030
        chown -R postfix:postfix /var/lib/postfix
2195 richard 2031
# sshd liste on EXTIF & INTIF
1548 richard 2032
        $SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2195 richard 2033
# sshd authorized certificate for root login
1696 franck 2034
        $SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2195 richard 2035
# ALCASAR conf file
2327 richard 2036
        echo "HTTPS_LOGIN=on" >> $CONF_FILE
2409 tom.houday 2037
        echo "HTTPS_CHILLI=off" >> $CONF_FILE
1839 richard 2038
        echo "SSH=on" >> $CONF_FILE
1631 richard 2039
        echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
628 richard 2040
        echo "LDAP=off" >> $CONF_FILE
2447 richard 2041
        echo "LDAP_SERVER=127.0.0.1" >> $CONF_FILE
2461 richard 2042
        echo "LDAP_BASE=cn=Users;dc=serverad;dc=localdomain" >> $CONF_FILE
2454 tom.houday 2043
        echo "LDAP_UID=sAMAccountName" >> $CONF_FILE
2044
        echo "LDAP_FILTER=" >> $CONF_FILE
2045
        echo "LDAP_USER=alcasar" >> $CONF_FILE
2046
        echo "LDAP_PASSWORD=" >> $CONF_FILE
2600 tom.houday 2047
        echo "SMS=off" >> $CONF_FILE
2048
        echo "SMS_NUM=" >> $CONF_FILE
2454 tom.houday 2049
        echo "MULTIWAN=off" >> $CONF_FILE
1078 franck 2050
        echo "FAILOVER=30" >> $CONF_FILE
2051
        echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1336 richard 2052
        echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
2053
        echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
2195 richard 2054
# Prompt customisation (colors)
1 root 2055
        [ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
5 franck 2056
        cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
630 franck 2057
        $SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2195 richard 2058
# sudoers configuration for "apache" & "sysadmin"
1 root 2059
        [ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
5 franck 2060
        cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
629 richard 2061
        $SED "s?^Host_Alias.*?Host_Alias        LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost             #réseau de l'organisme?g" /etc/sudoers
1543 richard 2062
# Modify some logrotate files (gammu, ulogd)
1 root 2063
        cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2064
        chmod 644 /etc/logrotate.d/*
2195 richard 2065
# Log compression
706 franck 2066
        $SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2067
# actualisation des fichiers logs compressés
2521 armand.ito 2068
        for dir in firewall e2guardian lighttpd
706 franck 2069
        do
2454 tom.houday 2070
                find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
706 franck 2071
        done
1221 richard 2072
# create the alcasar-load_balancing unit
2073
        cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1184 crox53 2074
#  This file is part of systemd.
2075
#
2076
#  systemd is free software; you can redistribute it and/or modify it
2077
#  under the terms of the GNU General Public License as published by
2078
#  the Free Software Foundation; either version 2 of the License, or
2079
#  (at your option) any later version.
2080
 
2081
# This unit lauches alcasar-load-balancing.sh script.
2082
[Unit]
2083
Description=alcasar-load_balancing.sh execution
2084
After=network.target iptables.service
2085
 
2086
[Service]
2087
Type=oneshot
2088
RemainAfterExit=yes
1828 richard 2089
ExecStart=$DIR_DEST_BIN/alcasar-load_balancing.sh start
2090
ExecStop=$DIR_DEST_BIN/alcasar-load_balancing.sh stop
1184 crox53 2091
TimeoutSec=0
2092
SysVStartPriority=99
2093
 
2094
[Install]
2095
WantedBy=multi-user.target
1157 stephane 2096
EOF
2601 tom.houday 2097
        /usr/bin/systemctl daemon-reload
1221 richard 2098
# processes launched at boot time (Systemctl)
2521 armand.ito 2099
        for i in alcasar-load_balancing mysqld lighttpd php-fpm ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen e2guardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat sshd
1221 richard 2100
        do
1574 richard 2101
                /usr/bin/systemctl -q enable $i.service
1221 richard 2102
        done
2454 tom.houday 2103
 
1452 richard 2104
# disable processes at boot time (Systemctl)
2416 richard 2105
        for i in ulogd gpm
1452 richard 2106
        do
1574 richard 2107
                /usr/bin/systemctl -q disable $i.service
1452 richard 2108
        done
2454 tom.houday 2109
 
1221 richard 2110
# Apply French Security Agency (ANSSI) rules
1362 richard 2111
# ignore ICMP broadcast (smurf attack)
2112
        echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2113
# ignore ICMP errors bogus
2114
        echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2115
# remove ICMP redirects responces
2116
        echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2117
        echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2118
# enable SYN Cookies (Syn flood attacks)
2119
        echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2120
# enable kernel antispoofing
2121
        echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2122
# ignore source routing
2123
        echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2124
# set conntrack timer to 1h (3600s) instead of 5 weeks
2125
        echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2454 tom.houday 2126
# disable log_martians (ALCASAR is often installed between two private network addresses)
1363 richard 2127
        echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1778 richard 2128
# disable iptables_helpers
2129
        echo "net.netfilter.nf_conntrack_helper = 0" >> /etc