Subversion Repositories ALCASAR

Rev

Rev 1474 | Rev 1482 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1474 Rev 1478
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 1474 2014-11-03 22:55:09Z richard $ 
2
#  $Id: alcasar.sh 1478 2014-11-04 22:28:12Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
22
#
22
#
23
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, havp, libclamav, Ulog, fail2ban, NFsen and NFdump
23
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, havp, libclamav, Ulog, fail2ban, NFsen and NFdump
24
 
24
 
25
# Options :
25
# Options :
26
#       -i or --install
26
#       -i or --install
27
#       -u or --uninstall
27
#       -u or --uninstall
28
 
28
 
29
# Functions :
29
# Functions :
30
#	testing			: connectivity tests, free space test and mageia version test
30
#	testing			: connectivity tests, free space test and mageia version test
31
#	init			: Installation of RPM and scripts
31
#	init			: Installation of RPM and scripts
32
#	network			: Network parameters
32
#	network			: Network parameters
33
#	ACC			: ALCASAR Control Center installation
33
#	ACC			: ALCASAR Control Center installation
34
#	CA			: Certification Authority initialization
34
#	CA			: Certification Authority initialization
35
#	init_db			: Initilization of radius database managed with MariaDB
35
#	init_db			: Initilization of radius database managed with MariaDB
36
#	radius			: FreeRadius initialisation
36
#	radius			: FreeRadius initialisation
37
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
37
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
38
#	chilli			: coovachilli initialisation (+authentication page)
38
#	chilli			: coovachilli initialisation (+authentication page)
39
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
40
#	antivirus		: HAVP + libclamav configuration
40
#	antivirus		: HAVP + libclamav configuration
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
44
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	cron			: Logs export + watchdog + connexion statistics
45
#	cron			: Logs export + watchdog + connexion statistics
46
#	fail2ban		: Fail2ban IDS installation and configuration
46
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
47
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	post_install		: Security, log rotation, etc.
48
#	post_install		: Security, log rotation, etc.
49
 
49
 
50
DATE=`date '+%d %B %Y - %Hh%M'`
50
DATE=`date '+%d %B %Y - %Hh%M'`
51
DATE_SHORT=`date '+%d/%m/%Y'`
51
DATE_SHORT=`date '+%d/%m/%Y'`
52
Lang=`echo $LANG|cut -c 1-2`
52
Lang=`echo $LANG|cut -c 1-2`
53
mode="install"
53
mode="install"
54
# ******* Files parameters - paramètres fichiers *********
54
# ******* Files parameters - paramètres fichiers *********
55
DIR_INSTALL=`pwd`				# current directory 
55
DIR_INSTALL=`pwd`				# current directory 
56
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
56
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
57
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
57
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
58
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
58
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
59
DIR_WEB="/var/www/html"				# directory of APACHE
59
DIR_WEB="/var/www/html"				# directory of APACHE
60
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
60
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
61
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
61
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
62
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
62
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
63
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
63
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
64
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
64
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
65
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
65
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
66
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
66
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
67
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
67
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
68
# ******* DBMS parameters - paramètres SGBD ********
68
# ******* DBMS parameters - paramètres SGBD ********
69
DB_RADIUS="radius"				# database name used by FreeRadius server
69
DB_RADIUS="radius"				# database name used by FreeRadius server
70
DB_USER="radius"				# user name allows to request the users database
70
DB_USER="radius"				# user name allows to request the users database
71
DB_GAMMU="gammu"				# database name used by Gammu-smsd
71
DB_GAMMU="gammu"				# database name used by Gammu-smsd
72
# ******* Network parameters - paramètres réseau *******
72
# ******* Network parameters - paramètres réseau *******
73
HOSTNAME="alcasar"				# default hostname
73
HOSTNAME="alcasar"				# default hostname
74
DOMAIN="localdomain"				# default local domain
74
DOMAIN="localdomain"				# default local domain
75
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
75
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
76
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF"|cut -d" " -f2|tr -d ":"`		# INTIF is connected to the consultation network
76
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF"|cut -d" " -f2|tr -d ":"`		# INTIF is connected to the consultation network
77
MTU="1500"
77
MTU="1500"
78
ETHTOOL_OPTS='"autoneg off speed 100 duplex full"'
-
 
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
78
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
80
# ****** Paths - chemin des commandes *******
79
# ****** Paths - chemin des commandes *******
81
SED="/bin/sed -i"
80
SED="/bin/sed -i"
82
# ****************** End of global parameters *********************
81
# ****************** End of global parameters *********************
83
 
82
 
84
license ()
83
license ()
85
{
84
{
86
	if [ $Lang == "fr" ]
85
	if [ $Lang == "fr" ]
87
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
86
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
88
	else cat $DIR_INSTALL/gpl-3.0.txt | more
87
	else cat $DIR_INSTALL/gpl-3.0.txt | more
89
	fi
88
	fi
90
	echo "Taper sur Entrée pour continuer !"
89
	echo "Taper sur Entrée pour continuer !"
91
	echo "Enter to continue."
90
	echo "Enter to continue."
92
	read a
91
	read a
93
}
92
}
94
 
93
 
95
header_install ()
94
header_install ()
96
{
95
{
97
	clear
96
	clear
98
	echo "-----------------------------------------------------------------------------"
97
	echo "-----------------------------------------------------------------------------"
99
	echo "                     ALCASAR V$VERSION Installation"
98
	echo "                     ALCASAR V$VERSION Installation"
100
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
99
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
101
	echo "-----------------------------------------------------------------------------"
100
	echo "-----------------------------------------------------------------------------"
102
}
101
}
103
 
102
 
104
##################################################################
103
##################################################################
105
##			Function "testing"			##
104
##			Function "testing"			##
106
## - Test of Mageia version					##
105
## - Test of Mageia version					##
107
## - Test of free space on /var  (>10G)				##
106
## - Test of free space on /var  (>10G)				##
108
## - Test of Internet access					##
107
## - Test of Internet access					##
109
##################################################################
108
##################################################################
110
testing ()
109
testing ()
111
{
110
{
112
# Test if ALCASAR is already installed
111
# Test if ALCASAR is already installed
113
	if [ -e $CONF_FILE ]
112
	if [ -e $CONF_FILE ]
114
	then
113
	then
115
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
114
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
116
		if [ $Lang == "fr" ]
115
		if [ $Lang == "fr" ]
117
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
116
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
118
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
117
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
119
		fi
118
		fi
120
		response=0
119
		response=0
121
		PTN='^[oOnNyY]$'
120
		PTN='^[oOnNyY]$'
122
		until [[ $(expr $response : $PTN) -gt 0 ]]
121
		until [[ $(expr $response : $PTN) -gt 0 ]]
123
		do
122
		do
124
			if [ $Lang == "fr" ]
123
			if [ $Lang == "fr" ]
125
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
124
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
126
				else echo -n "Do you want to update (Y/n)?";
125
				else echo -n "Do you want to update (Y/n)?";
127
			 fi
126
			 fi
128
			read response
127
			read response
129
		done
128
		done
130
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
129
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
131
		then
130
		then
132
			rm -f /tmp/alcasar-conf*
131
			rm -f /tmp/alcasar-conf*
133
		else
132
		else
134
# Create a backup of running importants files
133
# Create a backup of running importants files
135
			$DIR_SCRIPTS/alcasar-conf.sh --create
134
			$DIR_SCRIPTS/alcasar-conf.sh --create
136
			mode="update"
135
			mode="update"
137
		fi
136
		fi
138
	else
137
	else
139
		if [ ! -d /var/log/netflow/porttracker ]
138
		if [ ! -d /var/log/netflow/porttracker ]
140
			then
139
			then
141
# Test of free space on /var
140
# Test of free space on /var
142
			free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
141
			free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
143
			if [ $free_space -lt 10 ]
142
			if [ $free_space -lt 10 ]
144
				then
143
				then
145
				if [ $Lang == "fr" ]
144
				if [ $Lang == "fr" ]
146
					then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
145
					then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
147
					else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
146
					else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
148
				fi
147
				fi
149
			exit 0
148
			exit 0
150
			fi
149
			fi
151
		fi
150
		fi
152
# Test of Mageia version
151
# Test of Mageia version
153
# extract the current Mageia version and hardware architecture (i586 ou X64)
152
# extract the current Mageia version and hardware architecture (i586 ou X64)
154
		fic=`cat /etc/product.id`
153
		fic=`cat /etc/product.id`
155
		unknown_os=0
154
		unknown_os=0
156
		old="$IFS"
155
		old="$IFS"
157
		IFS=","
156
		IFS=","
158
		set $fic
157
		set $fic
159
		for i in $*
158
		for i in $*
160
		do
159
		do
161
			if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
160
			if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
162
				then 
161
				then 
163
				DISTRIBUTION=`echo $i|cut -d"=" -f2`
162
				DISTRIBUTION=`echo $i|cut -d"=" -f2`
164
				unknown_os=`expr $unknown_os + 1`
163
				unknown_os=`expr $unknown_os + 1`
165
			fi
164
			fi
166
			if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
165
			if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
167
				then 
166
				then 
168
				CURRENT_VERSION=`echo $i|cut -d"=" -f2`
167
				CURRENT_VERSION=`echo $i|cut -d"=" -f2`
169
				unknown_os=`expr $unknown_os + 1`
168
				unknown_os=`expr $unknown_os + 1`
170
			fi
169
			fi
171
			if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
170
			if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
172
				then 
171
				then 
173
				ARCH=`echo $i|cut -d"=" -f2`
172
				ARCH=`echo $i|cut -d"=" -f2`
174
				unknown_os=`expr $unknown_os + 1`
173
				unknown_os=`expr $unknown_os + 1`
175
			fi
174
			fi
176
		done
175
		done
177
		IFS="$old"
176
		IFS="$old"
178
		if [[ ( $unknown_os != 3 || "$DISTRIBUTION" != "Mageia" ) && ( "$CURRENT_VERSION" != "4" ) ]]
177
		if [[ ( $unknown_os != 3 || "$DISTRIBUTION" != "Mageia" ) && ( "$CURRENT_VERSION" != "4" ) ]]
179
			then
178
			then
180
			if [ $Lang == "fr" ]
179
			if [ $Lang == "fr" ]
181
				then	
180
				then	
182
				echo "L'installation ou la mise @ jour d'ALCASAR ne peut pas être réalisée."
181
				echo "L'installation ou la mise @ jour d'ALCASAR ne peut pas être réalisée."
183
				echo "Le système d'exploitation doit être remplacé (Mageia4)"
182
				echo "Le système d'exploitation doit être remplacé (Mageia4)"
184
			else
183
			else
185
				echo "The automatic update of ALCASAR can't be performed."
184
				echo "The automatic update of ALCASAR can't be performed."
186
				echo "The OS must be replaced (Mageia4)"
185
				echo "The OS must be replaced (Mageia4)"
187
			fi
186
			fi
188
			if [ -e /tmp/alcasar-conf.tar.gz ]
187
			if [ -e /tmp/alcasar-conf.tar.gz ]
189
				then
188
				then
190
				echo
189
				echo
191
				if [ $Lang == "fr" ]
190
				if [ $Lang == "fr" ]
192
					then	
191
					then	
193
					echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
192
					echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
194
					echo "2 - Installez Linux-Mageia4 (cf. doc d'installation)"
193
					echo "2 - Installez Linux-Mageia4 (cf. doc d'installation)"
195
					echo "3 - copiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
194
					echo "3 - copiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
196
				else
195
				else
197
					echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
196
					echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
198
					echo "2 - Install Linux-Mageia4 (cf. installation doc)"
197
					echo "2 - Install Linux-Mageia4 (cf. installation doc)"
199
					echo "3 - Copy the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
198
					echo "3 - Copy the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
200
				fi
199
				fi
201
			fi
200
			fi
202
			exit 0
201
			exit 0
203
		fi
202
		fi
204
	fi
203
	fi
205
	if [ $Lang == "fr" ]
204
	if [ $Lang == "fr" ]
206
		then echo -n "Tests des paramètres réseau : "
205
		then echo -n "Tests des paramètres réseau : "
207
		else echo -n "Network parameters tests : "
206
		else echo -n "Network parameters tests : "
208
	fi
207
	fi
209
 
208
 
210
# Test of Ethernet links state
209
# Test of Ethernet links state
211
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
210
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
212
	for i in $DOWN_IF
211
	for i in $DOWN_IF
213
	do
212
	do
214
		if [ $Lang == "fr" ]
213
		if [ $Lang == "fr" ]
215
		then 
214
		then 
216
			echo "Échec"
215
			echo "Échec"
217
			echo "Le lien réseau de la carte $i n'est pas actif."
216
			echo "Le lien réseau de la carte $i n'est pas actif."
218
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
217
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
219
		else
218
		else
220
			echo "Failed"
219
			echo "Failed"
221
			echo "The link state of $i interface is down."
220
			echo "The link state of $i interface is down."
222
			echo "Make sure that this network card is connected to a switch or an A.P."
221
			echo "Make sure that this network card is connected to a switch or an A.P."
223
		fi
222
		fi
224
		exit 0
223
		exit 0
225
	done
224
	done
226
	echo -n "."
225
	echo -n "."
227
 
226
 
228
# Test EXTIF config files
227
# Test EXTIF config files
229
	PUBLIC_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
228
	PUBLIC_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
230
	PUBLIC_GATEWAY=`grep GATEWAY /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
229
	PUBLIC_GATEWAY=`grep GATEWAY /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
231
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
230
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
232
	then
231
	then
233
		if [ $Lang == "fr" ]
232
		if [ $Lang == "fr" ]
234
		then 
233
		then 
235
			echo "Échec"
234
			echo "Échec"
236
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
235
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
237
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
236
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
238
			echo "Appliquez les changements : 'systemctl restart network'"
237
			echo "Appliquez les changements : 'systemctl restart network'"
239
		else
238
		else
240
			echo "Failed"
239
			echo "Failed"
241
			echo "The Internet connected network card ($EXTIF) isn't well configured."
240
			echo "The Internet connected network card ($EXTIF) isn't well configured."
242
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
241
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
243
			echo "Apply the new configuration 'systemctl restart network'"
242
			echo "Apply the new configuration 'systemctl restart network'"
244
		fi
243
		fi
245
		echo "DEVICE=$EXTIF"
244
		echo "DEVICE=$EXTIF"
246
		echo "IPADDR="
245
		echo "IPADDR="
247
		echo "NETMASK="
246
		echo "NETMASK="
248
		echo "GATEWAY="
247
		echo "GATEWAY="
249
		echo "DNS1="
248
		echo "DNS1="
250
		echo "DNS2="
249
		echo "DNS2="
251
		echo "ONBOOT=yes"
250
		echo "ONBOOT=yes"
252
		exit 0
251
		exit 0
253
	fi
252
	fi
254
	echo -n "."
253
	echo -n "."
255
 
254
 
256
# Test if router is alive (Box FAI)
255
# Test if router is alive (Box FAI)
257
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
256
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
258
		if [ $Lang == "fr" ]
257
		if [ $Lang == "fr" ]
259
		then 
258
		then 
260
			echo "Échec"
259
			echo "Échec"
261
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
260
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
262
			echo "Réglez ce problème puis relancez ce script."
261
			echo "Réglez ce problème puis relancez ce script."
263
		else
262
		else
264
			echo "Failed"
263
			echo "Failed"
265
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
264
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
266
			echo "Resolv this problem, then restart this script."
265
			echo "Resolv this problem, then restart this script."
267
		fi
266
		fi
268
		exit 0
267
		exit 0
269
	fi
268
	fi
270
	echo -n "."
269
	echo -n "."
271
# On teste le lien vers le routeur par defaut
270
# On teste le lien vers le routeur par defaut
272
	IP_GW=`ip route list|grep ^default|cut -d" " -f3`
271
	IP_GW=`ip route list|grep ^default|cut -d" " -f3`
273
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $IP_GW|grep response|cut -d" " -f2`
272
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $IP_GW|grep response|cut -d" " -f2`
274
	if [ $(expr $arp_reply) -eq 0 ]
273
	if [ $(expr $arp_reply) -eq 0 ]
275
	       	then
274
	       	then
276
		if [ $Lang == "fr" ]
275
		if [ $Lang == "fr" ]
277
		then 
276
		then 
278
			echo "Échec"
277
			echo "Échec"
279
			echo "Le routeur de site ou la Box Internet ($IP_GW) ne répond pas."
278
			echo "Le routeur de site ou la Box Internet ($IP_GW) ne répond pas."
280
			echo "Réglez ce problème puis relancez ce script."
279
			echo "Réglez ce problème puis relancez ce script."
281
		else
280
		else
282
			echo "Failed"
281
			echo "Failed"
283
			echo "The Internet gateway doesn't answered"
282
			echo "The Internet gateway doesn't answered"
284
			echo "Resolv this problem, then restart this script."
283
			echo "Resolv this problem, then restart this script."
285
		fi
284
		fi
286
		exit 0
285
		exit 0
287
	fi
286
	fi
288
	echo -n "."
287
	echo -n "."
289
# On teste la connectivité Internet
288
# On teste la connectivité Internet
290
	rm -rf /tmp/con_ok.html
289
	rm -rf /tmp/con_ok.html
291
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
290
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
292
	if [ ! -e /tmp/con_ok.html ]
291
	if [ ! -e /tmp/con_ok.html ]
293
	then
292
	then
294
		if [ $Lang == "fr" ]
293
		if [ $Lang == "fr" ]
295
		then 
294
		then 
296
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
295
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
297
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
296
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
298
			echo "Vérifiez la validité des adresses IP des DNS."
297
			echo "Vérifiez la validité des adresses IP des DNS."
299
		else
298
		else
300
			echo "The Internet connection try failed (google.fr)."
299
			echo "The Internet connection try failed (google.fr)."
301
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
300
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
302
			echo "Verify the DNS IP addresses"
301
			echo "Verify the DNS IP addresses"
303
		fi
302
		fi
304
		exit 0
303
		exit 0
305
	fi
304
	fi
306
	rm -rf /tmp/con_ok.html
305
	rm -rf /tmp/con_ok.html
307
	echo ". : ok"
306
	echo ". : ok"
308
} # end of testing ()
307
} # end of testing ()
309
 
308
 
310
##################################################################
309
##################################################################
311
##			Function "init"				##
310
##			Function "init"				##
312
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
311
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
313
## - Installation et modification des scripts du portail	##
312
## - Installation et modification des scripts du portail	##
314
##################################################################
313
##################################################################
315
init ()
314
init ()
316
{
315
{
317
	if [ "$mode" != "update" ]
316
	if [ "$mode" != "update" ]
318
	then
317
	then
319
# On affecte le nom d'organisme
318
# On affecte le nom d'organisme
320
		header_install
319
		header_install
321
		ORGANISME=!
320
		ORGANISME=!
322
		PTN='^[a-zA-Z0-9-]*$'
321
		PTN='^[a-zA-Z0-9-]*$'
323
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
322
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
324
                do
323
                do
325
			if [ $Lang == "fr" ]
324
			if [ $Lang == "fr" ]
326
			       	then echo -n "Entrez le nom de votre organisme : "
325
			       	then echo -n "Entrez le nom de votre organisme : "
327
				else echo -n "Enter the name of your organism : "
326
				else echo -n "Enter the name of your organism : "
328
			fi
327
			fi
329
			read ORGANISME
328
			read ORGANISME
330
			if [ "$ORGANISME" == "" ]
329
			if [ "$ORGANISME" == "" ]
331
				then
330
				then
332
				ORGANISME=!
331
				ORGANISME=!
333
			fi
332
			fi
334
		done
333
		done
335
	fi
334
	fi
336
# On crée aléatoirement les mots de passe et les secrets partagés
335
# On crée aléatoirement les mots de passe et les secrets partagés
337
	rm -f $PASSWD_FILE
336
	rm -f $PASSWD_FILE
338
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
337
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
339
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
338
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
340
	echo "$grubpwd" >> $PASSWD_FILE
339
	echo "$grubpwd" >> $PASSWD_FILE
341
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
340
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
342
	$SED "/^password.*/d" /boot/grub/menu.lst
341
	$SED "/^password.*/d" /boot/grub/menu.lst
343
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
342
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
344
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
343
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
345
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
344
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
346
	echo "root / $mysqlpwd" >> $PASSWD_FILE
345
	echo "root / $mysqlpwd" >> $PASSWD_FILE
347
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
346
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
348
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
347
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
349
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
348
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
350
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
349
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
351
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
350
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
352
	echo "$secretuam" >> $PASSWD_FILE
351
	echo "$secretuam" >> $PASSWD_FILE
353
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
352
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
354
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
353
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
355
	echo "$secretradius" >> $PASSWD_FILE
354
	echo "$secretradius" >> $PASSWD_FILE
356
	chmod 640 $PASSWD_FILE
355
	chmod 640 $PASSWD_FILE
357
# Scripts and conf files copy 
356
# Scripts and conf files copy 
358
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
357
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
359
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
358
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
360
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
359
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
361
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
360
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
362
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
361
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
363
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
362
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
364
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
363
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
365
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
364
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
366
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
365
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
367
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
366
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
368
# generate central conf file
367
# generate central conf file
369
	cat <<EOF > $CONF_FILE
368
	cat <<EOF > $CONF_FILE
370
##########################################
369
##########################################
371
##                                      ##
370
##                                      ##
372
##          ALCASAR Parameters          ##
371
##          ALCASAR Parameters          ##
373
##                                      ##
372
##                                      ##
374
##########################################
373
##########################################
375
 
374
 
376
INSTALL_DATE=$DATE
375
INSTALL_DATE=$DATE
377
VERSION=$VERSION
376
VERSION=$VERSION
378
ORGANISM=$ORGANISME
377
ORGANISM=$ORGANISME
379
DOMAIN=$DOMAIN
378
DOMAIN=$DOMAIN
380
EOF
379
EOF
381
	chmod o-rwx $CONF_FILE
380
	chmod o-rwx $CONF_FILE
382
} # End of init ()
381
} # End of init ()
383
 
382
 
384
##################################################################
383
##################################################################
385
##			Function "network"			##
384
##			Function "network"			##
386
## - Définition du plan d'adressage du réseau de consultation	##
385
## - Définition du plan d'adressage du réseau de consultation	##
387
## - Nommage DNS du système 					##
386
## - Nommage DNS du système 					##
388
## - Configuration de l'interface INTIF (réseau de consultation)##
387
## - Configuration de l'interface INTIF (réseau de consultation)##
389
## - Modification du fichier /etc/hosts				##
388
## - Modification du fichier /etc/hosts				##
390
## - Configuration du serveur de temps (NTP)			##
389
## - Configuration du serveur de temps (NTP)			##
391
## - Renseignement des fichiers hosts.allow et hosts.deny	##
390
## - Renseignement des fichiers hosts.allow et hosts.deny	##
392
##################################################################
391
##################################################################
393
network ()
392
network ()
394
{
393
{
395
	header_install
394
	header_install
396
	if [ "$mode" != "update" ]
395
	if [ "$mode" != "update" ]
397
		then
396
		then
398
		if [ $Lang == "fr" ]
397
		if [ $Lang == "fr" ]
399
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
398
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
400
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
399
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
401
		fi
400
		fi
402
		response=0
401
		response=0
403
		PTN='^[oOyYnN]$'
402
		PTN='^[oOyYnN]$'
404
		until [[ $(expr $response : $PTN) -gt 0 ]]
403
		until [[ $(expr $response : $PTN) -gt 0 ]]
405
		do
404
		do
406
			if [ $Lang == "fr" ]
405
			if [ $Lang == "fr" ]
407
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
406
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
408
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
407
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
409
			fi
408
			fi
410
			read response
409
			read response
411
		done
410
		done
412
		if [ "$response" = "n" ] || [ "$response" = "N" ]
411
		if [ "$response" = "n" ] || [ "$response" = "N" ]
413
		then
412
		then
414
			PRIVATE_IP_MASK="0"
413
			PRIVATE_IP_MASK="0"
415
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
414
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
416
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
415
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
417
			do
416
			do
418
				if [ $Lang == "fr" ]
417
				if [ $Lang == "fr" ]
419
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
418
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
420
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
419
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
421
				fi
420
				fi
422
				read PRIVATE_IP_MASK
421
				read PRIVATE_IP_MASK
423
			done
422
			done
424
		else
423
		else
425
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
424
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
426
		fi
425
		fi
427
	else
426
	else
428
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
427
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
429
		rm -rf conf/etc/alcasar.conf
428
		rm -rf conf/etc/alcasar.conf
430
	fi
429
	fi
431
# Define LAN side global parameters
430
# Define LAN side global parameters
432
	hostname $HOSTNAME.$DOMAIN
431
	hostname $HOSTNAME.$DOMAIN
433
	echo $HOSTNAME.$DOMAIN > /etc/hostname
432
	echo $HOSTNAME.$DOMAIN > /etc/hostname
434
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
433
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
435
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
434
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
436
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
435
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
437
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
436
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
438
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
437
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
439
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`; classe_sup_sup=`expr $classe + 2`	# ie.: 2=classe B, 3=classe C
438
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`; classe_sup_sup=`expr $classe + 2`	# ie.: 2=classe B, 3=classe C
440
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
439
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
441
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
440
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
442
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f$classe_sup`			# last octet of LAN address
441
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f$classe_sup`			# last octet of LAN address
443
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`			# last octet of LAN broadcast
442
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`			# last octet of LAN broadcast
444
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`		# First network address (ex.: 192.168.182.1)
443
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`		# First network address (ex.: 192.168.182.1)
445
	PRIVATE_SECOND_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 2`	# second network address (ex.: 192.168.182.2)
444
	PRIVATE_SECOND_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 2`	# second network address (ex.: 192.168.182.2)
446
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
445
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
447
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
446
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
448
# Define Internet parameters
447
# Define Internet parameters
449
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
448
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
450
	DNS1=`grep DNS1 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 1er DNS
449
	DNS1=`grep DNS1 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 1er DNS
451
	DNS2=`grep DNS2 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 2ème DNS
450
	DNS2=`grep DNS2 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 2ème DNS
452
	DNS1=${DNS1:=208.67.220.220}
451
	DNS1=${DNS1:=208.67.220.220}
453
	DNS2=${DNS2:=208.67.222.222}
452
	DNS2=${DNS2:=208.67.222.222}
454
	PUBLIC_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2`
453
	PUBLIC_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2`
455
	DEFAULT_PUBLIC_NETMASK=`ipcalc -m $PUBLIC_IP | cut -d"=" -f2`
454
	DEFAULT_PUBLIC_NETMASK=`ipcalc -m $PUBLIC_IP | cut -d"=" -f2`
456
	PUBLIC_NETMASK=${PUBLIC_NETMASK:=$DEFAULT_PUBLIC_NETMASK}
455
	PUBLIC_NETMASK=${PUBLIC_NETMASK:=$DEFAULT_PUBLIC_NETMASK}
457
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
456
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
458
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
457
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
459
	echo "EXTIF=$EXTIF" >> $CONF_FILE
458
	echo "EXTIF=$EXTIF" >> $CONF_FILE
460
	echo "INTIF=$INTIF" >> $CONF_FILE
459
	echo "INTIF=$INTIF" >> $CONF_FILE
461
	echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
460
	echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
462
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
461
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
463
	echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
462
	echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
464
	echo "DNS1=$DNS1" >> $CONF_FILE
463
	echo "DNS1=$DNS1" >> $CONF_FILE
465
	echo "DNS2=$DNS2" >> $CONF_FILE
464
	echo "DNS2=$DNS2" >> $CONF_FILE
466
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
465
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
467
	echo "DHCP=full" >> $CONF_FILE
466
	echo "DHCP=full" >> $CONF_FILE
468
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
467
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
469
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
468
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
470
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
469
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
471
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
470
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
472
# config network
471
# config network
473
	cat <<EOF > /etc/sysconfig/network
472
	cat <<EOF > /etc/sysconfig/network
474
NETWORKING=yes
473
NETWORKING=yes
475
HOSTNAME="$HOSTNAME.$DOMAIN"
474
HOSTNAME="$HOSTNAME.$DOMAIN"
476
FORWARD_IPV4=true
475
FORWARD_IPV4=true
477
EOF
476
EOF
478
# config /etc/hosts
477
# config /etc/hosts
479
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
478
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
480
	cat <<EOF > /etc/hosts
479
	cat <<EOF > /etc/hosts
481
127.0.0.1	localhost
480
127.0.0.1	localhost
482
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
481
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
483
EOF
482
EOF
484
# Config EXTIF (Internet)
483
# Config EXTIF (Internet)
485
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
484
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
486
DEVICE=$EXTIF
485
DEVICE=$EXTIF
487
BOOTPROTO=static
486
BOOTPROTO=static
488
IPADDR=$PUBLIC_IP
487
IPADDR=$PUBLIC_IP
489
NETMASK=$PUBLIC_NETMASK
488
NETMASK=$PUBLIC_NETMASK
490
GATEWAY=$PUBLIC_GATEWAY
489
GATEWAY=$PUBLIC_GATEWAY
491
DNS1=127.0.0.1
490
DNS1=127.0.0.1
492
ONBOOT=yes
491
ONBOOT=yes
493
METRIC=10
492
METRIC=10
494
NOZEROCONF=yes
493
NOZEROCONF=yes
495
MII_NOT_SUPPORTED=yes
494
MII_NOT_SUPPORTED=yes
496
IPV6INIT=no
495
IPV6INIT=no
497
IPV6TO4INIT=no
496
IPV6TO4INIT=no
498
ACCOUNTING=no
497
ACCOUNTING=no
499
USERCTL=no
498
USERCTL=no
500
MTU=$MTU
499
MTU=$MTU
501
EOF
500
EOF
502
# Config INTIF (consultation LAN) in normal mode
501
# Config INTIF (consultation LAN) in normal mode
503
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
502
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
504
DEVICE=$INTIF
503
DEVICE=$INTIF
505
BOOTPROTO=static
504
BOOTPROTO=static
506
ONBOOT=yes
505
ONBOOT=yes
507
NOZEROCONF=yes
506
NOZEROCONF=yes
508
MII_NOT_SUPPORTED=yes
507
MII_NOT_SUPPORTED=yes
509
IPV6INIT=no
508
IPV6INIT=no
510
IPV6TO4INIT=no
509
IPV6TO4INIT=no
511
ACCOUNTING=no
510
ACCOUNTING=no
512
USERCTL=no
511
USERCTL=no
513
ETHTOOL_OPTS=$ETHTOOL_OPTS
-
 
514
EOF
512
EOF
515
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
513
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
516
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
514
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
517
DEVICE=$INTIF
515
DEVICE=$INTIF
518
BOOTPROTO=static
516
BOOTPROTO=static
519
IPADDR=$PRIVATE_IP
517
IPADDR=$PRIVATE_IP
520
NETMASK=$PRIVATE_NETMASK
518
NETMASK=$PRIVATE_NETMASK
521
ONBOOT=yes
519
ONBOOT=yes
522
METRIC=10
520
METRIC=10
523
NOZEROCONF=yes
521
NOZEROCONF=yes
524
MII_NOT_SUPPORTED=yes
522
MII_NOT_SUPPORTED=yes
525
IPV6INIT=no
523
IPV6INIT=no
526
IPV6TO4INIT=no
524
IPV6TO4INIT=no
527
ACCOUNTING=no
525
ACCOUNTING=no
528
USERCTL=no
526
USERCTL=no
529
EOF
527
EOF
530
# Mise à l'heure du serveur
528
# Mise à l'heure du serveur
531
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
529
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
532
	cat <<EOF > /etc/ntp/step-tickers
530
	cat <<EOF > /etc/ntp/step-tickers
533
0.fr.pool.ntp.org	# adapt to your country
531
0.fr.pool.ntp.org	# adapt to your country
534
1.fr.pool.ntp.org
532
1.fr.pool.ntp.org
535
2.fr.pool.ntp.org
533
2.fr.pool.ntp.org
536
EOF
534
EOF
537
# Configuration du serveur de temps (sur lui même)
535
# Configuration du serveur de temps (sur lui même)
538
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
536
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
539
	cat <<EOF > /etc/ntp.conf
537
	cat <<EOF > /etc/ntp.conf
540
server 0.fr.pool.ntp.org	# adapt to your country
538
server 0.fr.pool.ntp.org	# adapt to your country
541
server 1.fr.pool.ntp.org
539
server 1.fr.pool.ntp.org
542
server 2.fr.pool.ntp.org
540
server 2.fr.pool.ntp.org
543
server 127.127.1.0   		# local clock si NTP internet indisponible ...
541
server 127.127.1.0   		# local clock si NTP internet indisponible ...
544
fudge 127.127.1.0 stratum 10
542
fudge 127.127.1.0 stratum 10
545
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
543
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
546
restrict 127.0.0.1
544
restrict 127.0.0.1
547
driftfile /var/lib/ntp/drift
545
driftfile /var/lib/ntp/drift
548
logfile /var/log/ntp.log
546
logfile /var/log/ntp.log
549
EOF
547
EOF
550
 
548
 
551
	chown -R ntp:ntp /var/lib/ntp
549
	chown -R ntp:ntp /var/lib/ntp
552
# Renseignement des fichiers hosts.allow et hosts.deny
550
# Renseignement des fichiers hosts.allow et hosts.deny
553
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
551
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
554
	cat <<EOF > /etc/hosts.allow
552
	cat <<EOF > /etc/hosts.allow
555
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
553
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
556
sshd: ALL
554
sshd: ALL
557
ntpd: $PRIVATE_NETWORK_SHORT
555
ntpd: $PRIVATE_NETWORK_SHORT
558
EOF
556
EOF
559
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
557
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
560
	cat <<EOF > /etc/hosts.deny
558
	cat <<EOF > /etc/hosts.deny
561
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
559
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
562
EOF
560
EOF
563
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
561
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
564
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
562
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
565
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
563
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
566
# load conntrack ftp module
564
# load conntrack ftp module
567
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
565
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
568
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
566
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
569
# load ipt_NETFLOW module
567
# load ipt_NETFLOW module
570
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
568
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
571
# 
569
# 
572
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
570
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
573
} # End of network ()
571
} # End of network ()
574
 
572
 
575
##################################################################
573
##################################################################
576
##			Function "ACC"				##
574
##			Function "ACC"				##
577
## - installation du centre de gestion (ALCASAR Control Center)	##
575
## - installation du centre de gestion (ALCASAR Control Center)	##
578
## - configuration du serveur web (Apache)			##
576
## - configuration du serveur web (Apache)			##
579
## - définition du 1er comptes de gestion 			##
577
## - définition du 1er comptes de gestion 			##
580
## - sécurisation des accès					##
578
## - sécurisation des accès					##
581
##################################################################
579
##################################################################
582
ACC ()
580
ACC ()
583
{
581
{
584
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
582
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
585
	mkdir $DIR_WEB
583
	mkdir $DIR_WEB
586
# Copie et configuration des fichiers du centre de gestion
584
# Copie et configuration des fichiers du centre de gestion
587
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
585
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
588
	echo "$VERSION" > $DIR_WEB/VERSION
586
	echo "$VERSION" > $DIR_WEB/VERSION
589
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
587
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
590
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
588
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
591
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
589
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
592
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
590
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
593
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
591
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
594
	chown -R apache:apache $DIR_WEB/*
592
	chown -R apache:apache $DIR_WEB/*
595
	for i in system_backup base logs/firewall logs/httpd logs/security;
593
	for i in system_backup base logs/firewall logs/httpd logs/security;
596
	do
594
	do
597
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
595
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
598
	done
596
	done
599
	chown -R root:apache $DIR_SAVE
597
	chown -R root:apache $DIR_SAVE
600
# Configuration et sécurisation php
598
# Configuration et sécurisation php
601
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
599
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
602
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
600
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
603
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
601
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
604
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
602
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
605
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
603
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
606
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
604
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
607
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
605
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
608
# Configuration et sécurisation Apache
606
# Configuration et sécurisation Apache
609
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
607
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
610
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
608
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
611
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
609
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
612
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
610
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
613
	$SED "s?^ServerTokens.*?ServerTokens Prod?g" /etc/httpd/conf/httpd.conf
611
	$SED "s?^ServerTokens.*?ServerTokens Prod?g" /etc/httpd/conf/httpd.conf
614
	$SED "s?^ServerSignature.*?ServerSignature Off?g" /etc/httpd/conf/httpd.conf
612
	$SED "s?^ServerSignature.*?ServerSignature Off?g" /etc/httpd/conf/httpd.conf
615
	$SED "s?^#ErrorDocument 404 /missing.html.*?ErrorDocument 404 /index.html?g" /etc/httpd/conf/httpd.conf
613
	$SED "s?^#ErrorDocument 404 /missing.html.*?ErrorDocument 404 /index.html?g" /etc/httpd/conf/httpd.conf
616
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/httpd.conf
614
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/httpd.conf
617
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/httpd.conf
615
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/httpd.conf
618
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/httpd.conf
616
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/httpd.conf
619
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/httpd.conf
617
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/httpd.conf
620
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/httpd.conf
618
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/httpd.conf
621
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/httpd.conf
619
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/httpd.conf
622
	$SED "s?LoadModule speling_module.*?LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/httpd.conf
620
	$SED "s?LoadModule speling_module.*?LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/httpd.conf
623
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
621
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
624
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
622
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
625
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
623
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
626
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
624
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
627
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
625
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
628
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
626
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
629
</body>
627
</body>
630
</html>
628
</html>
631
EOF
629
EOF
632
# Définition du premier compte lié au profil 'admin'
630
# Définition du premier compte lié au profil 'admin'
633
	header_install
631
	header_install
634
	if [ "$mode" = "install" ]
632
	if [ "$mode" = "install" ]
635
	then
633
	then
636
		admin_portal=!
634
		admin_portal=!
637
		PTN='^[a-zA-Z0-9-]*$'
635
		PTN='^[a-zA-Z0-9-]*$'
638
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
636
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
639
                	do
637
                	do
640
			header_install
638
			header_install
641
			if [ $Lang == "fr" ]
639
			if [ $Lang == "fr" ]
642
			then 
640
			then 
643
				echo ""
641
				echo ""
644
				echo "Définissez un premier compte d'administration du portail :"
642
				echo "Définissez un premier compte d'administration du portail :"
645
				echo
643
				echo
646
				echo -n "Nom : "
644
				echo -n "Nom : "
647
			else
645
			else
648
				echo ""
646
				echo ""
649
				echo "Define the first account allow to administrate the portal :"
647
				echo "Define the first account allow to administrate the portal :"
650
				echo
648
				echo
651
				echo -n "Account : "
649
				echo -n "Account : "
652
			fi
650
			fi
653
			read admin_portal
651
			read admin_portal
654
			if [ "$admin_portal" == "" ]
652
			if [ "$admin_portal" == "" ]
655
				then
653
				then
656
				admin_portal=!
654
				admin_portal=!
657
			fi
655
			fi
658
			done
656
			done
659
# Creation of keys file for the admin account ("admin")
657
# Creation of keys file for the admin account ("admin")
660
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
658
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
661
		mkdir -p $DIR_DEST_ETC/digest
659
		mkdir -p $DIR_DEST_ETC/digest
662
		chmod 755 $DIR_DEST_ETC/digest
660
		chmod 755 $DIR_DEST_ETC/digest
663
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
661
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
664
			do
662
			do
665
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
663
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
666
			done
664
			done
667
		$DIR_DEST_SBIN/alcasar-profil.sh --list
665
		$DIR_DEST_SBIN/alcasar-profil.sh --list
668
	fi
666
	fi
669
# synchronisation horaire
667
# synchronisation horaire
670
	ntpd -q -g &
668
	ntpd -q -g &
671
# Sécurisation du centre
669
# Sécurisation du centre
672
	rm -f /etc/httpd/conf/webapps.d/alcasar*
670
	rm -f /etc/httpd/conf/webapps.d/alcasar*
673
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
671
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
674
<Directory $DIR_ACC>
672
<Directory $DIR_ACC>
675
	SSLRequireSSL
673
	SSLRequireSSL
676
	AllowOverride None
674
	AllowOverride None
677
	Order deny,allow
675
	Order deny,allow
678
	Deny from all
676
	Deny from all
679
	Allow from 127.0.0.1
677
	Allow from 127.0.0.1
680
	Allow from $PRIVATE_NETWORK_MASK
678
	Allow from $PRIVATE_NETWORK_MASK
681
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
679
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
682
	require valid-user
680
	require valid-user
683
	AuthType digest
681
	AuthType digest
684
	AuthName $HOSTNAME.$DOMAIN
682
	AuthName $HOSTNAME.$DOMAIN
685
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
683
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
686
	AuthUserFile $DIR_DEST_ETC/digest/key_all
684
	AuthUserFile $DIR_DEST_ETC/digest/key_all
687
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
685
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
688
</Directory>
686
</Directory>
689
<Directory $DIR_ACC/admin>
687
<Directory $DIR_ACC/admin>
690
	SSLRequireSSL
688
	SSLRequireSSL
691
	AllowOverride None
689
	AllowOverride None
692
	Order deny,allow
690
	Order deny,allow
693
	Deny from all
691
	Deny from all
694
	Allow from 127.0.0.1
692
	Allow from 127.0.0.1
695
	Allow from $PRIVATE_NETWORK_MASK
693
	Allow from $PRIVATE_NETWORK_MASK
696
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
694
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
697
	require valid-user
695
	require valid-user
698
	AuthType digest
696
	AuthType digest
699
	AuthName $HOSTNAME.$DOMAIN
697
	AuthName $HOSTNAME.$DOMAIN
700
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
698
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
701
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
699
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
702
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
700
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
703
</Directory>
701
</Directory>
704
<Directory $DIR_ACC/manager>
702
<Directory $DIR_ACC/manager>
705
	SSLRequireSSL
703
	SSLRequireSSL
706
	AllowOverride None
704
	AllowOverride None
707
	Order deny,allow
705
	Order deny,allow
708
	Deny from all
706
	Deny from all
709
	Allow from 127.0.0.1
707
	Allow from 127.0.0.1
710
	Allow from $PRIVATE_NETWORK_MASK
708
	Allow from $PRIVATE_NETWORK_MASK
711
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
709
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
712
	require valid-user
710
	require valid-user
713
	AuthType digest
711
	AuthType digest
714
	AuthName $HOSTNAME.$DOMAIN
712
	AuthName $HOSTNAME.$DOMAIN
715
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
713
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
716
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
714
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
717
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
715
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
718
</Directory>
716
</Directory>
719
<Directory $DIR_ACC/backup>
717
<Directory $DIR_ACC/backup>
720
	SSLRequireSSL
718
	SSLRequireSSL
721
	AllowOverride None
719
	AllowOverride None
722
	Order deny,allow
720
	Order deny,allow
723
	Deny from all
721
	Deny from all
724
	Allow from 127.0.0.1
722
	Allow from 127.0.0.1
725
	Allow from $PRIVATE_NETWORK_MASK
723
	Allow from $PRIVATE_NETWORK_MASK
726
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
724
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
727
	require valid-user
725
	require valid-user
728
	AuthType digest
726
	AuthType digest
729
	AuthName $HOSTNAME.$DOMAIN
727
	AuthName $HOSTNAME.$DOMAIN
730
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
728
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
731
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
729
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
732
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
730
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
733
</Directory>
731
</Directory>
734
Alias /save/ "$DIR_SAVE/"
732
Alias /save/ "$DIR_SAVE/"
735
<Directory $DIR_SAVE>
733
<Directory $DIR_SAVE>
736
	SSLRequireSSL
734
	SSLRequireSSL
737
	Options Indexes
735
	Options Indexes
738
	Order deny,allow
736
	Order deny,allow
739
	Deny from all
737
	Deny from all
740
	Allow from 127.0.0.1
738
	Allow from 127.0.0.1
741
	Allow from $PRIVATE_NETWORK_MASK
739
	Allow from $PRIVATE_NETWORK_MASK
742
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
740
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
743
	require valid-user
741
	require valid-user
744
	AuthType digest
742
	AuthType digest
745
	AuthName $HOSTNAME.$DOMAIN
743
	AuthName $HOSTNAME.$DOMAIN
746
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
744
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
747
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
745
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
748
</Directory>
746
</Directory>
749
EOF
747
EOF
750
# Launch after coova
748
# Launch after coova
751
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
749
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
752
# Error page management
750
# Error page management
753
FIC_ERROR_DOC=`find /etc/httpd/conf -type f -name multilang-errordoc.conf`
751
FIC_ERROR_DOC=`find /etc/httpd/conf -type f -name multilang-errordoc.conf`
754
[ -e $FIC_ERROR_DOC ]  || cp $FIC_ERROR_DOC $FIC_ERROR_DOC.default
752
[ -e $FIC_ERROR_DOC ]  || cp $FIC_ERROR_DOC $FIC_ERROR_DOC.default
755
 
753
 
756
cat <<EOF > $FIC_ERROR_DOC
754
cat <<EOF > $FIC_ERROR_DOC
757
Alias /error/ "/var/www/html/"
755
Alias /error/ "/var/www/html/"
758
 
756
 
759
<Directory "/usr/share/httpd/error">
757
<Directory "/usr/share/httpd/error">
760
    AllowOverride None
758
    AllowOverride None
761
    Options IncludesNoExec
759
    Options IncludesNoExec
762
    AddOutputFilter Includes html
760
    AddOutputFilter Includes html
763
    AddHandler type-map var
761
    AddHandler type-map var
764
    Require all granted
762
    Require all granted
765
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
763
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
766
    ForceLanguagePriority Prefer Fallback
764
    ForceLanguagePriority Prefer Fallback
767
</Directory>
765
</Directory>
768
 
766
 
769
ErrorDocument 400 /error/error.php?error=400
767
ErrorDocument 400 /error/error.php?error=400
770
ErrorDocument 401 /error/error.php?error=401
768
ErrorDocument 401 /error/error.php?error=401
771
ErrorDocument 403 /error/error.php?error=403
769
ErrorDocument 403 /error/error.php?error=403
772
ErrorDocument 404 /error/error.php?error=404
770
ErrorDocument 404 /error/error.php?error=404
773
ErrorDocument 405 /error/error.php?error=405
771
ErrorDocument 405 /error/error.php?error=405
774
ErrorDocument 408 /error/error.php?error=408
772
ErrorDocument 408 /error/error.php?error=408
775
ErrorDocument 410 /error/error.php?error=410
773
ErrorDocument 410 /error/error.php?error=410
776
ErrorDocument 411 /error/error.php?error=411
774
ErrorDocument 411 /error/error.php?error=411
777
ErrorDocument 412 /error/error.php?error=412
775
ErrorDocument 412 /error/error.php?error=412
778
ErrorDocument 413 /error/error.php?error=413
776
ErrorDocument 413 /error/error.php?error=413
779
ErrorDocument 414 /error/error.php?error=414
777
ErrorDocument 414 /error/error.php?error=414
780
ErrorDocument 415 /error/error.php?error=415
778
ErrorDocument 415 /error/error.php?error=415
781
ErrorDocument 500 /error/error.php?error=500
779
ErrorDocument 500 /error/error.php?error=500
782
ErrorDocument 501 /error/error.php?error=501
780
ErrorDocument 501 /error/error.php?error=501
783
ErrorDocument 502 /error/error.php?error=502
781
ErrorDocument 502 /error/error.php?error=502
784
ErrorDocument 503 /error/error.php?error=503
782
ErrorDocument 503 /error/error.php?error=503
785
ErrorDocument 506 /error/error.php?error=506
783
ErrorDocument 506 /error/error.php?error=506
786
EOF
784
EOF
787
 
785
 
788
} # End of ACC ()
786
} # End of ACC ()
789
 
787
 
790
##########################################################################################
788
##########################################################################################
791
##				Fonction "CA"						##
789
##				Fonction "CA"						##
792
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
790
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
793
##########################################################################################
791
##########################################################################################
794
CA ()
792
CA ()
795
{
793
{
796
	$DIR_DEST_BIN/alcasar-CA.sh
794
	$DIR_DEST_BIN/alcasar-CA.sh
797
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
795
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
798
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
796
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
799
	
797
	
800
	#$SED "s?localhost.crt?alcasar.crt?g" $FIC_VIRTUAL_SSL
798
	#$SED "s?localhost.crt?alcasar.crt?g" $FIC_VIRTUAL_SSL
801
	#$SED "s?localhost.key?alcasar.key?g" $FIC_VIRTUAL_SSL
799
	#$SED "s?localhost.key?alcasar.key?g" $FIC_VIRTUAL_SSL
802
	#$SED "s?^#SSLCertificateChainFile.*?SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt?" $FIC_VIRTUAL_SSL
800
	#$SED "s?^#SSLCertificateChainFile.*?SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt?" $FIC_VIRTUAL_SSL
803
	
801
	
804
	cat <<EOF > $FIC_VIRTUAL_SSL
802
	cat <<EOF > $FIC_VIRTUAL_SSL
805
# default SSL virtual host, used for all HTTPS requests that do not
803
# default SSL virtual host, used for all HTTPS requests that do not
806
# match a ServerName or ServerAlias in any <VirtualHost> block.
804
# match a ServerName or ServerAlias in any <VirtualHost> block.
807
 
805
 
808
<VirtualHost _default_:443>
806
<VirtualHost _default_:443>
809
# general configuration
807
# general configuration
810
    ServerAdmin root@localhost
808
    ServerAdmin root@localhost
811
    ServerName localhost
809
    ServerName localhost
812
 
810
 
813
# SSL configuration
811
# SSL configuration
814
    SSLEngine on
812
    SSLEngine on
815
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
813
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
816
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
814
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
817
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
815
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
818
    CustomLog logs/ssl_request_log \
816
    CustomLog logs/ssl_request_log \
819
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
817
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
820
    ErrorLog logs/ssl_error_log
818
    ErrorLog logs/ssl_error_log
821
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
819
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
822
</VirtualHost>
820
</VirtualHost>
823
EOF
821
EOF
824
 
822
 
825
	chown -R root:apache /etc/pki
823
	chown -R root:apache /etc/pki
826
	chmod -R 750 /etc/pki
824
	chmod -R 750 /etc/pki
827
} # End of CA ()
825
} # End of CA ()
828
 
826
 
829
##########################################################################################
827
##########################################################################################
830
##			Fonction "init_db"						##
828
##			Fonction "init_db"						##
831
## - Initialisation de la base Mysql							##
829
## - Initialisation de la base Mysql							##
832
## - Affectation du mot de passe de l'administrateur (root)				##
830
## - Affectation du mot de passe de l'administrateur (root)				##
833
## - Suppression des bases et des utilisateurs superflus				##
831
## - Suppression des bases et des utilisateurs superflus				##
834
## - Création de la base 'radius'							##
832
## - Création de la base 'radius'							##
835
## - Installation du schéma de cette base						##
833
## - Installation du schéma de cette base						##
836
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
834
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
837
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
835
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
838
##########################################################################################
836
##########################################################################################
839
init_db ()
837
init_db ()
840
{
838
{
841
	rm -rf /var/lib/mysql # to be sure that there is no former installation
839
	rm -rf /var/lib/mysql # to be sure that there is no former installation
842
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
840
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
843
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
841
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
844
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
842
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
845
	systemctl start mysqld.service
843
	systemctl start mysqld.service
846
	sleep 4
844
	sleep 4
847
	mysqladmin -u root password $mysqlpwd
845
	mysqladmin -u root password $mysqlpwd
848
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
846
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
849
# Secure the server
847
# Secure the server
850
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
848
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
851
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
849
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
852
# Create 'radius' database
850
# Create 'radius' database
853
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
851
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
854
# Add an empty radius database structure
852
# Add an empty radius database structure
855
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
853
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
856
# modify the start script in order to close accounting connexion when the system is comming down or up
854
# modify the start script in order to close accounting connexion when the system is comming down or up
857
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
855
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
858
	$SED "/ExecStartPost=/a ExecStartPost=[ -e /usr/local/sbin/alcasar-mysql.sh ] && /usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
856
	$SED "/ExecStartPost=/a ExecStartPost=[ -e /usr/local/sbin/alcasar-mysql.sh ] && /usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
859
	$SED "/ExecStartPost=/a ExecStop=[ -e /usr/local/sbin/alcasar-mysql.sh ] && /usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
857
	$SED "/ExecStartPost=/a ExecStop=[ -e /usr/local/sbin/alcasar-mysql.sh ] && /usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
860
	systemctl daemon-reload
858
	systemctl daemon-reload
861
} # End of init_db ()
859
} # End of init_db ()
862
 
860
 
863
##########################################################################
861
##########################################################################
864
##			Fonction "radius"				##
862
##			Fonction "radius"				##
865
## - Paramètrage des fichiers de configuration FreeRadius		##
863
## - Paramètrage des fichiers de configuration FreeRadius		##
866
## - Affectation du secret partagé entre coova-chilli et freeradius	##
864
## - Affectation du secret partagé entre coova-chilli et freeradius	##
867
## - Modification de fichier de conf pour l'accès à Mysql		##
865
## - Modification de fichier de conf pour l'accès à Mysql		##
868
##########################################################################
866
##########################################################################
869
radius ()
867
radius ()
870
{
868
{
871
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
869
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
872
	chown -R radius:radius /etc/raddb
870
	chown -R radius:radius /etc/raddb
873
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
871
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
874
# Set radius.conf parameters
872
# Set radius.conf parameters
875
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
873
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
876
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
874
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
877
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
875
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
878
# remove the proxy function
876
# remove the proxy function
879
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
877
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
880
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
878
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
881
# remove EAP module
879
# remove EAP module
882
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
880
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
883
# listen on loopback (should be modified later if EAP enabled)
881
# listen on loopback (should be modified later if EAP enabled)
884
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
882
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
885
# enable the  SQL module (and SQL counter)
883
# enable the  SQL module (and SQL counter)
886
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
884
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
887
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
885
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
888
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
886
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
889
# only include modules for ALCASAR needs
887
# only include modules for ALCASAR needs
890
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
888
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
891
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
889
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
892
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
890
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
893
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
891
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
894
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
892
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
895
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
893
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
896
# remvove virtual server and copy our conf file
894
# remvove virtual server and copy our conf file
897
	rm -f /etc/raddb/sites-enabled/*
895
	rm -f /etc/raddb/sites-enabled/*
898
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
896
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
899
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
897
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
900
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
898
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
901
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
899
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
902
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
900
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
903
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
901
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
904
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
902
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
905
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
903
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
906
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
904
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
907
	cat << EOF > /etc/raddb/clients.conf
905
	cat << EOF > /etc/raddb/clients.conf
908
client 127.0.0.1 {
906
client 127.0.0.1 {
909
	secret = $secretradius
907
	secret = $secretradius
910
	shortname = localhost
908
	shortname = localhost
911
}
909
}
912
EOF
910
EOF
913
# sql.conf modification
911
# sql.conf modification
914
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
912
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
915
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
913
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
916
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
914
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
917
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
915
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
918
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
916
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
919
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
917
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
920
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
918
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
921
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
919
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
922
# counter.conf modification (change the Max-All-Session-Time counter)
920
# counter.conf modification (change the Max-All-Session-Time counter)
923
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
921
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
924
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
922
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
925
	chown -R radius:radius /etc/raddb/sql/mysql/*
923
	chown -R radius:radius /etc/raddb/sql/mysql/*
926
# make certain that mysql is up before radius start
924
# make certain that mysql is up before radius start
927
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
925
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
928
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
926
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
929
	systemctl daemon-reload
927
	systemctl daemon-reload
930
} # End radius ()
928
} # End radius ()
931
 
929
 
932
##########################################################################
930
##########################################################################
933
##			Function "radius_web"				##
931
##			Function "radius_web"				##
934
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
932
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
935
## - Création du lien vers la page de changement de mot de passe        ##
933
## - Création du lien vers la page de changement de mot de passe        ##
936
##########################################################################
934
##########################################################################
937
radius_web ()
935
radius_web ()
938
{
936
{
939
# copie de l'interface d'origine dans la structure Alcasar
937
# copie de l'interface d'origine dans la structure Alcasar
940
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
938
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
941
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
939
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
942
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
940
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
943
# copie des fichiers modifiés
941
# copie des fichiers modifiés
944
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
942
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
945
	chown -R apache:apache $DIR_ACC/manager/
943
	chown -R apache:apache $DIR_ACC/manager/
946
# Modification des fichiers de configuration
944
# Modification des fichiers de configuration
947
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
945
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
948
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
946
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
949
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
947
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
950
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
948
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
951
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
949
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
952
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
950
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
953
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
951
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
954
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
952
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
955
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
953
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
956
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
954
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
957
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
955
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
958
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
956
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
959
	cat <<EOF > /etc/freeradius-web/naslist.conf
957
	cat <<EOF > /etc/freeradius-web/naslist.conf
960
nas1_name: alcasar-$ORGANISME
958
nas1_name: alcasar-$ORGANISME
961
nas1_model: Portail captif
959
nas1_model: Portail captif
962
nas1_ip: $PRIVATE_IP
960
nas1_ip: $PRIVATE_IP
963
nas1_port_num: 0
961
nas1_port_num: 0
964
nas1_community: public
962
nas1_community: public
965
EOF
963
EOF
966
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
964
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
967
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
965
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
968
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
966
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
969
# Ajout du mappage des attributs chillispot
967
# Ajout du mappage des attributs chillispot
970
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
968
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
971
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
969
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
972
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
970
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
973
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
971
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
974
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
972
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
975
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
973
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
976
	chown -R apache:apache /etc/freeradius-web
974
	chown -R apache:apache /etc/freeradius-web
977
# Ajout de l'alias vers la page de "changement de mot de passe usager"
975
# Ajout de l'alias vers la page de "changement de mot de passe usager"
978
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
976
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
979
<Directory $DIR_WEB/pass>
977
<Directory $DIR_WEB/pass>
980
	SSLRequireSSL
978
	SSLRequireSSL
981
	AllowOverride None
979
	AllowOverride None
982
	Order deny,allow
980
	Order deny,allow
983
	Deny from all
981
	Deny from all
984
	Allow from 127.0.0.1
982
	Allow from 127.0.0.1
985
	Allow from $PRIVATE_NETWORK_MASK
983
	Allow from $PRIVATE_NETWORK_MASK
986
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
984
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
987
</Directory>
985
</Directory>
988
EOF
986
EOF
989
} # End of radius_web ()
987
} # End of radius_web ()
990
 
988
 
991
##################################################################################
989
##################################################################################
992
##			Fonction "chilli"					##
990
##			Fonction "chilli"					##
993
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
991
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
994
## - Paramètrage de la page d'authentification (intercept.php)			##
992
## - Paramètrage de la page d'authentification (intercept.php)			##
995
##################################################################################
993
##################################################################################
996
chilli ()
994
chilli ()
997
{
995
{
998
# chilli unit for systemd
996
# chilli unit for systemd
999
cat << EOF > /lib/systemd/system/chilli.service
997
cat << EOF > /lib/systemd/system/chilli.service
1000
#  This file is part of systemd.
998
#  This file is part of systemd.
1001
#
999
#
1002
#  systemd is free software; you can redistribute it and/or modify it
1000
#  systemd is free software; you can redistribute it and/or modify it
1003
#  under the terms of the GNU General Public License as published by
1001
#  under the terms of the GNU General Public License as published by
1004
#  the Free Software Foundation; either version 2 of the License, or
1002
#  the Free Software Foundation; either version 2 of the License, or
1005
#  (at your option) any later version.
1003
#  (at your option) any later version.
1006
[Unit]
1004
[Unit]
1007
Description=chilli is a captive portal daemon
1005
Description=chilli is a captive portal daemon
1008
After=network.target
1006
After=network.target
1009
 
1007
 
1010
[Service]
1008
[Service]
1011
Type=forking
1009
Type=forking
1012
ExecStart=/usr/libexec/chilli start
1010
ExecStart=/usr/libexec/chilli start
1013
ExecStop=/usr/libexec/chilli stop
1011
ExecStop=/usr/libexec/chilli stop
1014
ExecReload=/usr/libexec/chilli reload
1012
ExecReload=/usr/libexec/chilli reload
1015
PIDFile=/var/run/chilli.pid
1013
PIDFile=/var/run/chilli.pid
1016
 
1014
 
1017
[Install]
1015
[Install]
1018
WantedBy=multi-user.target
1016
WantedBy=multi-user.target
1019
EOF
1017
EOF
1020
# init file creation
1018
# init file creation
1021
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1019
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1022
	cat <<EOF > /usr/libexec/chilli
1020
	cat <<EOF > /usr/libexec/chilli
1023
#!/bin/sh
1021
#!/bin/sh
1024
#
1022
#
1025
# chilli CoovaChilli init
1023
# chilli CoovaChilli init
1026
#
1024
#
1027
# chkconfig: 2345 65 35
1025
# chkconfig: 2345 65 35
1028
# description: CoovaChilli
1026
# description: CoovaChilli
1029
### BEGIN INIT INFO
1027
### BEGIN INIT INFO
1030
# Provides:       chilli
1028
# Provides:       chilli
1031
# Required-Start: network 
1029
# Required-Start: network 
1032
# Should-Start: 
1030
# Should-Start: 
1033
# Required-Stop:  network
1031
# Required-Stop:  network
1034
# Should-Stop: 
1032
# Should-Stop: 
1035
# Default-Start:  2 3 5
1033
# Default-Start:  2 3 5
1036
# Default-Stop:
1034
# Default-Stop:
1037
# Description:    CoovaChilli access controller
1035
# Description:    CoovaChilli access controller
1038
### END INIT INFO
1036
### END INIT INFO
1039
 
1037
 
1040
[ -f /usr/sbin/chilli ] || exit 0
1038
[ -f /usr/sbin/chilli ] || exit 0
1041
. /etc/init.d/functions
1039
. /etc/init.d/functions
1042
CONFIG=/etc/chilli.conf
1040
CONFIG=/etc/chilli.conf
1043
pidfile=/var/run/chilli.pid
1041
pidfile=/var/run/chilli.pid
1044
[ -f \$CONFIG ] || {
1042
[ -f \$CONFIG ] || {
1045
    echo "\$CONFIG Not found"
1043
    echo "\$CONFIG Not found"
1046
    exit 0
1044
    exit 0
1047
}
1045
}
1048
RETVAL=0
1046
RETVAL=0
1049
prog="chilli"
1047
prog="chilli"
1050
case \$1 in
1048
case \$1 in
1051
    start)
1049
    start)
1052
	if [ -f \$pidfile ] ; then 
1050
	if [ -f \$pidfile ] ; then 
1053
		gprintf "chilli is already running"
1051
		gprintf "chilli is already running"
1054
	else
1052
	else
1055
        	gprintf "Starting \$prog: "
1053
        	gprintf "Starting \$prog: "
1056
		rm -f /var/run/chilli* # cleaning
1054
		rm -f /var/run/chilli* # cleaning
1057
        	/sbin/modprobe tun >/dev/null 2>&1
1055
        	/sbin/modprobe tun >/dev/null 2>&1
1058
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1056
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1059
		[ -e /dev/net/tun ] || {
1057
		[ -e /dev/net/tun ] || {
1060
	    	(cd /dev; 
1058
	    	(cd /dev; 
1061
			mkdir net; 
1059
			mkdir net; 
1062
			cd net; 
1060
			cd net; 
1063
			mknod tun c 10 200)
1061
			mknod tun c 10 200)
1064
		}
1062
		}
1065
		ifconfig $INTIF 0.0.0.0
1063
		ifconfig $INTIF 0.0.0.0
1066
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1064
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1067
        	RETVAL=$?
1065
        	RETVAL=$?
1068
	fi
1066
	fi
1069
	;;
1067
	;;
1070
 
1068
 
1071
    reload)
1069
    reload)
1072
	killall -HUP chilli
1070
	killall -HUP chilli
1073
	;;
1071
	;;
1074
 
1072
 
1075
    restart)
1073
    restart)
1076
	\$0 stop
1074
	\$0 stop
1077
        sleep 2
1075
        sleep 2
1078
	\$0 start
1076
	\$0 start
1079
	;;
1077
	;;
1080
    
1078
    
1081
    status)
1079
    status)
1082
        status chilli
1080
        status chilli
1083
        RETVAL=0
1081
        RETVAL=0
1084
        ;;
1082
        ;;
1085
 
1083
 
1086
    stop)
1084
    stop)
1087
	if [ -f \$pidfile ] ; then  
1085
	if [ -f \$pidfile ] ; then  
1088
        	gprintf "Shutting down \$prog: "
1086
        	gprintf "Shutting down \$prog: "
1089
		killproc /usr/sbin/chilli
1087
		killproc /usr/sbin/chilli
1090
		RETVAL=\$?
1088
		RETVAL=\$?
1091
		[ \$RETVAL = 0 ] && rm -f $pidfile
1089
		[ \$RETVAL = 0 ] && rm -f $pidfile
1092
	else	
1090
	else	
1093
        	gprintf "chilli is not running"
1091
        	gprintf "chilli is not running"
1094
	fi
1092
	fi
1095
	;;
1093
	;;
1096
    
1094
    
1097
    *)
1095
    *)
1098
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1096
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1099
        exit 1
1097
        exit 1
1100
esac
1098
esac
1101
echo
1099
echo
1102
EOF
1100
EOF
1103
chmod a+x /usr/libexec/chilli
1101
chmod a+x /usr/libexec/chilli
1104
# conf file creation
1102
# conf file creation
1105
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1103
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1106
	cat <<EOF > /etc/chilli.conf
1104
	cat <<EOF > /etc/chilli.conf
1107
# coova config for ALCASAR
1105
# coova config for ALCASAR
1108
cmdsocket	/var/run/chilli.sock
1106
cmdsocket	/var/run/chilli.sock
1109
unixipc		chilli.$INTIF.ipc
1107
unixipc		chilli.$INTIF.ipc
1110
pidfile		/var/run/chilli.$INTIF.pid
1108
pidfile		/var/run/chilli.$INTIF.pid
1111
net		$PRIVATE_NETWORK_MASK
1109
net		$PRIVATE_NETWORK_MASK
1112
dhcpif		$INTIF
1110
dhcpif		$INTIF
1113
ethers		$DIR_DEST_ETC/alcasar-ethers
1111
ethers		$DIR_DEST_ETC/alcasar-ethers
1114
#nodynip
1112
#nodynip
1115
#statip
1113
#statip
1116
dynip		$PRIVATE_NETWORK_MASK
1114
dynip		$PRIVATE_NETWORK_MASK
1117
domain		$DOMAIN
1115
domain		$DOMAIN
1118
dns1		$PRIVATE_IP
1116
dns1		$PRIVATE_IP
1119
dns2		$PRIVATE_IP
1117
dns2		$PRIVATE_IP
1120
uamlisten	$PRIVATE_IP
1118
uamlisten	$PRIVATE_IP
1121
uamport		3990
1119
uamport		3990
1122
macauth
1120
macauth
1123
macpasswd	password
1121
macpasswd	password
1124
locationname	$HOSTNAME.$DOMAIN
1122
locationname	$HOSTNAME.$DOMAIN
1125
radiusserver1	127.0.0.1
1123
radiusserver1	127.0.0.1
1126
radiusserver2	127.0.0.1
1124
radiusserver2	127.0.0.1
1127
radiussecret	$secretradius
1125
radiussecret	$secretradius
1128
radiusauthport	1812
1126
radiusauthport	1812
1129
radiusacctport	1813
1127
radiusacctport	1813
1130
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1128
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1131
radiusnasid	$HOSTNAME.$DOMAIN
1129
radiusnasid	$HOSTNAME.$DOMAIN
1132
uamsecret	$secretuam
1130
uamsecret	$secretuam
1133
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1131
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1134
coaport		3799
1132
coaport		3799
1135
conup		$DIR_DEST_BIN/alcasar-conup.sh
1133
conup		$DIR_DEST_BIN/alcasar-conup.sh
1136
condown		$DIR_DEST_BIN/alcasar-condown.sh
1134
condown		$DIR_DEST_BIN/alcasar-condown.sh
1137
include		$DIR_DEST_ETC/alcasar-uamallowed
1135
include		$DIR_DEST_ETC/alcasar-uamallowed
1138
include		$DIR_DEST_ETC/alcasar-uamdomain
1136
include		$DIR_DEST_ETC/alcasar-uamdomain
1139
#dhcpgateway
1137
#dhcpgateway
1140
#dhcprelayagent
1138
#dhcprelayagent
1141
#dhcpgatewayport
1139
#dhcpgatewayport
1142
EOF
1140
EOF
1143
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1141
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1144
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1142
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1145
# create files for trusted domains and urls
1143
# create files for trusted domains and urls
1146
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1144
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1147
	chown root:apache $DIR_DEST_ETC/alcasar-*
1145
	chown root:apache $DIR_DEST_ETC/alcasar-*
1148
	chmod 660 $DIR_DEST_ETC/alcasar-*
1146
	chmod 660 $DIR_DEST_ETC/alcasar-*
1149
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1147
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1150
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1148
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1151
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1149
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1152
# user 'chilli' creation (in order to run conup/off and up/down scripts
1150
# user 'chilli' creation (in order to run conup/off and up/down scripts
1153
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1151
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1154
	if [ "$chilli_exist" == "1" ]
1152
	if [ "$chilli_exist" == "1" ]
1155
	then
1153
	then
1156
	      userdel -r chilli 2>/dev/null
1154
	      userdel -r chilli 2>/dev/null
1157
	fi
1155
	fi
1158
	groupadd -f chilli
1156
	groupadd -f chilli
1159
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1157
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1160
}  # End of chilli ()
1158
}  # End of chilli ()
1161
 
1159
 
1162
##################################################################
1160
##################################################################
1163
##		Fonction "dansguardian"				##
1161
##		Fonction "dansguardian"				##
1164
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1162
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1165
##################################################################
1163
##################################################################
1166
dansguardian ()
1164
dansguardian ()
1167
{
1165
{
1168
	mkdir /var/dansguardian
1166
	mkdir /var/dansguardian
1169
	chown dansguardian /var/dansguardian
1167
	chown dansguardian /var/dansguardian
1170
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1168
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1171
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1169
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1172
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1170
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1173
# By default the filter is off 
1171
# By default the filter is off 
1174
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1172
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1175
# French deny HTML page
1173
# French deny HTML page
1176
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1174
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1177
# Listen only on LAN side
1175
# Listen only on LAN side
1178
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1176
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1179
# DG send its flow to HAVP
1177
# DG send its flow to HAVP
1180
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1178
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1181
# replace the default deny HTML page
1179
# replace the default deny HTML page
1182
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1180
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1183
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1181
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1184
# Don't log
1182
# Don't log
1185
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1183
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1186
# Run 10 daemons (20 in largest server)
1184
# Run 10 daemons (20 in largest server)
1187
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1185
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1188
# on désactive par défaut le controle de contenu des pages html
1186
# on désactive par défaut le controle de contenu des pages html
1189
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1187
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1190
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1188
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1191
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1189
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1192
# on désactive par défaut le contrôle d'URL par expressions régulières
1190
# on désactive par défaut le contrôle d'URL par expressions régulières
1193
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1191
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1194
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1192
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1195
# on désactive par défaut le contrôle de téléchargement de fichiers
1193
# on désactive par défaut le contrôle de téléchargement de fichiers
1196
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1194
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1197
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1195
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1198
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1196
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1199
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1197
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1200
	touch $DIR_DG/lists/bannedextensionlist
1198
	touch $DIR_DG/lists/bannedextensionlist
1201
	touch $DIR_DG/lists/bannedmimetypelist
1199
	touch $DIR_DG/lists/bannedmimetypelist
1202
# 'Safesearch' regex actualisation
1200
# 'Safesearch' regex actualisation
1203
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1201
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1204
# empty LAN IP list that won't be WEB filtered
1202
# empty LAN IP list that won't be WEB filtered
1205
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1203
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1206
	touch $DIR_DG/lists/exceptioniplist
1204
	touch $DIR_DG/lists/exceptioniplist
1207
# Keep a copy of URL & domain filter configuration files
1205
# Keep a copy of URL & domain filter configuration files
1208
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1206
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1209
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1207
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1210
} # End of dansguardian ()
1208
} # End of dansguardian ()
1211
 
1209
 
1212
##################################################################
1210
##################################################################
1213
##			Fonction "antivirus"			##
1211
##			Fonction "antivirus"			##
1214
## - configuration of havp, libclamav and freshclam		##
1212
## - configuration of havp, libclamav and freshclam		##
1215
##################################################################
1213
##################################################################
1216
antivirus ()		
1214
antivirus ()		
1217
{
1215
{
1218
# create 'havp' user
1216
# create 'havp' user
1219
	havp_exist=`grep havp /etc/passwd|wc -l`
1217
	havp_exist=`grep havp /etc/passwd|wc -l`
1220
	if [ "$havp_exist" == "1" ]
1218
	if [ "$havp_exist" == "1" ]
1221
	then
1219
	then
1222
	      userdel -r havp 2>/dev/null
1220
	      userdel -r havp 2>/dev/null
1223
	      groupdel havp 2>/dev/null
1221
	      groupdel havp 2>/dev/null
1224
	fi
1222
	fi
1225
	groupadd -f havp
1223
	groupadd -f havp
1226
	useradd -r -g havp -s /bin/false -c "system user for havp" havp
1224
	useradd -r -g havp -s /bin/false -c "system user for havp" havp
1227
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1225
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1228
	mkdir -p /var/tmp/havp2 /var/log/havp2
1226
	mkdir -p /var/tmp/havp2 /var/log/havp2
1229
	chown -R havp /var/tmp/havp /var/log/havp /var/run/havp
1227
	chown -R havp /var/tmp/havp /var/log/havp /var/run/havp
1230
	chown -R havp /var/tmp/havp2 /var/log/havp2
1228
	chown -R havp /var/tmp/havp2 /var/log/havp2
1231
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1229
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1232
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1230
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1233
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile			
1231
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile			
1234
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode			
1232
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode			
1235
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on 8090			
1233
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on 8090			
1236
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1234
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1237
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1235
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1238
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1236
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1239
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1237
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1240
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1238
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1241
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1239
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1242
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1240
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1243
	cp /etc/havp/havp.config /etc/havp/havp2.config
1241
	cp /etc/havp/havp.config /etc/havp/havp2.config
1244
	$SED "s?^PIDFILE.*?PIDFILE /var/run/havp/havp2.pid?g" /etc/havp/havp2.config	# pidfile
1242
	$SED "s?^PIDFILE.*?PIDFILE /var/run/havp/havp2.pid?g" /etc/havp/havp2.config	# pidfile
1245
	$SED "s?^TRANSPARENT.*?TRANSPARENT true?g" /etc/havp/havp2.config		# transparent mode
1243
	$SED "s?^TRANSPARENT.*?TRANSPARENT true?g" /etc/havp/havp2.config		# transparent mode
1246
	$SED "s?^PORT.*?PORT 8091?g" /etc/havp/havp2.config				# datas come on 8091
1244
	$SED "s?^PORT.*?PORT 8091?g" /etc/havp/havp2.config				# datas come on 8091
1247
	$SED "s?^BIND_ADDRESS.*?BIND_ADDRESS 192.168.182.1?g" /etc/havp/havp2.config	# we listen only on tun0
1245
	$SED "s?^BIND_ADDRESS.*?BIND_ADDRESS 192.168.182.1?g" /etc/havp/havp2.config	# we listen only on tun0
1248
# skip checking of youtube flow (too heavy load / risk too low)
1246
# skip checking of youtube flow (too heavy load / risk too low)
1249
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1247
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1250
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1248
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1251
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1249
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1252
# replacement of init script
1250
# replacement of init script
1253
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1251
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1254
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1252
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1255
	cp /etc/init.d/havp /etc/init.d/havp2
1253
	cp /etc/init.d/havp /etc/init.d/havp2
1256
	$SED "s?^# description.*?# description: starts HAVP2 the High Availability Antivirus Proxy?g" /etc/init.d/havp2		# description
1254
	$SED "s?^# description.*?# description: starts HAVP2 the High Availability Antivirus Proxy?g" /etc/init.d/havp2		# description
1257
	$SED "s?^HAVP_CONFIG.*?HAVP_CONFIG=/etc/havp/havp2.config?g" /etc/init.d/havp2						# config file
1255
	$SED "s?^HAVP_CONFIG.*?HAVP_CONFIG=/etc/havp/havp2.config?g" /etc/init.d/havp2						# config file
1258
	$SED "s?^PIDFILE.*?PIDFILE=/var/run/havp/havp2.pid?g" /etc/init.d/havp2							# pidfile
1256
	$SED "s?^PIDFILE.*?PIDFILE=/var/run/havp/havp2.pid?g" /etc/init.d/havp2							# pidfile
1259
	$SED "s?^NAME.*?NAME=havp2?g" /etc/init.d/havp2										# name
1257
	$SED "s?^NAME.*?NAME=havp2?g" /etc/init.d/havp2										# name
1260
	$SED "s?^DESC.*?DESC=havp2?g" /etc/init.d/havp2										# desc
1258
	$SED "s?^DESC.*?DESC=havp2?g" /etc/init.d/havp2										# desc
1261
	#$SED "s?if [ -f /etc/sysconfig/havp ] ; then.*?if [ -f /etc/sysconfig/havp2 ] ; then?g" /etc/init.d/havp2		# defaults
1259
	#$SED "s?if [ -f /etc/sysconfig/havp ] ; then.*?if [ -f /etc/sysconfig/havp2 ] ; then?g" /etc/init.d/havp2		# defaults
1262
	#$SED "s?. /etc/sysconfig/havp.*?. /etc/sysconfig/havp2?g" /etc/init.d/havp2						# defaults
1260
	#$SED "s?. /etc/sysconfig/havp.*?. /etc/sysconfig/havp2?g" /etc/init.d/havp2						# defaults
1263
	$SED "s?^havp_mountpoint.*?havp_mountpoint=/var/tmp/havp2?g" /etc/init.d/havp2						# mountpoint
1261
	$SED "s?^havp_mountpoint.*?havp_mountpoint=/var/tmp/havp2?g" /etc/init.d/havp2						# mountpoint
1264
	$SED "s?echo \"Reloading HAVP ...\".*?echo \"Reloading HAVP2 ...\"?g" /etc/init.d/havp2					# reloading havp
1262
	$SED "s?echo \"Reloading HAVP ...\".*?echo \"Reloading HAVP2 ...\"?g" /etc/init.d/havp2					# reloading havp
1265
	$SED "s?echo \"Error: HAVP not running\".*?echo \"Error : HAVP2 not running\"?g" /etc/init.d/havp2			# error havp
1263
	$SED "s?echo \"Error: HAVP not running\".*?echo \"Error : HAVP2 not running\"?g" /etc/init.d/havp2			# error havp
1266
	$SED "s?echo \"Error: HAVP not running or PIDFILE not readable\".*?echo \"Error : HAVP2 not running or PIDFILE not readable\"?g" /etc/init.d/havp2 # error havp
1264
	$SED "s?echo \"Error: HAVP not running or PIDFILE not readable\".*?echo \"Error : HAVP2 not running or PIDFILE not readable\"?g" /etc/init.d/havp2 # error havp
1267
	$SED "s?echo \"Error: HAVP not running or PIDFILE unreadable\".*?echo \"Error : HAVP2 not running or PIDFILE unreadable\"?g" /etc/init.d/havp2 # error havp
1265
	$SED "s?echo \"Error: HAVP not running or PIDFILE unreadable\".*?echo \"Error : HAVP2 not running or PIDFILE unreadable\"?g" /etc/init.d/havp2 # error havp
1268
	$SED "s?echo \"Shutting down HAVP ...\".*?echo \"Shutting down HAVP2 ...\"?g" /etc/init.d/havp2 			# shutting down havp
1266
	$SED "s?echo \"Shutting down HAVP ...\".*?echo \"Shutting down HAVP2 ...\"?g" /etc/init.d/havp2 			# shutting down havp
1269
	$SED "s?status havp.*?status havp2?g" /etc/init.d/havp2 								# status havp
1267
	$SED "s?status havp.*?status havp2?g" /etc/init.d/havp2 								# status havp
1270
# replace of the intercept page (template)
1268
# replace of the intercept page (template)
1271
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1269
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1272
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1270
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1273
# update virus database every 4 hours (24h/6)
1271
# update virus database every 4 hours (24h/6)
1274
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1272
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1275
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1273
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1276
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1274
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1277
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1275
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1278
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1276
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1279
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1277
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1280
# update now
1278
# update now
1281
	/usr/bin/freshclam --no-warnings
1279
	/usr/bin/freshclam --no-warnings
1282
} # End of antivirus ()
1280
} # End of antivirus ()
1283
 
1281
 
1284
##################################################################################
1282
##################################################################################
1285
##			function "ulogd"					##
1283
##			function "ulogd"					##
1286
## - Ulog config for multi-log files 						##
1284
## - Ulog config for multi-log files 						##
1287
##################################################################################
1285
##################################################################################
1288
ulogd ()
1286
ulogd ()
1289
{
1287
{
1290
# Three instances of ulogd (three different logfiles)
1288
# Three instances of ulogd (three different logfiles)
1291
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1289
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1292
	nl=1
1290
	nl=1
1293
	for log_type in traceability ssh ext-access
1291
	for log_type in traceability ssh ext-access
1294
	do
1292
	do
1295
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1293
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1296
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1294
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1297
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1295
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1298
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1296
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1299
		cat << EOF >> /etc/ulogd-$log_type.conf
1297
		cat << EOF >> /etc/ulogd-$log_type.conf
1300
[emu1]
1298
[emu1]
1301
file="/var/log/firewall/$log_type.log"
1299
file="/var/log/firewall/$log_type.log"
1302
sync=1
1300
sync=1
1303
EOF
1301
EOF
1304
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1302
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1305
		nl=`expr $nl + 1`
1303
		nl=`expr $nl + 1`
1306
	done
1304
	done
1307
	chown -R root:apache /var/log/firewall
1305
	chown -R root:apache /var/log/firewall
1308
	chmod 750 /var/log/firewall
1306
	chmod 750 /var/log/firewall
1309
	chmod 640 /var/log/firewall/*
1307
	chmod 640 /var/log/firewall/*
1310
}  # End of ulogd ()
1308
}  # End of ulogd ()
1311
 
1309
 
1312
 
1310
 
1313
##########################################################
1311
##########################################################
1314
##              Function "nfsen"			##
1312
##              Function "nfsen"			##
1315
##########################################################
1313
##########################################################
1316
nfsen()
1314
nfsen()
1317
{
1315
{
1318
	tar xzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1316
	tar xzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1319
# Add PortTracker plugin
1317
# Add PortTracker plugin
1320
	for i in /var/www/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1318
	for i in /var/www/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1321
	do
1319
	do
1322
	[ ! -d $i ] && mkdir $i && chown -R apache:apache $i && echo "$i created" || echo "$i already exists"
1320
	[ ! -d $i ] && mkdir $i && chown -R apache:apache $i && echo "$i created" || echo "$i already exists"
1323
	done
1321
	done
1324
	cp -f $DIR_CONF/nfsen/PortTracker.pm /tmp/nfsen-1.3.6p1/contrib/PortTracker/
1322
	cp -f $DIR_CONF/nfsen/PortTracker.pm /tmp/nfsen-1.3.6p1/contrib/PortTracker/
1325
# use of our conf file and init unit
1323
# use of our conf file and init unit
1326
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1324
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1327
# Installation of nfsen
1325
# Installation of nfsen
1328
	DirTmp=$(pwd)
1326
	DirTmp=$(pwd)
1329
	cd /tmp/nfsen-1.3.6p1/
1327
	cd /tmp/nfsen-1.3.6p1/
1330
	/usr/bin/perl5 install.pl etc/nfsen.conf
1328
	/usr/bin/perl5 install.pl etc/nfsen.conf
1331
	/usr/bin/perl5 install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1329
	/usr/bin/perl5 install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1332
# Create RRD DB for porttracker (only in it still doesn't exist)
1330
# Create RRD DB for porttracker (only in it still doesn't exist)
1333
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1331
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1334
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/nfsen/plugins/
1332
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/nfsen/plugins/
1335
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1333
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1336
	chmod -R 770 /var/log/netflow/porttracker
1334
	chmod -R 770 /var/log/netflow/porttracker
1337
# Apache conf file
1335
# Apache conf file
1338
	cat << EOF > /etc/httpd/conf/conf.d/nfsen.conf
1336
	cat << EOF > /etc/httpd/conf/conf.d/nfsen.conf
1339
Alias /nfsen /var/www/nfsen 
1337
Alias /nfsen /var/www/nfsen 
1340
<Directory /var/www/nfsen/> 
1338
<Directory /var/www/nfsen/> 
1341
DirectoryIndex nfsen.php 
1339
DirectoryIndex nfsen.php 
1342
Options -Indexes 
1340
Options -Indexes 
1343
AllowOverride all 
1341
AllowOverride all 
1344
order allow,deny 
1342
order allow,deny 
1345
allow from all 
1343
allow from all 
1346
AddType application/x-httpd-php .php 
1344
AddType application/x-httpd-php .php 
1347
php_flag magic_quotes_gpc on 
1345
php_flag magic_quotes_gpc on 
1348
php_flag track_vars on 
1346
php_flag track_vars on 
1349
</Directory>
1347
</Directory>
1350
EOF
1348
EOF
1351
# nfsen unit for systemd
1349
# nfsen unit for systemd
1352
cat << EOF > /lib/systemd/system/nfsen.service
1350
cat << EOF > /lib/systemd/system/nfsen.service
1353
#  This file is part of systemd.
1351
#  This file is part of systemd.
1354
#
1352
#
1355
#  systemd is free software; you can redistribute it and/or modify it
1353
#  systemd is free software; you can redistribute it and/or modify it
1356
#  under the terms of the GNU General Public License as published by
1354
#  under the terms of the GNU General Public License as published by
1357
#  the Free Software Foundation; either version 2 of the License, or
1355
#  the Free Software Foundation; either version 2 of the License, or
1358
#  (at your option) any later version.
1356
#  (at your option) any later version.
1359
 
1357
 
1360
# This unit launches nfsen (a Netflow grapher).
1358
# This unit launches nfsen (a Netflow grapher).
1361
[Unit]
1359
[Unit]
1362
Description= NfSen init script
1360
Description= NfSen init script
1363
After=network.target iptables.service
1361
After=network.target iptables.service
1364
 
1362
 
1365
[Service]
1363
[Service]
1366
Type=oneshot
1364
Type=oneshot
1367
RemainAfterExit=yes
1365
RemainAfterExit=yes
1368
PIDFile=/var/run/nfsen/nfsen.pid
1366
PIDFile=/var/run/nfsen/nfsen.pid
1369
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1367
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1370
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1368
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1371
ExecStart=/usr/bin/nfsen start 
1369
ExecStart=/usr/bin/nfsen start 
1372
ExecStop=/usr/bin/nfsen stop
1370
ExecStop=/usr/bin/nfsen stop
1373
ExecReload=/usr/bin/nfsen restart
1371
ExecReload=/usr/bin/nfsen restart
1374
TimeoutSec=0
1372
TimeoutSec=0
1375
 
1373
 
1376
[Install]
1374
[Install]
1377
WantedBy=multi-user.target
1375
WantedBy=multi-user.target
1378
EOF
1376
EOF
1379
# Add the listen port to collect netflow packet (nfcapd)
1377
# Add the listen port to collect netflow packet (nfcapd)
1380
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1378
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1381
# expire delay for the profile "live"
1379
# expire delay for the profile "live"
1382
	systemctl start nfsen
1380
	systemctl start nfsen
1383
	/bin/nfsen -m live -e 62d 2>/dev/null
1381
	/bin/nfsen -m live -e 62d 2>/dev/null
1384
# add SURFmap plugin
1382
# add SURFmap plugin
1385
	tar xzf $DIR_CONF/nfsen/SURFmap_v3.3b1.tar.gz -C /tmp/
1383
	tar xzf $DIR_CONF/nfsen/SURFmap_v3.3b1.tar.gz -C /tmp/
1386
	cp $DIR_CONF/nfsen/install-surfmap.sh /tmp/SURFmap/install.sh
1384
	cp $DIR_CONF/nfsen/install-surfmap.sh /tmp/SURFmap/install.sh
1387
	cd /tmp/SURFmap
1385
	cd /tmp/SURFmap
1388
	/usr/bin/sh install.sh
1386
	/usr/bin/sh install.sh
1389
 
1387
 
1390
# clear the installation
1388
# clear the installation
1391
	cd $DirTmp
1389
	cd $DirTmp
1392
	rm -rf /tmp/nfsen-1.3.6p1/
1390
	rm -rf /tmp/nfsen-1.3.6p1/
1393
	rm -rf /tmp/SURFmap/
1391
	rm -rf /tmp/SURFmap/
1394
} # End of nfsen ()
1392
} # End of nfsen ()
1395
 
1393
 
1396
##################################################
1394
##################################################
1397
##		Function "dnsmasq"		##
1395
##		Function "dnsmasq"		##
1398
##################################################
1396
##################################################
1399
dnsmasq ()
1397
dnsmasq ()
1400
{
1398
{
1401
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1399
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1402
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1400
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1403
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1401
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1404
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1402
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1405
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1403
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1406
	cat << EOF > /etc/dnsmasq.conf 
1404
	cat << EOF > /etc/dnsmasq.conf 
1407
# Configuration file for "dnsmasq in forward mode"
1405
# Configuration file for "dnsmasq in forward mode"
1408
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1406
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1409
listen-address=$PRIVATE_IP
1407
listen-address=$PRIVATE_IP
1410
pid-file=/var/run/dnsmasq.pid
1408
pid-file=/var/run/dnsmasq.pid
1411
listen-address=127.0.0.1
1409
listen-address=127.0.0.1
1412
no-dhcp-interface=$INTIF
1410
no-dhcp-interface=$INTIF
1413
no-dhcp-interface=tun0
1411
no-dhcp-interface=tun0
1414
no-dhcp-interface=lo
1412
no-dhcp-interface=lo
1415
bind-interfaces
1413
bind-interfaces
1416
cache-size=256
1414
cache-size=256
1417
domain=$DOMAIN
1415
domain=$DOMAIN
1418
domain-needed
1416
domain-needed
1419
expand-hosts
1417
expand-hosts
1420
bogus-priv
1418
bogus-priv
1421
filterwin2k
1419
filterwin2k
1422
server=$DNS1
1420
server=$DNS1
1423
server=$DNS2
1421
server=$DNS2
1424
# DHCP service is configured. It will be enabled in "bypass" mode
1422
# DHCP service is configured. It will be enabled in "bypass" mode
1425
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1423
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1426
dhcp-option=option:router,$PRIVATE_IP
1424
dhcp-option=option:router,$PRIVATE_IP
1427
#dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5
1425
#dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5
1428
 
1426
 
1429
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1427
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1430
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1428
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1431
EOF
1429
EOF
1432
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1430
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1433
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1431
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1434
# Configuration file for "dnsmasq with blacklist"
1432
# Configuration file for "dnsmasq with blacklist"
1435
# Add Toulouse blacklist domains
1433
# Add Toulouse blacklist domains
1436
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1434
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1437
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1435
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1438
pid-file=/var/run/dnsmasq-blacklist.pid
1436
pid-file=/var/run/dnsmasq-blacklist.pid
1439
listen-address=$PRIVATE_IP
1437
listen-address=$PRIVATE_IP
1440
port=54
1438
port=54
1441
no-dhcp-interface=$INTIF
1439
no-dhcp-interface=$INTIF
1442
no-dhcp-interface=tun0
1440
no-dhcp-interface=tun0
1443
no-dhcp-interface=lo
1441
no-dhcp-interface=lo
1444
bind-interfaces
1442
bind-interfaces
1445
cache-size=256
1443
cache-size=256
1446
domain=$DOMAIN
1444
domain=$DOMAIN
1447
domain-needed
1445
domain-needed
1448
expand-hosts
1446
expand-hosts
1449
bogus-priv
1447
bogus-priv
1450
filterwin2k
1448
filterwin2k
1451
server=$DNS1
1449
server=$DNS1
1452
server=$DNS2
1450
server=$DNS2
1453
EOF
1451
EOF
1454
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1452
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1455
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1453
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1456
# Configuration file for "dnsmasq with whitelist"
1454
# Configuration file for "dnsmasq with whitelist"
1457
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1455
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1458
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1456
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1459
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1457
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1460
pid-file=/var/run/dnsmasq-whitelist.pid
1458
pid-file=/var/run/dnsmasq-whitelist.pid
1461
listen-address=$PRIVATE_IP
1459
listen-address=$PRIVATE_IP
1462
port=55
1460
port=55
1463
no-dhcp-interface=$INTIF
1461
no-dhcp-interface=$INTIF
1464
no-dhcp-interface=tun0
1462
no-dhcp-interface=tun0
1465
no-dhcp-interface=lo
1463
no-dhcp-interface=lo
1466
bind-interfaces
1464
bind-interfaces
1467
cache-size=256
1465
cache-size=256
1468
domain=$DOMAIN
1466
domain=$DOMAIN
1469
domain-needed
1467
domain-needed
1470
expand-hosts
1468
expand-hosts
1471
bogus-priv
1469
bogus-priv
1472
filterwin2k
1470
filterwin2k
1473
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1471
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1474
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1472
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1475
EOF
1473
EOF
1476
# 4th dnsmasq listen on udp 56 ("blackhole")
1474
# 4th dnsmasq listen on udp 56 ("blackhole")
1477
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1475
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1478
# Configuration file for "dnsmasq as a blackhole"
1476
# Configuration file for "dnsmasq as a blackhole"
1479
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1477
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1480
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1478
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1481
pid-file=/var/run/dnsmasq-blackhole.pid
1479
pid-file=/var/run/dnsmasq-blackhole.pid
1482
listen-address=$PRIVATE_IP
1480
listen-address=$PRIVATE_IP
1483
port=56
1481
port=56
1484
no-dhcp-interface=$INTIF
1482
no-dhcp-interface=$INTIF
1485
no-dhcp-interface=tun0
1483
no-dhcp-interface=tun0
1486
no-dhcp-interface=lo
1484
no-dhcp-interface=lo
1487
bind-interfaces
1485
bind-interfaces
1488
cache-size=256
1486
cache-size=256
1489
domain=$DOMAIN
1487
domain=$DOMAIN
1490
domain-needed
1488
domain-needed
1491
expand-hosts
1489
expand-hosts
1492
bogus-priv
1490
bogus-priv
1493
filterwin2k
1491
filterwin2k
1494
EOF
1492
EOF
1495
 
1493
 
1496
# Start after chilli (which create tun0)
1494
# Start after chilli (which create tun0)
1497
	$SED "s?^After=.*?After=syslog.target network.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1495
	$SED "s?^After=.*?After=syslog.target network.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1498
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1496
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1499
	for list in blacklist whitelist blackhole
1497
	for list in blacklist whitelist blackhole
1500
	do
1498
	do
1501
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1499
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1502
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1500
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1503
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1501
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1504
	done
1502
	done
1505
} # End dnsmasq
1503
} # End dnsmasq
1506
 
1504
 
1507
##########################################################
1505
##########################################################
1508
##		Fonction "BL"				##
1506
##		Fonction "BL"				##
1509
##########################################################
1507
##########################################################
1510
BL ()
1508
BL ()
1511
{
1509
{
1512
# modify iptables boot file to start alcasar-iptables.sh when the system is booting
1510
# modify iptables boot file to start alcasar-iptables.sh when the system is booting
1513
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
1511
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
1514
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
1512
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
1515
# copy and extract toulouse BL
1513
# copy and extract toulouse BL
1516
	rm -rf $DIR_DG/lists/blacklists
1514
	rm -rf $DIR_DG/lists/blacklists
1517
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1515
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1518
# creation of the OSSI BL and WL categories (domain name and url)
1516
# creation of the OSSI BL and WL categories (domain name and url)
1519
	mkdir $DIR_DG/lists/blacklists/ossi
1517
	mkdir $DIR_DG/lists/blacklists/ossi
1520
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1518
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1521
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1519
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1522
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1520
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1523
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1521
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1524
# creation of file for the rehabilited domains and urls
1522
# creation of file for the rehabilited domains and urls
1525
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1523
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1526
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1524
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1527
	touch $DIR_DG/lists/exceptionsitelist
1525
	touch $DIR_DG/lists/exceptionsitelist
1528
	touch $DIR_DG/lists/exceptionurllist
1526
	touch $DIR_DG/lists/exceptionurllist
1529
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1527
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1530
	cat <<EOF > $DIR_DG/lists/bannedurllist
1528
	cat <<EOF > $DIR_DG/lists/bannedurllist
1531
# Dansguardian filter config for ALCASAR
1529
# Dansguardian filter config for ALCASAR
1532
EOF
1530
EOF
1533
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1531
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1534
# Dansguardian domain filter config for ALCASAR
1532
# Dansguardian domain filter config for ALCASAR
1535
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1533
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1536
#**
1534
#**
1537
# block all SSL and CONNECT tunnels
1535
# block all SSL and CONNECT tunnels
1538
**s
1536
**s
1539
# block all SSL and CONNECT tunnels specified only as an IP
1537
# block all SSL and CONNECT tunnels specified only as an IP
1540
*ips
1538
*ips
1541
# block all sites specified only by an IP
1539
# block all sites specified only by an IP
1542
*ip
1540
*ip
1543
EOF
1541
EOF
1544
# Add Bing and Youtube to the safesearch url regext list (parental control)
1542
# Add Bing and Youtube to the safesearch url regext list (parental control)
1545
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1543
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1546
# Bing - add 'adlt=strict'
1544
# Bing - add 'adlt=strict'
1547
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1545
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1548
# Youtube - add 'edufilter=your_ID' 
1546
# Youtube - add 'edufilter=your_ID' 
1549
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1547
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1550
EOF
1548
EOF
1551
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1549
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1552
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1550
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1553
# adapt the BL to ALCASAR architecture. Enable the default categories
1551
# adapt the BL to ALCASAR architecture. Enable the default categories
1554
	if [ "$mode" != "update" ]; then
1552
	if [ "$mode" != "update" ]; then
1555
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1553
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1556
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1554
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1557
# !!! we can be banned by DNS server (waiting for a cool solution	$DIR_DEST_SBIN/alcasar-bl.sh --ip_retrieving
1555
# !!! we can be banned by DNS server (waiting for a cool solution	$DIR_DEST_SBIN/alcasar-bl.sh --ip_retrieving
1558
	fi
1556
	fi
1559
}
1557
}
1560
 
1558
 
1561
##########################################################
1559
##########################################################
1562
##		Fonction "cron"				##
1560
##		Fonction "cron"				##
1563
## - Mise en place des différents fichiers de cron	##
1561
## - Mise en place des différents fichiers de cron	##
1564
##########################################################
1562
##########################################################
1565
cron ()
1563
cron ()
1566
{
1564
{
1567
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1565
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1568
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1566
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1569
	cat <<EOF > /etc/crontab
1567
	cat <<EOF > /etc/crontab
1570
SHELL=/bin/bash
1568
SHELL=/bin/bash
1571
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1569
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1572
MAILTO=root
1570
MAILTO=root
1573
HOME=/
1571
HOME=/
1574
 
1572
 
1575
# run-parts
1573
# run-parts
1576
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1574
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1577
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1575
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1578
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1576
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1579
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1577
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1580
EOF
1578
EOF
1581
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1579
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1582
	cat <<EOF >> /etc/anacrontab
1580
	cat <<EOF >> /etc/anacrontab
1583
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1581
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1584
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1582
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1585
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1583
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1586
EOF
1584
EOF
1587
 
1585
 
1588
	cat <<EOF > /etc/cron.d/alcasar-mysql
1586
	cat <<EOF > /etc/cron.d/alcasar-mysql
1589
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1587
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1590
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1588
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1591
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1589
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1592
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1590
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1593
EOF
1591
EOF
1594
	cat <<EOF > /etc/cron.d/alcasar-archive
1592
	cat <<EOF > /etc/cron.d/alcasar-archive
1595
# Archive des logs et de la base de données (tous les lundi à 5h35)
1593
# Archive des logs et de la base de données (tous les lundi à 5h35)
1596
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1594
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1597
EOF
1595
EOF
1598
	cat << EOF > /etc/cron.d/alcasar-clean_import
1596
	cat << EOF > /etc/cron.d/alcasar-clean_import
1599
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1597
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1600
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1598
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1601
EOF
1599
EOF
1602
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1600
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1603
# mise à jour automatique de la distribution tous les jours 3h30
1601
# mise à jour automatique de la distribution tous les jours 3h30
1604
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1602
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1605
EOF
1603
EOF
1606
	#cat << EOF > /etc/cron.d/alcasar-netflow
1604
	#cat << EOF > /etc/cron.d/alcasar-netflow
1607
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1605
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1608
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1606
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1609
#EOF
1607
#EOF
1610
 
1608
 
1611
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1609
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1612
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1610
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1613
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1611
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1614
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1612
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1615
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1613
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1616
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1614
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1617
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1615
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1618
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1616
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1619
	rm -f /etc/cron.daily/freeradius-web
1617
	rm -f /etc/cron.daily/freeradius-web
1620
	rm -f /etc/cron.monthly/freeradius-web
1618
	rm -f /etc/cron.monthly/freeradius-web
1621
	cat << EOF > /etc/cron.d/freeradius-web
1619
	cat << EOF > /etc/cron.d/freeradius-web
1622
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1620
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1623
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1621
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1624
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1622
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1625
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1623
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1626
EOF
1624
EOF
1627
	cat << EOF > /etc/cron.d/alcasar-watchdog
1625
	cat << EOF > /etc/cron.d/alcasar-watchdog
1628
# activation du "chien de garde" (watchdog) toutes les 3'
1626
# activation du "chien de garde" (watchdog) toutes les 3'
1629
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1627
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1630
EOF
1628
EOF
1631
# activation du "chien de garde des services" (watchdog) toutes les 18'
1629
# activation du "chien de garde des services" (watchdog) toutes les 18'
1632
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1630
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1633
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1631
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1634
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1632
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1635
EOF
1633
EOF
1636
# suppression des crons usagers
1634
# suppression des crons usagers
1637
	rm -f /var/spool/cron/*
1635
	rm -f /var/spool/cron/*
1638
} # End cron
1636
} # End cron
1639
 
1637
 
1640
##################################################################
1638
##################################################################
1641
## 			Fonction "Fail2Ban"			##
1639
## 			Fonction "Fail2Ban"			##
1642
##- Modification de la configuration de fail2ban		##
1640
##- Modification de la configuration de fail2ban		##
1643
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1641
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1644
##################################################################
1642
##################################################################
1645
fail2ban()
1643
fail2ban()
1646
{
1644
{
1647
	$DIR_CONF/fail2ban.sh
1645
	$DIR_CONF/fail2ban.sh
1648
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1646
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1649
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1647
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1650
	[ -e /var/Save/logs/security/watchdog.log ] || touch /var/Save/logs/security/watchdog.log
1648
	[ -e /var/Save/logs/security/watchdog.log ] || touch /var/Save/logs/security/watchdog.log
1651
	chmod 644 /var/log/fail2ban.log
1649
	chmod 644 /var/log/fail2ban.log
1652
	chmod 644 /var/Save/logs/security/watchdog.log
1650
	chmod 644 /var/Save/logs/security/watchdog.log
1653
	/usr/bin/touch /var/log/auth.log
1651
	/usr/bin/touch /var/log/auth.log
1654
	
1652
	
1655
 
1653
 
1656
# Edition de l'unité fail2ban
1654
# Edition de l'unité fail2ban
1657
[ -e /usr/lib/systemd/system/fail2ban.service ] && cp /usr/lib/systemd/system/fail2ban.service /usr/lib/systemd/system/fail2ban.service.default
1655
[ -e /usr/lib/systemd/system/fail2ban.service ] && cp /usr/lib/systemd/system/fail2ban.service /usr/lib/systemd/system/fail2ban.service.default
1658
$SED '/Type/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1656
$SED '/Type/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1659
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1657
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1660
 
1658
 
1661
 
1659
 
1662
} #Fin de fail2ban_install()
1660
} #Fin de fail2ban_install()
1663
 
1661
 
1664
##################################################################
1662
##################################################################
1665
## 			Fonction "gammu_smsd"			##
1663
## 			Fonction "gammu_smsd"			##
1666
## - Creation de la base de donnée Gammu			##
1664
## - Creation de la base de donnée Gammu			##
1667
## - Creation du fichier de config: gammu_smsd_conf		##
1665
## - Creation du fichier de config: gammu_smsd_conf		##
1668
##								##
1666
##								##
1669
##################################################################
1667
##################################################################
1670
gammu_smsd()
1668
gammu_smsd()
1671
{
1669
{
1672
# Create 'gammu' databse
1670
# Create 'gammu' databse
1673
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1671
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1674
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1672
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1675
# Add a gammu database structure
1673
# Add a gammu database structure
1676
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1674
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1677
 
1675
 
1678
# config file for the daemon
1676
# config file for the daemon
1679
cat << EOF > /etc/gammu_smsd_conf
1677
cat << EOF > /etc/gammu_smsd_conf
1680
[gammu]
1678
[gammu]
1681
port = /dev/ttyUSB0
1679
port = /dev/ttyUSB0
1682
connection = at115200
1680
connection = at115200
1683
 
1681
 
1684
;########################################################
1682
;########################################################
1685
 
1683
 
1686
[smsd]
1684
[smsd]
1687
 
1685
 
1688
PIN = 1234
1686
PIN = 1234
1689
 
1687
 
1690
logfile = /var/log/gammu-smsd/gammu-smsd.log
1688
logfile = /var/log/gammu-smsd/gammu-smsd.log
1691
logformat = textall
1689
logformat = textall
1692
debuglevel = 0
1690
debuglevel = 0
1693
 
1691
 
1694
service = sql
1692
service = sql
1695
driver = native_mysql
1693
driver = native_mysql
1696
user = $DB_USER
1694
user = $DB_USER
1697
password = $radiuspwd
1695
password = $radiuspwd
1698
pc = localhost
1696
pc = localhost
1699
database = $DB_GAMMU
1697
database = $DB_GAMMU
1700
 
1698
 
1701
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1699
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1702
 
1700
 
1703
StatusFrequency = 30
1701
StatusFrequency = 30
1704
;LoopSleep = 2
1702
;LoopSleep = 2
1705
 
1703
 
1706
;ResetFrequency = 300
1704
;ResetFrequency = 300
1707
;HardResetFrequency = 120
1705
;HardResetFrequency = 120
1708
 
1706
 
1709
CheckSecurity = 1 
1707
CheckSecurity = 1 
1710
CheckSignal = 1
1708
CheckSignal = 1
1711
CheckBattery = 0
1709
CheckBattery = 0
1712
EOF
1710
EOF
1713
 
1711
 
1714
chmod 755 /etc/gammu_smsd_conf
1712
chmod 755 /etc/gammu_smsd_conf
1715
 
1713
 
1716
#Creation dossier de log Gammu-smsd
1714
#Creation dossier de log Gammu-smsd
1717
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1715
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1718
chmod 755 /var/log/gammu-smsd
1716
chmod 755 /var/log/gammu-smsd
1719
 
1717
 
1720
#Edition du script sql gammu <-> radius
1718
#Edition du script sql gammu <-> radius
1721
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1719
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1722
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1720
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1723
 
1721
 
1724
#Création de la règle udev pour les Huawei // idVendor: 12d1
1722
#Création de la règle udev pour les Huawei // idVendor: 12d1
1725
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1723
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1726
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1724
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1727
EOF
1725
EOF
1728
 
1726
 
1729
} # END gammu_smsd()
1727
} # END gammu_smsd()
1730
 
1728
 
1731
##################################################################
1729
##################################################################
1732
##			Fonction "post_install"			##
1730
##			Fonction "post_install"			##
1733
## - Modification des bannières (locales et ssh) et des prompts ##
1731
## - Modification des bannières (locales et ssh) et des prompts ##
1734
## - Installation de la structure de chiffrement pour root	##
1732
## - Installation de la structure de chiffrement pour root	##
1735
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1733
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1736
## - Mise en place du la rotation des logs			##
1734
## - Mise en place du la rotation des logs			##
1737
## - Configuration dans le cas d'une mise à jour		##
1735
## - Configuration dans le cas d'une mise à jour		##
1738
##################################################################
1736
##################################################################
1739
post_install()
1737
post_install()
1740
{
1738
{
1741
# création de la bannière locale
1739
# création de la bannière locale
1742
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1740
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1743
	cp -f $DIR_CONF/banner /etc/mageia-release
1741
	cp -f $DIR_CONF/banner /etc/mageia-release
1744
	echo " V$VERSION" >> /etc/mageia-release
1742
	echo " V$VERSION" >> /etc/mageia-release
1745
# création de la bannière SSH
1743
# création de la bannière SSH
1746
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1744
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1747
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1745
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1748
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1746
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1749
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1747
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1750
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1748
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1751
# postfix banner anonymisation
1749
# postfix banner anonymisation
1752
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1750
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1753
# sshd écoute côté LAN et WAN
1751
# sshd écoute côté LAN et WAN
1754
	$SED "s?^#ListenAddress 0\.0\.0\.0?ListenAddress $PRIVATE_IP?g" /etc/ssh/sshd_config
1752
	$SED "s?^#ListenAddress 0\.0\.0\.0?ListenAddress $PRIVATE_IP?g" /etc/ssh/sshd_config
1755
	$SED "/^ListenAddress $PRIVATE_IP/a\ListenAddress $PUBLIC_IP" /etc/ssh/sshd_config 
1753
	$SED "/^ListenAddress $PRIVATE_IP/a\ListenAddress $PUBLIC_IP" /etc/ssh/sshd_config 
1756
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1754
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1757
	echo "SSH=off" >> $CONF_FILE
1755
	echo "SSH=off" >> $CONF_FILE
1758
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1756
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1759
	echo "QOS=off" >> $CONF_FILE
1757
	echo "QOS=off" >> $CONF_FILE
1760
	echo "LDAP=off" >> $CONF_FILE
1758
	echo "LDAP=off" >> $CONF_FILE
1761
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1759
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1762
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1760
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1763
	echo "MULTIWAN=off" >> $CONF_FILE
1761
	echo "MULTIWAN=off" >> $CONF_FILE
1764
	echo "FAILOVER=30" >> $CONF_FILE
1762
	echo "FAILOVER=30" >> $CONF_FILE
1765
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1763
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1766
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1764
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1767
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1765
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1768
# Coloration des prompts
1766
# Coloration des prompts
1769
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1767
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1770
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1768
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1771
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1769
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1772
# Droits d'exécution pour utilisateur apache et sysadmin
1770
# Droits d'exécution pour utilisateur apache et sysadmin
1773
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1771
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1774
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1772
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1775
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1773
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1776
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, radiusd, ulogd)
1774
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, radiusd, ulogd)
1777
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1775
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1778
	chmod 644 /etc/logrotate.d/*
1776
	chmod 644 /etc/logrotate.d/*
1779
# rectification sur versions précédentes de la compression des logs
1777
# rectification sur versions précédentes de la compression des logs
1780
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1778
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1781
# actualisation des fichiers logs compressés
1779
# actualisation des fichiers logs compressés
1782
	for dir in firewall dansguardian httpd
1780
	for dir in firewall dansguardian httpd
1783
	do
1781
	do
1784
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1782
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1785
	done
1783
	done
1786
# create the alcasar-load_balancing unit
1784
# create the alcasar-load_balancing unit
1787
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1785
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1788
#  This file is part of systemd.
1786
#  This file is part of systemd.
1789
#
1787
#
1790
#  systemd is free software; you can redistribute it and/or modify it
1788
#  systemd is free software; you can redistribute it and/or modify it
1791
#  under the terms of the GNU General Public License as published by
1789
#  under the terms of the GNU General Public License as published by
1792
#  the Free Software Foundation; either version 2 of the License, or
1790
#  the Free Software Foundation; either version 2 of the License, or
1793
#  (at your option) any later version.
1791
#  (at your option) any later version.
1794
 
1792
 
1795
# This unit lauches alcasar-load-balancing.sh script.
1793
# This unit lauches alcasar-load-balancing.sh script.
1796
[Unit]
1794
[Unit]
1797
Description=alcasar-load_balancing.sh execution
1795
Description=alcasar-load_balancing.sh execution
1798
After=network.target iptables.service
1796
After=network.target iptables.service
1799
 
1797
 
1800
[Service]
1798
[Service]
1801
Type=oneshot
1799
Type=oneshot
1802
RemainAfterExit=yes
1800
RemainAfterExit=yes
1803
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1801
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1804
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1802
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1805
TimeoutSec=0
1803
TimeoutSec=0
1806
SysVStartPriority=99
1804
SysVStartPriority=99
1807
 
1805
 
1808
[Install]
1806
[Install]
1809
WantedBy=multi-user.target
1807
WantedBy=multi-user.target
1810
EOF
1808
EOF
1811
# processes launched at boot time (SYSV)
1809
# processes launched at boot time (SYSV)
1812
	for i in havp 
1810
	for i in havp 
1813
	do
1811
	do
1814
		/sbin/chkconfig --add $i
1812
		/sbin/chkconfig --add $i
1815
	done
1813
	done
1816
# processes launched at boot time (Systemctl)
1814
# processes launched at boot time (Systemctl)
1817
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban
1815
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban
1818
	do
1816
	do
1819
		systemctl -q enable $i.service
1817
		systemctl -q enable $i.service
1820
	done
1818
	done
1821
	
1819
	
1822
# disable processes at boot time (Systemctl)
1820
# disable processes at boot time (Systemctl)
1823
	for i in ulogd
1821
	for i in ulogd
1824
	do
1822
	do
1825
		systemctl -q disable $i.service
1823
		systemctl -q disable $i.service
1826
	done
1824
	done
1827
	
1825
	
1828
# Apply French Security Agency (ANSSI) rules
1826
# Apply French Security Agency (ANSSI) rules
1829
# ignore ICMP broadcast (smurf attack)
1827
# ignore ICMP broadcast (smurf attack)
1830
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1828
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1831
# ignore ICMP errors bogus
1829
# ignore ICMP errors bogus
1832
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1830
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1833
# remove ICMP redirects responces
1831
# remove ICMP redirects responces
1834
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1832
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1835
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1833
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1836
# enable SYN Cookies (Syn flood attacks)
1834
# enable SYN Cookies (Syn flood attacks)
1837
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1835
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1838
# enable kernel antispoofing
1836
# enable kernel antispoofing
1839
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1837
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1840
# ignore source routing
1838
# ignore source routing
1841
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1839
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1842
# set conntrack timer to 1h (3600s) instead of 5 weeks
1840
# set conntrack timer to 1h (3600s) instead of 5 weeks
1843
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1841
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1844
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1842
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1845
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1843
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1846
# remove Magic SysReq Keys
1844
# remove Magic SysReq Keys
1847
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1845
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1848
# switch to multi-users runlevel (instead of x11)
1846
# switch to multi-users runlevel (instead of x11)
1849
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1847
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1850
#	GRUB modifications
1848
#	GRUB modifications
1851
# limit wait time to 3s
1849
# limit wait time to 3s
1852
# create an alcasar entry instead of linux-nonfb
1850
# create an alcasar entry instead of linux-nonfb
1853
# change display to 1024*768 (vga791)
1851
# change display to 1024*768 (vga791)
1854
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1852
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1855
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1853
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1856
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1854
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1857
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1855
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1858
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1856
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1859
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1857
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1860
# Remove unused services and users
1858
# Remove unused services and users
1861
	for svc in sshd.service
1859
	for svc in sshd.service
1862
	do
1860
	do
1863
		/bin/systemctl -q disable $svc
1861
		/bin/systemctl -q disable $svc
1864
	done
1862
	done
1865
# Load and apply the previous conf file
1863
# Load and apply the previous conf file
1866
	if [ "$mode" = "update" ]
1864
	if [ "$mode" = "update" ]
1867
	then
1865
	then
1868
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1866
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1869
		$DIR_DEST_BIN/alcasar-conf.sh --load
1867
		$DIR_DEST_BIN/alcasar-conf.sh --load
1870
		PARENT_SCRIPT=`basename $0`
1868
		PARENT_SCRIPT=`basename $0`
1871
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1869
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1872
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1870
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1873
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1871
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1874
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1872
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1875
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1873
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1876
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1874
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1877
		then
1875
		then
1878
			header_install
1876
			header_install
1879
			if [ $Lang == "fr" ]
1877
			if [ $Lang == "fr" ]
1880
			then 
1878
			then 
1881
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1879
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1882
				echo
1880
				echo
1883
				echo -n "Nom : "
1881
				echo -n "Nom : "
1884
			else
1882
			else
1885
				echo "This update need to redefine the first admin account"
1883
				echo "This update need to redefine the first admin account"
1886
				echo
1884
				echo
1887
				echo -n "Account : "
1885
				echo -n "Account : "
1888
			fi
1886
			fi
1889
			read admin_portal
1887
			read admin_portal
1890
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1888
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1891
			mkdir -p $DIR_DEST_ETC/digest
1889
			mkdir -p $DIR_DEST_ETC/digest
1892
			chmod 755 $DIR_DEST_ETC/digest
1890
			chmod 755 $DIR_DEST_ETC/digest
1893
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1891
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1894
			do
1892
			do
1895
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1893
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1896
			done
1894
			done
1897
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1895
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1898
		fi
1896
		fi
1899
	fi
1897
	fi
1900
	rm -f /tmp/alcasar-conf*
1898
	rm -f /tmp/alcasar-conf*
1901
	chown -R root:apache $DIR_DEST_ETC/*
1899
	chown -R root:apache $DIR_DEST_ETC/*
1902
	chmod -R 660 $DIR_DEST_ETC/*
1900
	chmod -R 660 $DIR_DEST_ETC/*
1903
	chmod ug+x $DIR_DEST_ETC/digest
1901
	chmod ug+x $DIR_DEST_ETC/digest
1904
# Apply and save the firewall rules
1902
# Apply and save the firewall rules
1905
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1903
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1906
	sleep 2
1904
	sleep 2
1907
	cd $DIR_INSTALL
1905
	cd $DIR_INSTALL
1908
	echo ""
1906
	echo ""
1909
	echo "#############################################################################"
1907
	echo "#############################################################################"
1910
	if [ $Lang == "fr" ]
1908
	if [ $Lang == "fr" ]
1911
		then
1909
		then
1912
		echo "#                        Fin d'installation d'ALCASAR                       #"
1910
		echo "#                        Fin d'installation d'ALCASAR                       #"
1913
		echo "#                                                                           #"
1911
		echo "#                                                                           #"
1914
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1912
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1915
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1913
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1916
		echo "#                                                                           #"
1914
		echo "#                                                                           #"
1917
		echo "#############################################################################"
1915
		echo "#############################################################################"
1918
		echo
1916
		echo
1919
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1917
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1920
		echo
1918
		echo
1921
		echo "- Lisez attentivement la documentation d'exploitation"
1919
		echo "- Lisez attentivement la documentation d'exploitation"
1922
		echo
1920
		echo
1923
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1921
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1924
		echo
1922
		echo
1925
		echo "                   Appuyez sur 'Entrée' pour continuer"
1923
		echo "                   Appuyez sur 'Entrée' pour continuer"
1926
	else	
1924
	else	
1927
		echo "#                        Enf of ALCASAR install process                     #"
1925
		echo "#                        Enf of ALCASAR install process                     #"
1928
		echo "#                                                                           #"
1926
		echo "#                                                                           #"
1929
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1927
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1930
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1928
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1931
		echo "#                                                                           #"
1929
		echo "#                                                                           #"
1932
		echo "#############################################################################"
1930
		echo "#############################################################################"
1933
		echo
1931
		echo
1934
		echo "- The system will be rebooted in order to operate ALCASAR"
1932
		echo "- The system will be rebooted in order to operate ALCASAR"
1935
		echo
1933
		echo
1936
		echo "- Read the exploitation documentation"
1934
		echo "- Read the exploitation documentation"
1937
		echo
1935
		echo
1938
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
1936
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
1939
		echo
1937
		echo
1940
		echo "                   Hit 'Enter' to continue"
1938
		echo "                   Hit 'Enter' to continue"
1941
	fi
1939
	fi
1942
	sleep 2
1940
	sleep 2
1943
	if [ "$mode" != "update" ]
1941
	if [ "$mode" != "update" ]
1944
	then
1942
	then
1945
		read a
1943
		read a
1946
	fi
1944
	fi
1947
	clear
1945
	clear
1948
	reboot
1946
	reboot
1949
} # End post_install ()
1947
} # End post_install ()
1950
 
1948
 
1951
#################################
1949
#################################
1952
#  	Main Install loop  	#
1950
#  	Main Install loop  	#
1953
#################################
1951
#################################
1954
dir_exec=`dirname "$0"`
1952
dir_exec=`dirname "$0"`
1955
if [ $dir_exec != "." ]
1953
if [ $dir_exec != "." ]
1956
then
1954
then
1957
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
1955
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
1958
	echo "Launch this program from the ALCASAR archive directory"
1956
	echo "Launch this program from the ALCASAR archive directory"
1959
	exit 0
1957
	exit 0
1960
fi
1958
fi
1961
VERSION=`cat $DIR_INSTALL/VERSION`
1959
VERSION=`cat $DIR_INSTALL/VERSION`
1962
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1960
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1963
nb_args=$#
1961
nb_args=$#
1964
args=$1
1962
args=$1
1965
if [ $nb_args -eq 0 ]
1963
if [ $nb_args -eq 0 ]
1966
then
1964
then
1967
	nb_args=1
1965
	nb_args=1
1968
	args="-h"
1966
	args="-h"
1969
fi
1967
fi
1970
chmod -R u+x $DIR_SCRIPTS/*
1968
chmod -R u+x $DIR_SCRIPTS/*
1971
case $args in
1969
case $args in
1972
	-\? | -h* | --h*)
1970
	-\? | -h* | --h*)
1973
		echo "$usage"
1971
		echo "$usage"
1974
		exit 0
1972
		exit 0
1975
		;;
1973
		;;
1976
	-i | --install)
1974
	-i | --install)
1977
		license
1975
		license
1978
		header_install
1976
		header_install
1979
		testing
1977
		testing
1980
# RPMs install
1978
# RPMs install
1981
		$DIR_SCRIPTS/alcasar-urpmi.sh
1979
		$DIR_SCRIPTS/alcasar-urpmi.sh
1982
		if [ "$?" != "0" ]
1980
		if [ "$?" != "0" ]
1983
		then
1981
		then
1984
			exit 0
1982
			exit 0
1985
		fi
1983
		fi
1986
		if [ -e $CONF_FILE ]
1984
		if [ -e $CONF_FILE ]
1987
		then
1985
		then
1988
# Uninstall the running version
1986
# Uninstall the running version
1989
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1987
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1990
		fi
1988
		fi
1991
# Test if manual update	
1989
# Test if manual update	
1992
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
1990
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
1993
		then
1991
		then
1994
			header_install
1992
			header_install
1995
			if [ $Lang == "fr" ]
1993
			if [ $Lang == "fr" ]
1996
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
1994
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
1997
				else echo "The configuration file of an old version has been found";
1995
				else echo "The configuration file of an old version has been found";
1998
			fi
1996
			fi
1999
			response=0
1997
			response=0
2000
			PTN='^[oOnNyY]$'
1998
			PTN='^[oOnNyY]$'
2001
			until [[ $(expr $response : $PTN) -gt 0 ]]
1999
			until [[ $(expr $response : $PTN) -gt 0 ]]
2002
			do
2000
			do
2003
				if [ $Lang == "fr" ]
2001
				if [ $Lang == "fr" ]
2004
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2002
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2005
					else echo -n "Do you want to use it (Y/n)?";
2003
					else echo -n "Do you want to use it (Y/n)?";
2006
				 fi
2004
				 fi
2007
				read response
2005
				read response
2008
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2006
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2009
				then rm -f /tmp/alcasar-conf*
2007
				then rm -f /tmp/alcasar-conf*
2010
				fi
2008
				fi
2011
			done
2009
			done
2012
		fi
2010
		fi
2013
# Test if update
2011
# Test if update
2014
		if [ -e /tmp/alcasar-conf* ] 
2012
		if [ -e /tmp/alcasar-conf* ] 
2015
		then
2013
		then
2016
			if [ $Lang == "fr" ]
2014
			if [ $Lang == "fr" ]
2017
				then echo "#### Installation avec mise à jour ####";
2015
				then echo "#### Installation avec mise à jour ####";
2018
				else echo "#### Installation with update     ####";
2016
				else echo "#### Installation with update     ####";
2019
			fi
2017
			fi
2020
# Extract the central configuration file
2018
# Extract the central configuration file
2021
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2019
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2022
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2020
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2023
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2021
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2024
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2022
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2025
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2023
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2026
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2024
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2027
			mode="update"
2025
			mode="update"
2028
		fi
2026
		fi
2029
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus ulogd nfsen dnsmasq BL cron fail2ban gammu_smsd post_install
2027
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus ulogd nfsen dnsmasq BL cron fail2ban gammu_smsd post_install
2030
		do
2028
		do
2031
			$func
2029
			$func
2032
# echo "*** 'debug' : end of function $func ***"; read a
2030
# echo "*** 'debug' : end of function $func ***"; read a
2033
		done
2031
		done
2034
		;;
2032
		;;
2035
	-u | --uninstall)
2033
	-u | --uninstall)
2036
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2034
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2037
		then
2035
		then
2038
			if [ $Lang == "fr" ]
2036
			if [ $Lang == "fr" ]
2039
				then echo "ALCASAR n'est pas installé!";
2037
				then echo "ALCASAR n'est pas installé!";
2040
				else echo "ALCASAR isn't installed!";
2038
				else echo "ALCASAR isn't installed!";
2041
			fi
2039
			fi
2042
			exit 0
2040
			exit 0
2043
		fi
2041
		fi
2044
		response=0
2042
		response=0
2045
		PTN='^[oOnN]$'
2043
		PTN='^[oOnN]$'
2046
		until [[ $(expr $response : $PTN) -gt 0 ]]
2044
		until [[ $(expr $response : $PTN) -gt 0 ]]
2047
		do
2045
		do
2048
			if [ $Lang == "fr" ]
2046
			if [ $Lang == "fr" ]
2049
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2047
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2050
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2048
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2051
			fi
2049
			fi
2052
			read response
2050
			read response
2053
		done
2051
		done
2054
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2052
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2055
		then
2053
		then
2056
			$DIR_SCRIPTS/alcasar-conf.sh --create
2054
			$DIR_SCRIPTS/alcasar-conf.sh --create
2057
		else	
2055
		else	
2058
			rm -f /tmp/alcasar-conf*
2056
			rm -f /tmp/alcasar-conf*
2059
		fi
2057
		fi
2060
# Uninstall the running version
2058
# Uninstall the running version
2061
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2059
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2062
		;;
2060
		;;
2063
	*)
2061
	*)
2064
		echo "Argument inconnu :$1";
2062
		echo "Argument inconnu :$1";
2065
		echo "Unknown argument :$1";
2063
		echo "Unknown argument :$1";
2066
		echo "$usage"
2064
		echo "$usage"
2067
		exit 1
2065
		exit 1
2068
		;;
2066
		;;
2069
esac
2067
esac
2070
# end of script
2068
# end of script
2071
 
2069
 
2072
 
2070