Subversion Repositories ALCASAR

Rev

Rev 1358 | Rev 1361 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1358 Rev 1359
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 1358 2014-05-23 12:26:25Z richard $ 
2
#  $Id: alcasar.sh 1359 2014-05-23 16:15:57Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
22
#
22
#
23
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, havp, libclamav, Ulog, fail2ban, NFsen and NFdump
23
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, havp, libclamav, Ulog, fail2ban, NFsen and NFdump
24
 
24
 
25
# Options :
25
# Options :
26
#       -i or --install
26
#       -i or --install
27
#       -u or --uninstall
27
#       -u or --uninstall
28
 
28
 
29
# Functions :
29
# Functions :
30
#	testing			: connectivity tests and downloading before intall
30
#	testing			: connectivity tests and downloading before intall
31
#	init			: Installation of RPM and scripts
31
#	init			: Installation of RPM and scripts
32
#	network			: Network parameters
32
#	network			: Network parameters
33
#	ACC			: ALCASAR Control Center installation
33
#	ACC			: ALCASAR Control Center installation
34
#	CA			: Certification Authority initialization
34
#	CA			: Certification Authority initialization
35
#	init_db			: Initilization of radius database managed with MariaDB
35
#	init_db			: Initilization of radius database managed with MariaDB
36
#	param_radius		: FreeRadius initialisation
36
#	param_radius		: FreeRadius initialisation
37
#	param_web_radius	: copy ans modifiy original "freeradius web" in ACC
37
#	param_web_radius	: copy ans modifiy original "freeradius web" in ACC
38
#	param_chilli		: coovachilli initialisation (+authentication page)
38
#	param_chilli		: coovachilli initialisation (+authentication page)
39
#	param_dansguardian	: DansGuardian filtering HTTP proxy configuration
39
#	param_dansguardian	: DansGuardian filtering HTTP proxy configuration
40
#	antivirus		: HAVP + libclamav configuration
40
#	antivirus		: HAVP + libclamav configuration
41
#	param_nfsen		: Configuration du grapheur nfsen pour apache 
41
#	param_nfsen		: Configuration du grapheur nfsen pour apache 
42
#	dnsmasq			: Name server configuration
42
#	dnsmasq			: Name server configuration
43
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
43
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
44
#	cron			: Logs export + watchdog + connexion statistics
44
#	cron			: Logs export + watchdog + connexion statistics
45
#	fail2ban		: Fail2ban installation and configuration
45
#	fail2ban		: Fail2ban installation and configuration
46
#	post_install		: Security, log rotation, etc.
46
#	post_install		: Security, log rotation, etc.
47
#	gammu_smsd			: Autoregister addon (gammu-smsd)
47
#	gammu_smsd			: Autoregister addon (gammu-smsd)
48
 
48
 
49
DATE=`date '+%d %B %Y - %Hh%M'`
49
DATE=`date '+%d %B %Y - %Hh%M'`
50
DATE_SHORT=`date '+%d/%m/%Y'`
50
DATE_SHORT=`date '+%d/%m/%Y'`
51
Lang=`echo $LANG|cut -c 1-2`
51
Lang=`echo $LANG|cut -c 1-2`
52
# ******* Files parameters - paramètres fichiers *********
52
# ******* Files parameters - paramètres fichiers *********
53
DIR_INSTALL=`pwd`				# current directory 
53
DIR_INSTALL=`pwd`				# current directory 
54
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
54
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
55
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
55
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
56
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
56
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
57
DIR_WEB="/var/www/html"				# directory of APACHE
57
DIR_WEB="/var/www/html"				# directory of APACHE
58
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
58
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
59
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
59
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
60
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
60
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
61
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
61
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
62
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
62
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
63
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
63
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
64
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
64
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
65
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
65
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
66
# ******* DBMS parameters - paramètres SGBD ********
66
# ******* DBMS parameters - paramètres SGBD ********
67
DB_RADIUS="radius"				# database name used by FreeRadius server
67
DB_RADIUS="radius"				# database name used by FreeRadius server
68
DB_USER="radius"				# user name allows to request the users database
68
DB_USER="radius"				# user name allows to request the users database
69
DB_GAMMU="gammu"				# database name used by Gammu-smsd
69
DB_GAMMU="gammu"				# database name used by Gammu-smsd
70
# ******* Network parameters - paramètres réseau *******
70
# ******* Network parameters - paramètres réseau *******
71
HOSTNAME="alcasar"				# 
71
HOSTNAME="alcasar"				# 
72
DOMAIN="localdomain"				# default local domain
72
DOMAIN="localdomain"				# default local domain
73
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`	# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
73
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`	# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
74
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF"|cut -d" " -f2|tr -d ":"`		# INTIF is connected to the consultation network
74
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF"|cut -d" " -f2|tr -d ":"`		# INTIF is connected to the consultation network
75
MTU="1500"
75
MTU="1500"
76
ETHTOOL_OPTS='"autoneg off speed 100 duplex full"'
76
ETHTOOL_OPTS='"autoneg off speed 100 duplex full"'
77
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
77
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
78
# ****** Paths - chemin des commandes *******
78
# ****** Paths - chemin des commandes *******
79
SED="/bin/sed -i"
79
SED="/bin/sed -i"
80
# ****************** End of global parameters *********************
80
# ****************** End of global parameters *********************
81
 
81
 
82
license ()
82
license ()
83
{
83
{
84
	if [ $Lang == "fr" ]
84
	if [ $Lang == "fr" ]
85
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
85
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
86
	else cat $DIR_INSTALL/gpl-3.0.txt | more
86
	else cat $DIR_INSTALL/gpl-3.0.txt | more
87
	fi
87
	fi
88
	echo "Taper sur Entrée pour continuer !"
88
	echo "Taper sur Entrée pour continuer !"
89
	echo "Enter to continue."
89
	echo "Enter to continue."
90
	read a
90
	read a
91
}
91
}
92
 
92
 
93
header_install ()
93
header_install ()
94
{
94
{
95
	clear
95
	clear
96
	echo "-----------------------------------------------------------------------------"
96
	echo "-----------------------------------------------------------------------------"
97
	echo "                     ALCASAR V$VERSION Installation"
97
	echo "                     ALCASAR V$VERSION Installation"
98
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
98
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
99
	echo "-----------------------------------------------------------------------------"
99
	echo "-----------------------------------------------------------------------------"
100
} # End of header_install ()
100
} # End of header_install ()
101
 
101
 
102
 
102
 
103
##################################################################
103
##################################################################
104
##			Function "testing"			##
104
##			Function "testing"			##
105
## - Test of free space on /var  (>10G)				##
105
## - Test of free space on /var  (>10G)				##
106
## - Test of Internet access					##
106
## - Test of Internet access					##
107
##################################################################
107
##################################################################
108
testing ()
108
testing ()
109
{
109
{
110
	free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
110
	free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
111
	if [ $free_space -lt 10 ]
111
	if [ $free_space -lt 10 ]
112
		then
112
		then
113
		if [ $Lang == "fr" ]
113
		if [ $Lang == "fr" ]
114
			then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
114
			then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
115
			else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
115
			else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
116
		fi
116
		fi
117
		exit 0
117
		exit 0
118
	fi
118
	fi
119
if [ $Lang == "fr" ]
119
if [ $Lang == "fr" ]
120
		then echo -n "Tests des paramètres réseau : "
120
		then echo -n "Tests des paramètres réseau : "
121
		else echo -n "Network parameters tests : "
121
		else echo -n "Network parameters tests : "
122
	fi
122
	fi
123
# We test EXTIF config files
123
# We test EXTIF config files
124
 
124
 
125
	PUBLIC_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
125
	PUBLIC_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
126
	PUBLIC_GATEWAY=`grep GATEWAY /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
126
	PUBLIC_GATEWAY=`grep GATEWAY /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
127
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
127
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
128
		then
128
		then
129
		if [ $Lang == "fr" ]
129
		if [ $Lang == "fr" ]
130
		then 
130
		then 
131
			echo "Échec"
131
			echo "Échec"
132
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
132
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
133
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
133
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
134
			echo "Appliquez les changements : 'service network restart'"
134
			echo "Appliquez les changements : 'service network restart'"
135
		else
135
		else
136
			echo "Failed"
136
			echo "Failed"
137
			echo "The Internet connected network card ($EXTIF) isn't well configured."
137
			echo "The Internet connected network card ($EXTIF) isn't well configured."
138
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
138
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
139
			echo "Apply the new configuration 'service network restart'"
139
			echo "Apply the new configuration 'service network restart'"
140
		fi
140
		fi
141
		echo "DEVICE=$EXTIF"
141
		echo "DEVICE=$EXTIF"
142
		echo "IPADDR="
142
		echo "IPADDR="
143
		echo "NETMASK="
143
		echo "NETMASK="
144
		echo "GATEWAY="
144
		echo "GATEWAY="
145
		echo "DNS1="
145
		echo "DNS1="
146
		echo "DNS2="
146
		echo "DNS2="
147
		echo "ONBOOT=yes"
147
		echo "ONBOOT=yes"
148
		exit 0
148
		exit 0
149
	fi
149
	fi
150
	echo -n "."
150
	echo -n "."
151
# We test the Ethernet links state
151
# We test the Ethernet links state
152
	for i in $EXTIF $INTIF
152
	for i in $EXTIF $INTIF
153
	do
153
	do
154
		/sbin/ip link set $i up
154
		/sbin/ip link set $i up
155
		sleep 3
155
		sleep 3
156
		CMD=`/usr/sbin/ethtool $i |egrep 'Link detected'| awk '{print $NF}'`
156
		CMD=`/usr/sbin/ethtool $i |egrep 'Link detected'| awk '{print $NF}'`
157
		CMD2=`/sbin/mii-tool $i | grep link | awk '{print $NF}'`
157
		CMD2=`/sbin/mii-tool $i | grep link | awk '{print $NF}'`
158
		if [ $CMD != "yes" ] && [ $CMD2 != "ok" ]
158
		if [ $CMD != "yes" ] && [ $CMD2 != "ok" ]
159
			then
159
			then
160
			if [ $Lang == "fr" ]
160
			if [ $Lang == "fr" ]
161
			then 
161
			then 
162
				echo "Échec"
162
				echo "Échec"
163
				echo "Le lien réseau de la carte $i n'est pas actif."
163
				echo "Le lien réseau de la carte $i n'est pas actif."
164
				echo "Réglez ce problème puis relancez ce script."
164
				echo "Réglez ce problème puis relancez ce script."
165
			else
165
			else
166
				echo "Failed"
166
				echo "Failed"
167
				echo "The link state of $i interface id down."
167
				echo "The link state of $i interface id down."
168
				echo "Resolv this problem, then restart this script."
168
				echo "Resolv this problem, then restart this script."
169
			fi
169
			fi
170
			exit 0
170
			exit 0
171
		fi
171
		fi
172
	echo -n "."
172
	echo -n "."
173
	done
173
	done
174
# On teste la présence d'un routeur par défaut (Box FAI)
174
# On teste la présence d'un routeur par défaut (Box FAI)
175
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
175
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
176
		if [ $Lang == "fr" ]
176
		if [ $Lang == "fr" ]
177
		then 
177
		then 
178
			echo "Échec"
178
			echo "Échec"
179
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
179
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
180
			echo "Réglez ce problème puis relancez ce script."
180
			echo "Réglez ce problème puis relancez ce script."
181
		else
181
		else
182
			echo "Failed"
182
			echo "Failed"
183
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
183
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
184
			echo "Resolv this problem, then restart this script."
184
			echo "Resolv this problem, then restart this script."
185
		fi
185
		fi
186
		exit 0
186
		exit 0
187
	fi
187
	fi
188
	echo -n "."
188
	echo -n "."
189
# On teste le lien vers le routeur par defaut
189
# On teste le lien vers le routeur par defaut
190
	IP_GW=`ip route list|grep ^default|cut -d" " -f3`
190
	IP_GW=`ip route list|grep ^default|cut -d" " -f3`
191
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $IP_GW|grep response|cut -d" " -f2`
191
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $IP_GW|grep response|cut -d" " -f2`
192
	if [ $(expr $arp_reply) -eq 0 ]
192
	if [ $(expr $arp_reply) -eq 0 ]
193
	       	then
193
	       	then
194
		if [ $Lang == "fr" ]
194
		if [ $Lang == "fr" ]
195
		then 
195
		then 
196
			echo "Échec"
196
			echo "Échec"
197
			echo "Le routeur de site ou la Box Internet ($IP_GW) ne répond pas."
197
			echo "Le routeur de site ou la Box Internet ($IP_GW) ne répond pas."
198
			echo "Réglez ce problème puis relancez ce script."
198
			echo "Réglez ce problème puis relancez ce script."
199
		else
199
		else
200
			echo "Failed"
200
			echo "Failed"
201
			echo "The Internet gateway doesn't answered"
201
			echo "The Internet gateway doesn't answered"
202
			echo "Resolv this problem, then restart this script."
202
			echo "Resolv this problem, then restart this script."
203
		fi
203
		fi
204
		exit 0
204
		exit 0
205
	fi
205
	fi
206
	echo -n "."
206
	echo -n "."
207
# On teste la connectivité Internet
207
# On teste la connectivité Internet
208
	rm -rf /tmp/con_ok.html
208
	rm -rf /tmp/con_ok.html
209
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
209
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
210
	if [ ! -e /tmp/con_ok.html ]
210
	if [ ! -e /tmp/con_ok.html ]
211
	then
211
	then
212
		if [ $Lang == "fr" ]
212
		if [ $Lang == "fr" ]
213
		then 
213
		then 
214
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
214
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
215
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
215
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
216
			echo "Vérifiez la validité des adresses IP des DNS."
216
			echo "Vérifiez la validité des adresses IP des DNS."
217
		else
217
		else
218
			echo "The Internet connection try failed (google.fr)."
218
			echo "The Internet connection try failed (google.fr)."
219
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
219
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
220
			echo "Verify the DNS IP addresses"
220
			echo "Verify the DNS IP addresses"
221
		fi
221
		fi
222
		exit 0
222
		exit 0
223
	fi
223
	fi
224
	rm -rf /tmp/con_ok.html
224
	rm -rf /tmp/con_ok.html
225
	echo ". : ok"
225
	echo ". : ok"
226
} # end of testing
226
} # end of testing
227
 
227
 
228
##################################################################
228
##################################################################
229
##			Function "init"				##
229
##			Function "init"				##
230
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
230
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
231
## - Installation et modification des scripts du portail	##
231
## - Installation et modification des scripts du portail	##
232
##################################################################
232
##################################################################
233
init ()
233
init ()
234
{
234
{
235
	if [ "$mode" != "update" ]
235
	if [ "$mode" != "update" ]
236
	then
236
	then
237
# On affecte le nom d'organisme
237
# On affecte le nom d'organisme
238
		header_install
238
		header_install
239
		ORGANISME=!
239
		ORGANISME=!
240
		PTN='^[a-zA-Z0-9-]*$'
240
		PTN='^[a-zA-Z0-9-]*$'
241
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
241
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
242
                do
242
                do
243
			if [ $Lang == "fr" ]
243
			if [ $Lang == "fr" ]
244
			       	then echo -n "Entrez le nom de votre organisme : "
244
			       	then echo -n "Entrez le nom de votre organisme : "
245
				else echo -n "Enter the name of your organism : "
245
				else echo -n "Enter the name of your organism : "
246
			fi
246
			fi
247
			read ORGANISME
247
			read ORGANISME
248
			if [ "$ORGANISME" == "" ]
248
			if [ "$ORGANISME" == "" ]
249
				then
249
				then
250
				ORGANISME=!
250
				ORGANISME=!
251
			fi
251
			fi
252
		done
252
		done
253
	fi
253
	fi
254
# On crée aléatoirement les mots de passe et les secrets partagés
254
# On crée aléatoirement les mots de passe et les secrets partagés
255
	rm -f $PASSWD_FILE
255
	rm -f $PASSWD_FILE
256
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
256
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
257
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
257
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
258
	echo "$grubpwd" >> $PASSWD_FILE
258
	echo "$grubpwd" >> $PASSWD_FILE
259
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
259
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
260
	$SED "/^password.*/d" /boot/grub/menu.lst
260
	$SED "/^password.*/d" /boot/grub/menu.lst
261
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
261
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
262
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
262
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
263
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
263
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
264
	echo "root / $mysqlpwd" >> $PASSWD_FILE
264
	echo "root / $mysqlpwd" >> $PASSWD_FILE
265
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
265
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
266
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
266
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
267
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
267
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
268
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
268
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
269
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
269
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
270
	echo "$secretuam" >> $PASSWD_FILE
270
	echo "$secretuam" >> $PASSWD_FILE
271
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
271
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
272
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
272
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
273
	echo "$secretradius" >> $PASSWD_FILE
273
	echo "$secretradius" >> $PASSWD_FILE
274
	chmod 640 $PASSWD_FILE
274
	chmod 640 $PASSWD_FILE
275
# Scripts and conf files copy 
275
# Scripts and conf files copy 
276
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
276
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
277
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
277
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
278
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
278
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
279
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
279
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
280
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
280
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
281
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
281
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
282
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
282
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
283
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
283
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
284
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
284
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
285
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
285
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
286
# generate central conf file
286
# generate central conf file
287
	cat <<EOF > $CONF_FILE
287
	cat <<EOF > $CONF_FILE
288
##########################################
288
##########################################
289
##                                      ##
289
##                                      ##
290
##          ALCASAR Parameters          ##
290
##          ALCASAR Parameters          ##
291
##                                      ##
291
##                                      ##
292
##########################################
292
##########################################
293
 
293
 
294
INSTALL_DATE=$DATE
294
INSTALL_DATE=$DATE
295
VERSION=$VERSION
295
VERSION=$VERSION
296
ORGANISM=$ORGANISME
296
ORGANISM=$ORGANISME
297
DOMAIN=$DOMAIN
297
DOMAIN=$DOMAIN
298
EOF
298
EOF
299
	chmod o-rwx $CONF_FILE
299
	chmod o-rwx $CONF_FILE
300
} # End of init ()
300
} # End of init ()
301
 
301
 
302
##################################################################
302
##################################################################
303
##			Function "network"			##
303
##			Function "network"			##
304
## - Définition du plan d'adressage du réseau de consultation	##
304
## - Définition du plan d'adressage du réseau de consultation	##
305
## - Nommage DNS du système 					##
305
## - Nommage DNS du système 					##
306
## - Configuration de l'interface INTIF (réseau de consultation)##
306
## - Configuration de l'interface INTIF (réseau de consultation)##
307
## - Modification du fichier /etc/hosts				##
307
## - Modification du fichier /etc/hosts				##
308
## - Configuration du serveur de temps (NTP)			##
308
## - Configuration du serveur de temps (NTP)			##
309
## - Renseignement des fichiers hosts.allow et hosts.deny	##
309
## - Renseignement des fichiers hosts.allow et hosts.deny	##
310
##################################################################
310
##################################################################
311
network ()
311
network ()
312
{
312
{
313
	header_install
313
	header_install
314
	if [ "$mode" != "update" ]
314
	if [ "$mode" != "update" ]
315
		then
315
		then
316
		if [ $Lang == "fr" ]
316
		if [ $Lang == "fr" ]
317
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
317
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
318
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
318
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
319
		fi
319
		fi
320
		response=0
320
		response=0
321
		PTN='^[oOyYnN]$'
321
		PTN='^[oOyYnN]$'
322
		until [[ $(expr $response : $PTN) -gt 0 ]]
322
		until [[ $(expr $response : $PTN) -gt 0 ]]
323
		do
323
		do
324
			if [ $Lang == "fr" ]
324
			if [ $Lang == "fr" ]
325
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
325
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
326
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
326
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
327
			fi
327
			fi
328
			read response
328
			read response
329
		done
329
		done
330
		if [ "$response" = "n" ] || [ "$response" = "N" ]
330
		if [ "$response" = "n" ] || [ "$response" = "N" ]
331
		then
331
		then
332
			PRIVATE_IP_MASK="0"
332
			PRIVATE_IP_MASK="0"
333
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
333
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
334
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
334
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
335
			do
335
			do
336
				if [ $Lang == "fr" ]
336
				if [ $Lang == "fr" ]
337
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
337
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
338
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
338
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
339
				fi
339
				fi
340
				read PRIVATE_IP_MASK
340
				read PRIVATE_IP_MASK
341
			done
341
			done
342
		else
342
		else
343
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
343
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
344
		fi
344
		fi
345
	else
345
	else
346
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
346
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
347
		rm -rf conf/etc/alcasar.conf
347
		rm -rf conf/etc/alcasar.conf
348
	fi
348
	fi
349
# Define LAN side global parameters
349
# Define LAN side global parameters
350
	hostname $HOSTNAME.$DOMAIN
350
	hostname $HOSTNAME.$DOMAIN
351
	echo $HOSTNAME.$DOMAIN > /etc/hostname
351
	echo $HOSTNAME.$DOMAIN > /etc/hostname
352
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
352
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
353
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
353
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
354
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
354
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
355
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
355
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
356
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
356
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
357
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`; classe_sup_sup=`expr $classe + 2`	# ie.: 2=classe B, 3=classe C
357
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`; classe_sup_sup=`expr $classe + 2`	# ie.: 2=classe B, 3=classe C
358
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
358
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
359
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
359
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
360
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f$classe_sup`			# last octet of LAN address
360
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f$classe_sup`			# last octet of LAN address
361
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`			# last octet of LAN broadcast
361
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`			# last octet of LAN broadcast
362
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`		# First network address (ex.: 192.168.182.1)
362
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`		# First network address (ex.: 192.168.182.1)
363
	PRIVATE_SECOND_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 2`	# second network address (ex.: 192.168.182.2)
363
	PRIVATE_SECOND_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 2`	# second network address (ex.: 192.168.182.2)
364
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
364
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
365
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
365
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
366
# Define Internet parameters
366
# Define Internet parameters
367
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
367
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
368
	DNS1=`grep DNS1 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 1er DNS
368
	DNS1=`grep DNS1 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 1er DNS
369
	DNS2=`grep DNS2 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 2ème DNS
369
	DNS2=`grep DNS2 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 2ème DNS
370
	DNS1=${DNS1:=208.67.220.220}
370
	DNS1=${DNS1:=208.67.220.220}
371
	DNS2=${DNS2:=208.67.222.222}
371
	DNS2=${DNS2:=208.67.222.222}
372
	PUBLIC_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2`
372
	PUBLIC_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2`
373
	DEFAULT_PUBLIC_NETMASK=`ipcalc -m $PUBLIC_IP | cut -d"=" -f2`
373
	DEFAULT_PUBLIC_NETMASK=`ipcalc -m $PUBLIC_IP | cut -d"=" -f2`
374
	PUBLIC_NETMASK=${PUBLIC_NETMASK:=$DEFAULT_PUBLIC_NETMASK}
374
	PUBLIC_NETMASK=${PUBLIC_NETMASK:=$DEFAULT_PUBLIC_NETMASK}
375
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
375
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
376
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
376
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
377
	echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
377
	echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
378
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
378
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
379
	echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
379
	echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
380
	echo "DNS1=$DNS1" >> $CONF_FILE
380
	echo "DNS1=$DNS1" >> $CONF_FILE
381
	echo "DNS2=$DNS2" >> $CONF_FILE
381
	echo "DNS2=$DNS2" >> $CONF_FILE
382
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
382
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
383
	echo "DHCP=full" >> $CONF_FILE
383
	echo "DHCP=full" >> $CONF_FILE
384
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
384
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
385
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
385
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
386
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
386
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
387
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
387
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
388
# config network
388
# config network
389
	cat <<EOF > /etc/sysconfig/network
389
	cat <<EOF > /etc/sysconfig/network
390
NETWORKING=yes
390
NETWORKING=yes
391
HOSTNAME="$HOSTNAME.$DOMAIN"
391
HOSTNAME="$HOSTNAME.$DOMAIN"
392
FORWARD_IPV4=true
392
FORWARD_IPV4=true
393
EOF
393
EOF
394
# config /etc/hosts
394
# config /etc/hosts
395
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
395
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
396
	cat <<EOF > /etc/hosts
396
	cat <<EOF > /etc/hosts
397
127.0.0.1	localhost
397
127.0.0.1	localhost
398
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
398
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
399
EOF
399
EOF
400
# Config EXTIF (Internet)
400
# Config EXTIF (Internet)
401
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
401
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
402
DEVICE=$EXTIF
402
DEVICE=$EXTIF
403
BOOTPROTO=static
403
BOOTPROTO=static
404
IPADDR=$PUBLIC_IP
404
IPADDR=$PUBLIC_IP
405
NETMASK=$PUBLIC_NETMASK
405
NETMASK=$PUBLIC_NETMASK
406
GATEWAY=$PUBLIC_GATEWAY
406
GATEWAY=$PUBLIC_GATEWAY
407
DNS1=127.0.0.1
407
DNS1=127.0.0.1
408
ONBOOT=yes
408
ONBOOT=yes
409
METRIC=10
409
METRIC=10
410
NOZEROCONF=yes
410
NOZEROCONF=yes
411
MII_NOT_SUPPORTED=yes
411
MII_NOT_SUPPORTED=yes
412
IPV6INIT=no
412
IPV6INIT=no
413
IPV6TO4INIT=no
413
IPV6TO4INIT=no
414
ACCOUNTING=no
414
ACCOUNTING=no
415
USERCTL=no
415
USERCTL=no
416
MTU=$MTU
416
MTU=$MTU
417
EOF
417
EOF
418
# Config INTIF (consultation LAN) in normal mode
418
# Config INTIF (consultation LAN) in normal mode
419
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
419
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
420
DEVICE=$INTIF
420
DEVICE=$INTIF
421
BOOTPROTO=static
421
BOOTPROTO=static
422
ONBOOT=yes
422
ONBOOT=yes
423
NOZEROCONF=yes
423
NOZEROCONF=yes
424
MII_NOT_SUPPORTED=yes
424
MII_NOT_SUPPORTED=yes
425
IPV6INIT=no
425
IPV6INIT=no
426
IPV6TO4INIT=no
426
IPV6TO4INIT=no
427
ACCOUNTING=no
427
ACCOUNTING=no
428
USERCTL=no
428
USERCTL=no
429
ETHTOOL_OPTS=$ETHTOOL_OPTS
429
ETHTOOL_OPTS=$ETHTOOL_OPTS
430
EOF
430
EOF
431
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
431
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
432
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
432
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
433
DEVICE=$INTIF
433
DEVICE=$INTIF
434
BOOTPROTO=static
434
BOOTPROTO=static
435
IPADDR=$PRIVATE_IP
435
IPADDR=$PRIVATE_IP
436
NETMASK=$PRIVATE_NETMASK
436
NETMASK=$PRIVATE_NETMASK
437
ONBOOT=yes
437
ONBOOT=yes
438
METRIC=10
438
METRIC=10
439
NOZEROCONF=yes
439
NOZEROCONF=yes
440
MII_NOT_SUPPORTED=yes
440
MII_NOT_SUPPORTED=yes
441
IPV6INIT=no
441
IPV6INIT=no
442
IPV6TO4INIT=no
442
IPV6TO4INIT=no
443
ACCOUNTING=no
443
ACCOUNTING=no
444
USERCTL=no
444
USERCTL=no
445
EOF
445
EOF
446
# Mise à l'heure du serveur
446
# Mise à l'heure du serveur
447
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
447
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
448
	cat <<EOF > /etc/ntp/step-tickers
448
	cat <<EOF > /etc/ntp/step-tickers
449
0.fr.pool.ntp.org	# adapt to your country
449
0.fr.pool.ntp.org	# adapt to your country
450
1.fr.pool.ntp.org
450
1.fr.pool.ntp.org
451
2.fr.pool.ntp.org
451
2.fr.pool.ntp.org
452
EOF
452
EOF
453
# Configuration du serveur de temps (sur lui même)
453
# Configuration du serveur de temps (sur lui même)
454
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
454
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
455
	cat <<EOF > /etc/ntp.conf
455
	cat <<EOF > /etc/ntp.conf
456
server 0.fr.pool.ntp.org	# adapt to your country
456
server 0.fr.pool.ntp.org	# adapt to your country
457
server 1.fr.pool.ntp.org
457
server 1.fr.pool.ntp.org
458
server 2.fr.pool.ntp.org
458
server 2.fr.pool.ntp.org
459
server 127.127.1.0   		# local clock si NTP internet indisponible ...
459
server 127.127.1.0   		# local clock si NTP internet indisponible ...
460
fudge 127.127.1.0 stratum 10
460
fudge 127.127.1.0 stratum 10
461
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
461
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
462
restrict 127.0.0.1
462
restrict 127.0.0.1
463
driftfile /var/lib/ntp/drift
463
driftfile /var/lib/ntp/drift
464
logfile /var/log/ntp.log
464
logfile /var/log/ntp.log
465
EOF
465
EOF
466
 
466
 
467
	chown -R ntp:ntp /var/lib/ntp
467
	chown -R ntp:ntp /var/lib/ntp
468
# Renseignement des fichiers hosts.allow et hosts.deny
468
# Renseignement des fichiers hosts.allow et hosts.deny
469
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
469
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
470
	cat <<EOF > /etc/hosts.allow
470
	cat <<EOF > /etc/hosts.allow
471
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
471
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
472
sshd: ALL
472
sshd: ALL
473
ntpd: $PRIVATE_NETWORK_SHORT
473
ntpd: $PRIVATE_NETWORK_SHORT
474
EOF
474
EOF
475
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
475
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
476
	cat <<EOF > /etc/hosts.deny
476
	cat <<EOF > /etc/hosts.deny
477
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
477
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
478
EOF
478
EOF
479
# Firewall config
479
# Firewall config
480
	$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh  $DIR_DEST_BIN/alcasar-iptables-bypass.sh
480
	$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh  $DIR_DEST_BIN/alcasar-iptables-bypass.sh
481
	$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh  $DIR_DEST_BIN/alcasar-iptables-bypass.sh
481
	$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh  $DIR_DEST_BIN/alcasar-iptables-bypass.sh
482
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
482
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
483
# create the filter exception file and ip_bloqued file
483
# create the filter exception file and ip_bloqued file
484
	touch $DIR_DEST_ETC/alcasar-filter-exceptions
484
	touch $DIR_DEST_ETC/alcasar-filter-exceptions
485
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
485
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
486
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
486
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
487
# load conntrack ftp module
487
# load conntrack ftp module
488
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
488
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
489
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
489
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
490
# load ipt_NETFLOW module
490
# load ipt_NETFLOW module
491
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
491
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
492
# 
492
# 
493
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
493
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
494
} # End of network ()
494
} # End of network ()
495
 
495
 
496
##################################################################
496
##################################################################
497
##			Function "ACC"				##
497
##			Function "ACC"				##
498
## - installation du centre de gestion (ALCASAR Control Center)	##
498
## - installation du centre de gestion (ALCASAR Control Center)	##
499
## - configuration du serveur web (Apache)			##
499
## - configuration du serveur web (Apache)			##
500
## - définition du 1er comptes de gestion 			##
500
## - définition du 1er comptes de gestion 			##
501
## - sécurisation des accès					##
501
## - sécurisation des accès					##
502
##################################################################
502
##################################################################
503
ACC ()
503
ACC ()
504
{
504
{
505
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
505
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
506
	mkdir $DIR_WEB
506
	mkdir $DIR_WEB
507
# Copie et configuration des fichiers du centre de gestion
507
# Copie et configuration des fichiers du centre de gestion
508
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
508
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
509
	echo "$VERSION" > $DIR_WEB/VERSION
509
	echo "$VERSION" > $DIR_WEB/VERSION
510
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
510
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
511
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
511
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
512
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
512
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
513
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
513
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
514
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
514
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
515
	chown -R apache:apache $DIR_WEB/*
515
	chown -R apache:apache $DIR_WEB/*
516
	for i in system_backup base logs/firewall logs/httpd logs/security;
516
	for i in system_backup base logs/firewall logs/httpd logs/security;
517
	do
517
	do
518
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
518
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
519
	done
519
	done
520
	chown -R root:apache $DIR_SAVE
520
	chown -R root:apache $DIR_SAVE
521
# Configuration et sécurisation php
521
# Configuration et sécurisation php
522
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
522
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
523
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
523
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
524
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
524
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
525
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
525
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
526
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
526
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
527
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
527
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
528
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
528
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
529
# Configuration et sécurisation Apache
529
# Configuration et sécurisation Apache
530
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
530
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
531
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
531
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
532
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
532
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
533
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
533
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
534
	$SED "s?^ServerTokens.*?ServerTokens Prod?g" /etc/httpd/conf/httpd.conf
534
	$SED "s?^ServerTokens.*?ServerTokens Prod?g" /etc/httpd/conf/httpd.conf
535
	$SED "s?^ServerSignature.*?ServerSignature Off?g" /etc/httpd/conf/httpd.conf
535
	$SED "s?^ServerSignature.*?ServerSignature Off?g" /etc/httpd/conf/httpd.conf
536
	$SED "s?^#ErrorDocument 404 /missing.html.*?ErrorDocument 404 /index.html?g" /etc/httpd/conf/httpd.conf
536
	$SED "s?^#ErrorDocument 404 /missing.html.*?ErrorDocument 404 /index.html?g" /etc/httpd/conf/httpd.conf
537
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/httpd.conf
537
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/httpd.conf
538
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/httpd.conf
538
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/httpd.conf
539
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/httpd.conf
539
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/httpd.conf
540
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/httpd.conf
540
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/httpd.conf
541
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/httpd.conf
541
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/httpd.conf
542
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/httpd.conf
542
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/httpd.conf
543
	$SED "s?LoadModule speling_module.*?LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/httpd.conf
543
	$SED "s?LoadModule speling_module.*?LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/httpd.conf
544
	FIC_MOD_SSL=`find /etc/httpd/modules.d/ -type f -name *mod_ssl.conf`
544
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
545
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" $FIC_MOD_SSL # On écoute en SSL que sur INTIF
545
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
-
 
546
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
546
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /var/www/error/include/top.html
547
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
547
	[ -e /var/www/error/include/bottom.html.default ] || mv /var/www/error/include/bottom.html /var/www/error/include/bottom.html.default
548
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
548
	cat <<EOF > /var/www/error/include/bottom.html
549
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
549
</body>
550
</body>
550
</html>
551
</html>
551
EOF
552
EOF
552
# Définition du premier compte lié au profil 'admin'
553
# Définition du premier compte lié au profil 'admin'
553
	header_install
554
	header_install
554
	if [ "$mode" = "install" ]
555
	if [ "$mode" = "install" ]
555
	then
556
	then
556
		admin_portal=!
557
		admin_portal=!
557
		PTN='^[a-zA-Z0-9-]*$'
558
		PTN='^[a-zA-Z0-9-]*$'
558
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
559
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
559
                	do
560
                	do
560
			header_install
561
			header_install
561
			if [ $Lang == "fr" ]
562
			if [ $Lang == "fr" ]
562
			then 
563
			then 
563
				echo ""
564
				echo ""
564
				echo "Définissez un premier compte d'administration du portail :"
565
				echo "Définissez un premier compte d'administration du portail :"
565
				echo
566
				echo
566
				echo -n "Nom : "
567
				echo -n "Nom : "
567
			else
568
			else
568
				echo ""
569
				echo ""
569
				echo "Define the first account allow to administrate the portal :"
570
				echo "Define the first account allow to administrate the portal :"
570
				echo
571
				echo
571
				echo -n "Account : "
572
				echo -n "Account : "
572
			fi
573
			fi
573
			read admin_portal
574
			read admin_portal
574
			if [ "$admin_portal" == "" ]
575
			if [ "$admin_portal" == "" ]
575
				then
576
				then
576
				admin_portal=!
577
				admin_portal=!
577
			fi
578
			fi
578
			done
579
			done
579
# Creation of keys file for the admin account ("admin")
580
# Creation of keys file for the admin account ("admin")
580
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
581
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
581
		mkdir -p $DIR_DEST_ETC/digest
582
		mkdir -p $DIR_DEST_ETC/digest
582
		chmod 755 $DIR_DEST_ETC/digest
583
		chmod 755 $DIR_DEST_ETC/digest
583
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
584
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
584
			do
585
			do
585
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
586
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
586
			done
587
			done
587
		$DIR_DEST_SBIN/alcasar-profil.sh --list
588
		$DIR_DEST_SBIN/alcasar-profil.sh --list
588
	fi
589
	fi
589
# synchronisation horaire
590
# synchronisation horaire
590
	ntpd -q -g &
591
	ntpd -q -g &
591
# Sécurisation du centre
592
# Sécurisation du centre
592
	rm -f /etc/httpd/conf/webapps.d/alcasar*
593
	rm -f /etc/httpd/conf/webapps.d/alcasar*
593
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
594
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
594
<Directory $DIR_ACC>
595
<Directory $DIR_ACC>
595
	SSLRequireSSL
596
	SSLRequireSSL
596
	AllowOverride None
597
	AllowOverride None
597
	Order deny,allow
598
	Order deny,allow
598
	Deny from all
599
	Deny from all
599
	Allow from 127.0.0.1
600
	Allow from 127.0.0.1
600
	Allow from $PRIVATE_NETWORK_MASK
601
	Allow from $PRIVATE_NETWORK_MASK
601
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
602
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
602
	require valid-user
603
	require valid-user
603
	AuthType digest
604
	AuthType digest
604
	AuthName $HOSTNAME.$DOMAIN
605
	AuthName $HOSTNAME.$DOMAIN
605
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
606
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
606
	AuthUserFile $DIR_DEST_ETC/digest/key_all
607
	AuthUserFile $DIR_DEST_ETC/digest/key_all
607
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
608
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
608
</Directory>
609
</Directory>
609
<Directory $DIR_ACC/admin>
610
<Directory $DIR_ACC/admin>
610
	SSLRequireSSL
611
	SSLRequireSSL
611
	AllowOverride None
612
	AllowOverride None
612
	Order deny,allow
613
	Order deny,allow
613
	Deny from all
614
	Deny from all
614
	Allow from 127.0.0.1
615
	Allow from 127.0.0.1
615
	Allow from $PRIVATE_NETWORK_MASK
616
	Allow from $PRIVATE_NETWORK_MASK
616
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
617
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
617
	require valid-user
618
	require valid-user
618
	AuthType digest
619
	AuthType digest
619
	AuthName $HOSTNAME.$DOMAIN
620
	AuthName $HOSTNAME.$DOMAIN
620
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
621
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
621
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
622
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
622
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
623
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
623
</Directory>
624
</Directory>
624
<Directory $DIR_ACC/manager>
625
<Directory $DIR_ACC/manager>
625
	SSLRequireSSL
626
	SSLRequireSSL
626
	AllowOverride None
627
	AllowOverride None
627
	Order deny,allow
628
	Order deny,allow
628
	Deny from all
629
	Deny from all
629
	Allow from 127.0.0.1
630
	Allow from 127.0.0.1
630
	Allow from $PRIVATE_NETWORK_MASK
631
	Allow from $PRIVATE_NETWORK_MASK
631
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
632
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
632
	require valid-user
633
	require valid-user
633
	AuthType digest
634
	AuthType digest
634
	AuthName $HOSTNAME.$DOMAIN
635
	AuthName $HOSTNAME.$DOMAIN
635
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
636
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
636
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
637
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
637
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
638
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
638
</Directory>
639
</Directory>
639
<Directory $DIR_ACC/backup>
640
<Directory $DIR_ACC/backup>
640
	SSLRequireSSL
641
	SSLRequireSSL
641
	AllowOverride None
642
	AllowOverride None
642
	Order deny,allow
643
	Order deny,allow
643
	Deny from all
644
	Deny from all
644
	Allow from 127.0.0.1
645
	Allow from 127.0.0.1
645
	Allow from $PRIVATE_NETWORK_MASK
646
	Allow from $PRIVATE_NETWORK_MASK
646
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
647
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
647
	require valid-user
648
	require valid-user
648
	AuthType digest
649
	AuthType digest
649
	AuthName $HOSTNAME.$DOMAIN
650
	AuthName $HOSTNAME.$DOMAIN
650
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
651
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
651
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
652
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
652
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
653
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
653
</Directory>
654
</Directory>
654
Alias /save/ "$DIR_SAVE/"
655
Alias /save/ "$DIR_SAVE/"
655
<Directory $DIR_SAVE>
656
<Directory $DIR_SAVE>
656
	SSLRequireSSL
657
	SSLRequireSSL
657
	Options Indexes
658
	Options Indexes
658
	Order deny,allow
659
	Order deny,allow
659
	Deny from all
660
	Deny from all
660
	Allow from 127.0.0.1
661
	Allow from 127.0.0.1
661
	Allow from $PRIVATE_NETWORK_MASK
662
	Allow from $PRIVATE_NETWORK_MASK
662
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
663
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
663
	require valid-user
664
	require valid-user
664
	AuthType digest
665
	AuthType digest
665
	AuthName $HOSTNAME.$DOMAIN
666
	AuthName $HOSTNAME.$DOMAIN
666
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
667
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
667
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
668
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
668
</Directory>
669
</Directory>
669
EOF
670
EOF
670
} # End of ACC()
671
} # End of ACC()
671
 
672
 
672
##########################################################################################
673
##########################################################################################
673
##				Fonction "CA"						##
674
##				Fonction "CA"						##
674
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
675
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
675
##########################################################################################
676
##########################################################################################
676
CA ()
677
CA ()
677
{
678
{
678
	$SED "s?ifcfg-eth.?ifcfg-$INTIF?g" $DIR_DEST_BIN/alcasar-CA.sh
679
	$SED "s?ifcfg-eth.?ifcfg-$INTIF?g" $DIR_DEST_BIN/alcasar-CA.sh
679
	$DIR_DEST_BIN/alcasar-CA.sh
680
	$DIR_DEST_BIN/alcasar-CA.sh
680
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
681
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
681
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
682
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
682
	$SED "s?localhost.crt?alcasar.crt?g" $FIC_VIRTUAL_SSL
683
	$SED "s?localhost.crt?alcasar.crt?g" $FIC_VIRTUAL_SSL
683
	$SED "s?localhost.key?alcasar.key?g" $FIC_VIRTUAL_SSL
684
	$SED "s?localhost.key?alcasar.key?g" $FIC_VIRTUAL_SSL
684
	$SED "s?^#SSLCertificateChainFile.*?SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt?" $FIC_VIRTUAL_SSL
685
	$SED "s?^#SSLCertificateChainFile.*?SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt?" $FIC_VIRTUAL_SSL
685
	chown -R root:apache /etc/pki
686
	chown -R root:apache /etc/pki
686
	chmod -R 750 /etc/pki
687
	chmod -R 750 /etc/pki
687
} # End CA ()
688
} # End CA ()
688
 
689
 
689
##########################################################################################
690
##########################################################################################
690
##			Fonction "init_db"						##
691
##			Fonction "init_db"						##
691
## - Initialisation de la base Mysql							##
692
## - Initialisation de la base Mysql							##
692
## - Affectation du mot de passe de l'administrateur (root)				##
693
## - Affectation du mot de passe de l'administrateur (root)				##
693
## - Suppression des bases et des utilisateurs superflus				##
694
## - Suppression des bases et des utilisateurs superflus				##
694
## - Création de la base 'radius'							##
695
## - Création de la base 'radius'							##
695
## - Installation du schéma de cette base						##
696
## - Installation du schéma de cette base						##
696
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
697
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
697
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
698
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
698
##########################################################################################
699
##########################################################################################
699
init_db ()
700
init_db ()
700
{
701
{
701
	rm -rf /var/lib/mysql # to be sure that there is no former installation
702
	rm -rf /var/lib/mysql # to be sure that there is no former installation
702
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
703
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
703
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
704
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
704
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
705
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
705
	systemctl start mysqld.service
706
	systemctl start mysqld.service
706
	sleep 4
707
	sleep 4
707
	mysqladmin -u root password $mysqlpwd
708
	mysqladmin -u root password $mysqlpwd
708
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
709
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
709
# Secure the server
710
# Secure the server
710
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
711
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
711
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
712
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
712
# Create 'radius' database
713
# Create 'radius' database
713
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
714
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
714
# Add an empty radius database structure
715
# Add an empty radius database structure
715
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
716
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
716
# modify the start script in order to close accounting connexion when the system is comming down or up
717
# modify the start script in order to close accounting connexion when the system is comming down or up
717
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
718
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
718
	$SED "/ExecStartPost=/a ExecStartPost=[ -e /usr/local/sbin/alcasar-mysql.sh ] && /usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
719
	$SED "/ExecStartPost=/a ExecStartPost=[ -e /usr/local/sbin/alcasar-mysql.sh ] && /usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
719
	$SED "/ExecStartPost=/a ExecStop=[ -e /usr/local/sbin/alcasar-mysql.sh ] && /usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
720
	$SED "/ExecStartPost=/a ExecStop=[ -e /usr/local/sbin/alcasar-mysql.sh ] && /usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
720
	systemctl daemon-reload
721
	systemctl daemon-reload
721
} # End init_db ()
722
} # End init_db ()
722
 
723
 
723
##########################################################################
724
##########################################################################
724
##			Fonction "param_radius"				##
725
##			Fonction "param_radius"				##
725
## - Paramètrage des fichiers de configuration FreeRadius		##
726
## - Paramètrage des fichiers de configuration FreeRadius		##
726
## - Affectation du secret partagé entre coova-chilli et freeradius	##
727
## - Affectation du secret partagé entre coova-chilli et freeradius	##
727
## - Modification de fichier de conf pour l'accès à Mysql		##
728
## - Modification de fichier de conf pour l'accès à Mysql		##
728
##########################################################################
729
##########################################################################
729
param_radius ()
730
param_radius ()
730
{
731
{
731
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
732
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
732
	chown -R radius:radius /etc/raddb
733
	chown -R radius:radius /etc/raddb
733
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
734
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
734
# Set radius.conf parameters
735
# Set radius.conf parameters
735
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
736
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
736
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
737
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
737
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
738
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
738
# remove the proxy function
739
# remove the proxy function
739
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
740
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
740
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
741
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
741
# remove EAP module
742
# remove EAP module
742
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
743
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
743
# listen on loopback (should be modified later if EAP enabled)
744
# listen on loopback (should be modified later if EAP enabled)
744
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
745
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
745
# enable the  SQL module (and SQL counter)
746
# enable the  SQL module (and SQL counter)
746
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
747
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
747
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
748
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
748
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
749
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
749
# remvove virtual server and copy our conf file
750
# remvove virtual server and copy our conf file
750
	rm -f /etc/raddb/sites-enabled/*
751
	rm -f /etc/raddb/sites-enabled/*
751
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
752
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
752
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
753
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
753
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
754
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
754
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
755
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
755
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
756
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
756
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
757
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
757
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
758
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
758
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
759
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
759
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
760
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
760
	cat << EOF > /etc/raddb/clients.conf
761
	cat << EOF > /etc/raddb/clients.conf
761
client 127.0.0.1 {
762
client 127.0.0.1 {
762
	secret = $secretradius
763
	secret = $secretradius
763
	shortname = localhost
764
	shortname = localhost
764
}
765
}
765
EOF
766
EOF
766
# sql.conf modification
767
# sql.conf modification
767
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
768
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
768
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
769
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
769
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
770
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
770
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
771
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
771
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
772
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
772
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
773
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
773
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
774
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
774
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
775
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
775
# counter.conf modification (change the Max-All-Session-Time counter)
776
# counter.conf modification (change the Max-All-Session-Time counter)
776
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
777
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
777
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
778
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
778
	chown -R radius:radius /etc/raddb/sql/mysql/*
779
	chown -R radius:radius /etc/raddb/sql/mysql/*
779
# make certain that mysql is up before radius start
780
# make certain that mysql is up before radius start
780
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
781
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
781
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
782
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
782
	systemctl daemon-reload
783
	systemctl daemon-reload
783
} # End param_radius ()
784
} # End param_radius ()
784
 
785
 
785
##########################################################################
786
##########################################################################
786
##			Function "param_web_radius"			##
787
##			Function "param_web_radius"			##
787
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
788
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
788
## - Création du lien vers la page de changement de mot de passe        ##
789
## - Création du lien vers la page de changement de mot de passe        ##
789
##########################################################################
790
##########################################################################
790
param_web_radius ()
791
param_web_radius ()
791
{
792
{
792
# copie de l'interface d'origine dans la structure Alcasar
793
# copie de l'interface d'origine dans la structure Alcasar
793
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
794
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
794
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
795
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
795
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
796
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
796
# copie des fichiers modifiés
797
# copie des fichiers modifiés
797
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
798
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
798
	chown -R apache:apache $DIR_ACC/manager/
799
	chown -R apache:apache $DIR_ACC/manager/
799
# Modification des fichiers de configuration
800
# Modification des fichiers de configuration
800
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
801
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
801
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
802
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
802
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
803
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
803
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
804
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
804
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
805
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
805
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
806
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
806
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
807
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
807
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
808
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
808
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
809
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
809
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
810
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
810
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
811
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
811
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
812
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
812
	cat <<EOF > /etc/freeradius-web/naslist.conf
813
	cat <<EOF > /etc/freeradius-web/naslist.conf
813
nas1_name: alcasar-$ORGANISME
814
nas1_name: alcasar-$ORGANISME
814
nas1_model: Portail captif
815
nas1_model: Portail captif
815
nas1_ip: $PRIVATE_IP
816
nas1_ip: $PRIVATE_IP
816
nas1_port_num: 0
817
nas1_port_num: 0
817
nas1_community: public
818
nas1_community: public
818
EOF
819
EOF
819
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
820
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
820
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
821
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
821
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
822
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
822
# Ajout du mappage des attributs chillispot
823
# Ajout du mappage des attributs chillispot
823
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
824
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
824
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
825
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
825
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
826
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
826
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
827
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
827
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
828
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
828
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
829
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
829
	chown -R apache:apache /etc/freeradius-web
830
	chown -R apache:apache /etc/freeradius-web
830
# Ajout de l'alias vers la page de "changement de mot de passe usager"
831
# Ajout de l'alias vers la page de "changement de mot de passe usager"
831
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
832
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
832
<Directory $DIR_WEB/pass>
833
<Directory $DIR_WEB/pass>
833
	SSLRequireSSL
834
	SSLRequireSSL
834
	AllowOverride None
835
	AllowOverride None
835
	Order deny,allow
836
	Order deny,allow
836
	Deny from all
837
	Deny from all
837
	Allow from 127.0.0.1
838
	Allow from 127.0.0.1
838
	Allow from $PRIVATE_NETWORK_MASK
839
	Allow from $PRIVATE_NETWORK_MASK
839
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
840
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
840
</Directory>
841
</Directory>
841
EOF
842
EOF
842
} # End of param_web_radius ()
843
} # End of param_web_radius ()
843
 
844
 
844
##################################################################################
845
##################################################################################
845
##			Fonction "param_chilli"					##
846
##			Fonction "param_chilli"					##
846
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
847
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
847
## - Paramètrage de la page d'authentification (intercept.php)			##
848
## - Paramètrage de la page d'authentification (intercept.php)			##
848
##################################################################################
849
##################################################################################
849
param_chilli ()
850
param_chilli ()
850
{
851
{
851
# init file creation
852
# init file creation
852
	[ -e /etc/init.d/chilli.default ] || cp /etc/init.d/chilli /etc/init.d/chilli.default
853
	[ -e /etc/init.d/chilli.default ] || cp /etc/init.d/chilli /etc/init.d/chilli.default
853
	cat <<EOF > /etc/init.d/chilli
854
	cat <<EOF > /etc/init.d/chilli
854
#!/bin/sh
855
#!/bin/sh
855
#
856
#
856
# chilli CoovaChilli init
857
# chilli CoovaChilli init
857
#
858
#
858
# chkconfig: 2345 65 35
859
# chkconfig: 2345 65 35
859
# description: CoovaChilli
860
# description: CoovaChilli
860
### BEGIN INIT INFO
861
### BEGIN INIT INFO
861
# Provides:       chilli
862
# Provides:       chilli
862
# Required-Start: network 
863
# Required-Start: network 
863
# Should-Start: 
864
# Should-Start: 
864
# Required-Stop:  network
865
# Required-Stop:  network
865
# Should-Stop: 
866
# Should-Stop: 
866
# Default-Start:  2 3 5
867
# Default-Start:  2 3 5
867
# Default-Stop:
868
# Default-Stop:
868
# Description:    CoovaChilli access controller
869
# Description:    CoovaChilli access controller
869
### END INIT INFO
870
### END INIT INFO
870
 
871
 
871
[ -f /usr/sbin/chilli ] || exit 0
872
[ -f /usr/sbin/chilli ] || exit 0
872
. /etc/init.d/functions
873
. /etc/init.d/functions
873
CONFIG=/etc/chilli.conf
874
CONFIG=/etc/chilli.conf
874
pidfile=/var/run/chilli.pid
875
pidfile=/var/run/chilli.pid
875
[ -f \$CONFIG ] || {
876
[ -f \$CONFIG ] || {
876
    echo "\$CONFIG Not found"
877
    echo "\$CONFIG Not found"
877
    exit 0
878
    exit 0
878
}
879
}
879
RETVAL=0
880
RETVAL=0
880
prog="chilli"
881
prog="chilli"
881
case \$1 in
882
case \$1 in
882
    start)
883
    start)
883
	if [ -f \$pidfile ] ; then 
884
	if [ -f \$pidfile ] ; then 
884
		gprintf "chilli is already running"
885
		gprintf "chilli is already running"
885
	else
886
	else
886
        	gprintf "Starting \$prog: "
887
        	gprintf "Starting \$prog: "
887
		rm -f /var/run/chilli* # cleaning
888
		rm -f /var/run/chilli* # cleaning
888
        	/sbin/modprobe tun >/dev/null 2>&1
889
        	/sbin/modprobe tun >/dev/null 2>&1
889
        	echo 1 > /proc/sys/net/ipv4/ip_forward
890
        	echo 1 > /proc/sys/net/ipv4/ip_forward
890
		[ -e /dev/net/tun ] || {
891
		[ -e /dev/net/tun ] || {
891
	    	(cd /dev; 
892
	    	(cd /dev; 
892
			mkdir net; 
893
			mkdir net; 
893
			cd net; 
894
			cd net; 
894
			mknod tun c 10 200)
895
			mknod tun c 10 200)
895
		}
896
		}
896
		ifconfig $INTIF 0.0.0.0
897
		ifconfig $INTIF 0.0.0.0
897
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
898
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
898
        	RETVAL=$?
899
        	RETVAL=$?
899
	fi
900
	fi
900
	;;
901
	;;
901
 
902
 
902
    reload)
903
    reload)
903
	killall -HUP chilli
904
	killall -HUP chilli
904
	;;
905
	;;
905
 
906
 
906
    restart)
907
    restart)
907
	\$0 stop
908
	\$0 stop
908
        sleep 2
909
        sleep 2
909
	\$0 start
910
	\$0 start
910
	;;
911
	;;
911
    
912
    
912
    status)
913
    status)
913
        status chilli
914
        status chilli
914
        RETVAL=0
915
        RETVAL=0
915
        ;;
916
        ;;
916
 
917
 
917
    stop)
918
    stop)
918
	if [ -f \$pidfile ] ; then  
919
	if [ -f \$pidfile ] ; then  
919
        	gprintf "Shutting down \$prog: "
920
        	gprintf "Shutting down \$prog: "
920
		killproc /usr/sbin/chilli
921
		killproc /usr/sbin/chilli
921
		RETVAL=\$?
922
		RETVAL=\$?
922
		[ \$RETVAL = 0 ] && rm -f $pidfile
923
		[ \$RETVAL = 0 ] && rm -f $pidfile
923
	else	
924
	else	
924
        	gprintf "chilli is not running"
925
        	gprintf "chilli is not running"
925
	fi
926
	fi
926
	;;
927
	;;
927
    
928
    
928
    *)
929
    *)
929
        echo "Usage: \$0 {start|stop|restart|reload|status}"
930
        echo "Usage: \$0 {start|stop|restart|reload|status}"
930
        exit 1
931
        exit 1
931
esac
932
esac
932
echo
933
echo
933
EOF
934
EOF
934
 
935
 
935
# conf file creation
936
# conf file creation
936
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
937
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
937
	cat <<EOF > /etc/chilli.conf
938
	cat <<EOF > /etc/chilli.conf
938
# coova config for ALCASAR
939
# coova config for ALCASAR
939
cmdsocket	/var/run/chilli.sock
940
cmdsocket	/var/run/chilli.sock
940
unixipc		chilli.$INTIF.ipc
941
unixipc		chilli.$INTIF.ipc
941
pidfile		/var/run/chilli.$INTIF.pid
942
pidfile		/var/run/chilli.$INTIF.pid
942
net		$PRIVATE_NETWORK_MASK
943
net		$PRIVATE_NETWORK_MASK
943
dhcpif		$INTIF
944
dhcpif		$INTIF
944
ethers		$DIR_DEST_ETC/alcasar-ethers
945
ethers		$DIR_DEST_ETC/alcasar-ethers
945
#nodynip
946
#nodynip
946
#statip
947
#statip
947
dynip		$PRIVATE_NETWORK_MASK
948
dynip		$PRIVATE_NETWORK_MASK
948
domain		$DOMAIN
949
domain		$DOMAIN
949
dns1		$PRIVATE_IP
950
dns1		$PRIVATE_IP
950
dns2		$PRIVATE_IP
951
dns2		$PRIVATE_IP
951
uamlisten	$PRIVATE_IP
952
uamlisten	$PRIVATE_IP
952
uamport		3990
953
uamport		3990
953
macauth
954
macauth
954
macpasswd	password
955
macpasswd	password
955
locationname	$HOSTNAME.$DOMAIN
956
locationname	$HOSTNAME.$DOMAIN
956
radiusserver1	127.0.0.1
957
radiusserver1	127.0.0.1
957
radiusserver2	127.0.0.1
958
radiusserver2	127.0.0.1
958
radiussecret	$secretradius
959
radiussecret	$secretradius
959
radiusauthport	1812
960
radiusauthport	1812
960
radiusacctport	1813
961
radiusacctport	1813
961
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
962
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
962
radiusnasid	$HOSTNAME.$DOMAIN
963
radiusnasid	$HOSTNAME.$DOMAIN
963
uamsecret	$secretuam
964
uamsecret	$secretuam
964
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
965
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
965
coaport		3799
966
coaport		3799
966
#conup		$DIR_DEST_BIN/alcasar-conup.sh
967
#conup		$DIR_DEST_BIN/alcasar-conup.sh
967
#condown	$DIR_DEST_BIN/alcasar-condown.sh
968
#condown	$DIR_DEST_BIN/alcasar-condown.sh
968
include		$DIR_DEST_ETC/alcasar-uamallowed
969
include		$DIR_DEST_ETC/alcasar-uamallowed
969
include		$DIR_DEST_ETC/alcasar-uamdomain
970
include		$DIR_DEST_ETC/alcasar-uamdomain
970
#dhcpgateway
971
#dhcpgateway
971
#dhcprelayagent
972
#dhcprelayagent
972
#dhcpgatewayport
973
#dhcpgatewayport
973
EOF
974
EOF
974
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
975
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
975
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
976
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
976
# create files for trusted domains and urls
977
# create files for trusted domains and urls
977
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
978
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
978
	chown root:apache $DIR_DEST_ETC/alcasar-*
979
	chown root:apache $DIR_DEST_ETC/alcasar-*
979
	chmod 660 $DIR_DEST_ETC/alcasar-*
980
	chmod 660 $DIR_DEST_ETC/alcasar-*
980
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
981
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
981
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
982
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
982
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
983
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
983
# user 'chilli' creation (in order to run conup/off and up/down scripts
984
# user 'chilli' creation (in order to run conup/off and up/down scripts
984
	chilli_exist=`grep chilli /etc/passwd|wc -l`
985
	chilli_exist=`grep chilli /etc/passwd|wc -l`
985
	if [ "$chilli_exist" == "1" ]
986
	if [ "$chilli_exist" == "1" ]
986
	then
987
	then
987
	      userdel -r chilli 2>/dev/null
988
	      userdel -r chilli 2>/dev/null
988
	fi
989
	fi
989
	groupadd -f chilli
990
	groupadd -f chilli
990
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
991
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
991
}  # End of param_chilli ()
992
}  # End of param_chilli ()
992
 
993
 
993
##################################################################
994
##################################################################
994
##		Fonction "param_dansguardian"			##
995
##		Fonction "param_dansguardian"			##
995
## - Paramètrage du gestionnaire de contenu Dansguardian	##
996
## - Paramètrage du gestionnaire de contenu Dansguardian	##
996
##################################################################
997
##################################################################
997
param_dansguardian ()
998
param_dansguardian ()
998
{
999
{
999
	mkdir /var/dansguardian
1000
	mkdir /var/dansguardian
1000
	chown dansguardian /var/dansguardian
1001
	chown dansguardian /var/dansguardian
1001
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1002
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1002
# By default the filter is off 
1003
# By default the filter is off 
1003
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1004
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1004
# French deny HTML page
1005
# French deny HTML page
1005
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1006
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1006
# Listen only on LAN side
1007
# Listen only on LAN side
1007
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1008
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1008
# DG send its flow to HAVP
1009
# DG send its flow to HAVP
1009
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1010
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1010
# replace the default deny HTML page
1011
# replace the default deny HTML page
1011
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1012
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1012
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1013
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1013
# Don't log
1014
# Don't log
1014
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1015
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1015
# Run 10 daemons (20 in largest server)
1016
# Run 10 daemons (20 in largest server)
1016
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1017
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1017
# on désactive par défaut le controle de contenu des pages html
1018
# on désactive par défaut le controle de contenu des pages html
1018
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1019
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1019
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1020
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1020
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1021
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1021
# on désactive par défaut le contrôle d'URL par expressions régulières
1022
# on désactive par défaut le contrôle d'URL par expressions régulières
1022
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1023
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1023
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1024
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1024
# on désactive par défaut le contrôle de téléchargement de fichiers
1025
# on désactive par défaut le contrôle de téléchargement de fichiers
1025
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1026
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1026
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1027
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1027
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1028
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1028
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1029
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1029
	touch $DIR_DG/lists/bannedextensionlist
1030
	touch $DIR_DG/lists/bannedextensionlist
1030
	touch $DIR_DG/lists/bannedmimetypelist
1031
	touch $DIR_DG/lists/bannedmimetypelist
1031
# 'Safesearch' regex actualisation
1032
# 'Safesearch' regex actualisation
1032
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1033
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1033
# empty LAN IP list that won't be WEB filtered
1034
# empty LAN IP list that won't be WEB filtered
1034
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1035
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1035
	touch $DIR_DG/lists/exceptioniplist
1036
	touch $DIR_DG/lists/exceptioniplist
1036
# Keep a copy of URL & domain filter configuration files
1037
# Keep a copy of URL & domain filter configuration files
1037
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1038
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1038
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1039
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1039
} # End of param_dansguardian ()
1040
} # End of param_dansguardian ()
1040
 
1041
 
1041
##################################################################
1042
##################################################################
1042
##			Fonction "antivirus"			##
1043
##			Fonction "antivirus"			##
1043
## - configuration of havp, libclamav and freshclam		##
1044
## - configuration of havp, libclamav and freshclam		##
1044
##################################################################
1045
##################################################################
1045
antivirus ()		
1046
antivirus ()		
1046
{
1047
{
1047
# create 'havp' user
1048
# create 'havp' user
1048
	havp_exist=`grep havp /etc/passwd|wc -l`
1049
	havp_exist=`grep havp /etc/passwd|wc -l`
1049
	if [ "$havp_exist" == "1" ]
1050
	if [ "$havp_exist" == "1" ]
1050
	then
1051
	then
1051
	      userdel -r havp 2>/dev/null
1052
	      userdel -r havp 2>/dev/null
1052
	      groupdel havp 2>/dev/null
1053
	      groupdel havp 2>/dev/null
1053
	fi
1054
	fi
1054
	groupadd -f havp
1055
	groupadd -f havp
1055
	useradd -r -g havp -s /bin/false -c "system user for havp" havp
1056
	useradd -r -g havp -s /bin/false -c "system user for havp" havp
1056
	mkdir -p /var/tmp/havp /var/log/havp
1057
	mkdir -p /var/tmp/havp /var/log/havp
1057
	chown -R havp /var/tmp/havp /var/log/havp /var/run/havp
1058
	chown -R havp /var/tmp/havp /var/log/havp /var/run/havp
1058
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1059
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1059
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1060
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1060
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on 8090			
1061
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on 8090			
1061
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1062
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1062
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1063
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1063
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1064
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1064
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1065
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1065
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1066
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1066
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1067
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1067
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1068
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1068
# skip checking of youtube flow (too heavy load / risk too low)
1069
# skip checking of youtube flow (too heavy load / risk too low)
1069
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1070
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1070
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1071
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1071
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1072
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1072
# replacement of init script
1073
# replacement of init script
1073
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1074
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1074
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1075
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1075
# replace of the intercept page (template)
1076
# replace of the intercept page (template)
1076
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1077
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1077
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1078
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1078
# update virus database every 4 hours (24h/6)
1079
# update virus database every 4 hours (24h/6)
1079
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1080
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1080
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1081
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1081
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1082
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1082
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1083
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1083
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1084
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1084
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1085
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1085
# Copy of the main virus database
1086
# Copy of the main virus database
1086
	rm -f /var/lib/clamav/*.cld # in case of old database scheme
1087
	rm -f /var/lib/clamav/*.cld # in case of old database scheme
1087
	cp -f $DIR_CONF/clamav-main.cvd /var/lib/clamav/main.cvd
1088
	cp -f $DIR_CONF/clamav-main.cvd /var/lib/clamav/main.cvd
1088
	/usr/bin/freshclam
1089
	/usr/bin/freshclam
1089
}
1090
}
1090
 
1091
 
1091
##################################################################################
1092
##################################################################################
1092
##			function "param_ulogd"					##
1093
##			function "param_ulogd"					##
1093
## - Ulog config for multi-log files 						##
1094
## - Ulog config for multi-log files 						##
1094
##################################################################################
1095
##################################################################################
1095
param_ulogd ()
1096
param_ulogd ()
1096
{
1097
{
1097
# Three instances of ulogd (three different logfiles)
1098
# Three instances of ulogd (three different logfiles)
-
 
1099
	cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-ssh.service
1098
	cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-ssh.service /lib/systemd/system/ulogd-ext-access.service
1100
	cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-ext-access.service
1099
	mv /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-traceability.service
1101
	mv /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-traceability.service
1100
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1102
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1101
	nl=1
1103
	nl=1
1102
	for log_type in traceability ssh ext-access
1104
	for log_type in traceability ssh ext-access
1103
	do
1105
	do
1104
		[ -e /var/log/firewall/$log_type.log ] || touch /var/log/firewall/$log_type.log
1106
		[ -e /var/log/firewall/$log_type.log ] || touch /var/log/firewall/$log_type.log
1105
		cp -f /etc/ulogd.conf /etc/ulogd-$log_type.conf
1107
		cp -f /etc/ulogd.conf /etc/ulogd-$log_type.conf
1106
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1108
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1107
		$SED '/OPRINT/,$d' /etc/ulogd-$log_type.conf
1109
		$SED '/OPRINT/,$d' /etc/ulogd-$log_type.conf
1108
		cat << EOF >> /etc/ulogd-$log_type.conf
1110
		cat << EOF >> /etc/ulogd-$log_type.conf
1109
[LOGEMU]
1111
[LOGEMU]
1110
file="/var/log/firewall/$log_type.log"
1112
file="/var/log/firewall/$log_type.log"
1111
sync=1
1113
sync=1
1112
EOF
1114
EOF
1113
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -C /etc/ulogd-$log_type.conf?g" /lib/systemd/system/ulogd-$log_type.service
1115
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -C /etc/ulogd-$log_type.conf?g" /lib/systemd/system/ulogd-$log_type.service
1114
		nl=`expr $nl + 1`
1116
		nl=`expr $nl + 1`
1115
	done
1117
	done
1116
	chown -R root:apache /var/log/firewall
1118
	chown -R root:apache /var/log/firewall
1117
	chmod 750 /var/log/firewall
1119
	chmod 750 /var/log/firewall
1118
	chmod 640 /var/log/firewall/*
1120
	chmod 640 /var/log/firewall/*
1119
}  # End of param_ulogd ()
1121
}  # End of param_ulogd ()
1120
 
1122
 
1121
 
1123
 
1122
##########################################################
1124
##########################################################
1123
##              Function "param_nfsen"			##
1125
##              Function "param_nfsen"			##
1124
##########################################################
1126
##########################################################
1125
param_nfsen()
1127
param_nfsen()
1126
{
1128
{
1127
#Decompression tarball
1129
#Decompression tarball
1128
	tar xvzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1130
	tar xvzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1129
#Création groupe et utilisteur
1131
#Création groupe et utilisteur
1130
	if grep "^www-data:" /etc/group > /dev/null; then
1132
	if grep "^www-data:" /etc/group > /dev/null; then
1131
		echo "Group already exists !"
1133
		echo "Group already exists !"
1132
	else
1134
	else
1133
		groupadd www-data
1135
		groupadd www-data
1134
		echo "Group 'www-data' created !"
1136
		echo "Group 'www-data' created !"
1135
	fi
1137
	fi
1136
	if grep "^nfsen:" /etc/passwd > /dev/null; then
1138
	if grep "^nfsen:" /etc/passwd > /dev/null; then
1137
		echo "User already exists !"
1139
		echo "User already exists !"
1138
	else
1140
	else
1139
		useradd -m nfsen
1141
		useradd -m nfsen
1140
		echo "User 'nfsen' created !"
1142
		echo "User 'nfsen' created !"
1141
	fi
1143
	fi
1142
	usermod -G www-data nfsen
1144
	usermod -G www-data nfsen
1143
#Ajout du plugin nfsen : PortTracker
1145
#Ajout du plugin nfsen : PortTracker
1144
	mkdir -p /var/www/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1146
	mkdir -p /var/www/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1145
	chown -R nfsen:www-data /var/www/nfsen
1147
	chown -R nfsen:www-data /var/www/nfsen
1146
	chown -R apache:apache /usr/share/nfsen /var/log/netflow/porttracker
1148
	chown -R apache:apache /usr/share/nfsen /var/log/netflow/porttracker
1147
	cp -f $DIR_CONF/nfsen/PortTracker.pm /tmp/nfsen-1.3.6p1/contrib/PortTracker/
1149
	cp -f $DIR_CONF/nfsen/PortTracker.pm /tmp/nfsen-1.3.6p1/contrib/PortTracker/
1148
#Copie du fichier de conf modifié de nfsen
1150
#Copie du fichier de conf modifié de nfsen
1149
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1151
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1150
#Copie du script d'initialisation de nfsen
1152
#Copie du script d'initialisation de nfsen
1151
	cp $DIR_CONF/nfsen/nfsen.service /lib/systemd/system/
1153
	cp $DIR_CONF/nfsen/nfsen.service /lib/systemd/system/
1152
#Installation de nfsen via le scrip Perl
1154
#Installation de nfsen via le scrip Perl
1153
	DirTmp=$(pwd)
1155
	DirTmp=$(pwd)
1154
	cd /tmp/nfsen-1.3.6p1/
1156
	cd /tmp/nfsen-1.3.6p1/
1155
	/usr/bin/perl5 install.pl etc/nfsen.conf #script lancé deux fois pour corriger,
1157
	/usr/bin/perl5 install.pl etc/nfsen.conf #script lancé deux fois pour corriger,
1156
	/usr/bin/perl5 install.pl etc/nfsen.conf #un problème Perl : "Semaphore introuvable"
1158
	/usr/bin/perl5 install.pl etc/nfsen.conf #un problème Perl : "Semaphore introuvable"
1157
#Création de la DB pour rrdtool
1159
#Création de la DB pour rrdtool
1158
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1160
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1159
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/nfsen/plugins/
1161
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/nfsen/plugins/
1160
	sudo -u apache nftrack -I -d /var/log/netflow/porttracker
1162
	sudo -u apache nftrack -I -d /var/log/netflow/porttracker
1161
	chown -R apache:www-data /var/log/netflow/porttracker/
1163
	chown -R apache:www-data /var/log/netflow/porttracker/
1162
	chmod -R 775 /var/log/netflow/porttracker
1164
	chmod -R 775 /var/log/netflow/porttracker
1163
#Configuration du fichier de conf d'apache
1165
#Configuration du fichier de conf d'apache
1164
	if [ -f /etc/httpd/conf/conf.d/nfsen.conf ];then
1166
	if [ -f /etc/httpd/conf/conf.d/nfsen.conf ];then
1165
		rm -f /etc/httpd/conf/conf.d/nfsen.conf
1167
		rm -f /etc/httpd/conf/conf.d/nfsen.conf
1166
	fi
1168
	fi
1167
	cat <<EOF >> /etc/httpd/conf/conf.d/nfsen.conf
1169
	cat <<EOF >> /etc/httpd/conf/conf.d/nfsen.conf
1168
Alias /nfsen /var/www/nfsen 
1170
Alias /nfsen /var/www/nfsen 
1169
<Directory /var/www/nfsen/> 
1171
<Directory /var/www/nfsen/> 
1170
DirectoryIndex nfsen.php 
1172
DirectoryIndex nfsen.php 
1171
Options -Indexes 
1173
Options -Indexes 
1172
AllowOverride all 
1174
AllowOverride all 
1173
order allow,deny 
1175
order allow,deny 
1174
allow from all 
1176
allow from all 
1175
AddType application/x-httpd-php .php 
1177
AddType application/x-httpd-php .php 
1176
php_flag magic_quotes_gpc on 
1178
php_flag magic_quotes_gpc on 
1177
php_flag track_vars on 
1179
php_flag track_vars on 
1178
</Directory>
1180
</Directory>
1179
EOF
1181
EOF
1180
#Ajout du paramètre : IP d'écoute pour le collecteur (nfcapd)
1182
#Ajout du paramètre : IP d'écoute pour le collecteur (nfcapd)
1181
$SED s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1";'?g /usr/libexec/NfSenRC.pm 
1183
$SED s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1";'?g /usr/libexec/NfSenRC.pm 
1182
#Configuration du délais d'expiration des captures du profile "live"
1184
#Configuration du délais d'expiration des captures du profile "live"
1183
	nfsen -m live -e 62d 2>/dev/null
1185
	nfsen -m live -e 62d 2>/dev/null
1184
#Suppression des sources de nfsen
1186
#Suppression des sources de nfsen
1185
	cd $DirTmp
1187
	cd $DirTmp
1186
	rm -rf /tmp/nfsen-1.3.6p1/
1188
	rm -rf /tmp/nfsen-1.3.6p1/
1187
} # End of param_nfsen
1189
} # End of param_nfsen
1188
 
1190
 
1189
##########################################################
1191
##########################################################
1190
##		Function "param_dnsmasq"		##
1192
##		Function "param_dnsmasq"		##
1191
##########################################################
1193
##########################################################
1192
param_dnsmasq ()
1194
param_dnsmasq ()
1193
{
1195
{
1194
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1196
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1195
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1197
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1196
	$SED "s?^DHCP_LEASE=.*?DHCP_LEASE=/var/log/dnsmasq/lease.log?g" /etc/sysconfig/dnsmasq # fichier contenant les baux
1198
	$SED "s?^DHCP_LEASE=.*?DHCP_LEASE=/var/log/dnsmasq/lease.log?g" /etc/sysconfig/dnsmasq # fichier contenant les baux
1197
# Option : on pré-active les logs DNS des clients
1199
# Option : on pré-active les logs DNS des clients
1198
	$SED "s?log-facility?#OPTIONS=\"-q --log-facility=/var/log/dnsmasq/queries.log\"?g"  /etc/sysconfig/dnsmasq
1200
	$SED "s?log-facility?#OPTIONS=\"-q --log-facility=/var/log/dnsmasq/queries.log\"?g"  /etc/sysconfig/dnsmasq
1199
# Option : exemple de paramètre supplémentaire pour le cache memoire
1201
# Option : exemple de paramètre supplémentaire pour le cache memoire
1200
	echo '#OPTIONS="$OPTIONS --cache-size=250"' >> /etc/sysconfig/dnsmasq
1202
	echo '#OPTIONS="$OPTIONS --cache-size=250"' >> /etc/sysconfig/dnsmasq
1201
# Option : exemple de configuration avec un A.D.
1203
# Option : exemple de configuration avec un A.D.
1202
	echo '#OPTIONS="$OPTIONS --server=/your.domain/192.168.182.3"' >> /etc/sysconfig/dnsmasq
1204
	echo '#OPTIONS="$OPTIONS --server=/your.domain/192.168.182.3"' >> /etc/sysconfig/dnsmasq
1203
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1205
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1204
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if bypass is on.
1206
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if bypass is on.
1205
	cat << EOF > /etc/dnsmasq.conf 
1207
	cat << EOF > /etc/dnsmasq.conf 
1206
# Configuration file for "dnsmasq in forward mode"
1208
# Configuration file for "dnsmasq in forward mode"
1207
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1209
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1208
listen-address=$PRIVATE_IP
1210
listen-address=$PRIVATE_IP
1209
listen-address=127.0.0.1
1211
listen-address=127.0.0.1
1210
no-dhcp-interface=$INTIF
1212
no-dhcp-interface=$INTIF
1211
bind-interfaces
1213
bind-interfaces
1212
cache-size=256
1214
cache-size=256
1213
domain=$DOMAIN
1215
domain=$DOMAIN
1214
domain-needed
1216
domain-needed
1215
expand-hosts
1217
expand-hosts
1216
bogus-priv
1218
bogus-priv
1217
filterwin2k
1219
filterwin2k
1218
server=$DNS1
1220
server=$DNS1
1219
server=$DNS2
1221
server=$DNS2
1220
# le servive DHCP est configuré mais n'est exploité que pour le "bypass"
1222
# le servive DHCP est configuré mais n'est exploité que pour le "bypass"
1221
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1223
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1222
dhcp-option=option:router,$PRIVATE_IP
1224
dhcp-option=option:router,$PRIVATE_IP
1223
#dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5
1225
#dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5
1224
 
1226
 
1225
# Exemple de configuration statique : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1227
# Exemple de configuration statique : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1226
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1228
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1227
EOF
1229
EOF
1228
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1230
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1229
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1231
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1230
	# Configuration file for "dnsmasq with blacklist"
1232
	# Configuration file for "dnsmasq with blacklist"
1231
# Inclusion de la blacklist <domains> de Toulouse dans la configuration
1233
# Inclusion de la blacklist <domains> de Toulouse dans la configuration
1232
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1234
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1233
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1235
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1234
listen-address=$PRIVATE_IP
1236
listen-address=$PRIVATE_IP
1235
port=54
1237
port=54
1236
no-dhcp-interface=$INTIF
1238
no-dhcp-interface=$INTIF
1237
bind-interfaces
1239
bind-interfaces
1238
cache-size=256
1240
cache-size=256
1239
domain=$DOMAIN
1241
domain=$DOMAIN
1240
domain-needed
1242
domain-needed
1241
expand-hosts
1243
expand-hosts
1242
bogus-priv
1244
bogus-priv
1243
filterwin2k
1245
filterwin2k
1244
server=$DNS1
1246
server=$DNS1
1245
server=$DNS2
1247
server=$DNS2
1246
EOF
1248
EOF
1247
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelis")
1249
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelis")
1248
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1250
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1249
	# Configuration file for "dnsmasq with whitelist"
1251
	# Configuration file for "dnsmasq with whitelist"
1250
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1252
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1251
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1253
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1252
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1254
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1253
listen-address=$PRIVATE_IP
1255
listen-address=$PRIVATE_IP
1254
port=55
1256
port=55
1255
no-dhcp-interface=$INTIF
1257
no-dhcp-interface=$INTIF
1256
bind-interfaces
1258
bind-interfaces
1257
cache-size=256
1259
cache-size=256
1258
domain=$DOMAIN
1260
domain=$DOMAIN
1259
domain-needed
1261
domain-needed
1260
expand-hosts
1262
expand-hosts
1261
bogus-priv
1263
bogus-priv
1262
filterwin2k
1264
filterwin2k
1263
address=/#/$PRIVATE_IP
1265
address=/#/$PRIVATE_IP
1264
EOF
1266
EOF
1265
# Create dnsmasq-blacklist and dnsmasq-whitelist unit
1267
# Create dnsmasq-blacklist and dnsmasq-whitelist unit
1266
	cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-blacklist.service /lib/systemd/system/dnsmasq-whitelist.service
1268
	cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-blacklist.service /lib/systemd/system/dnsmasq-whitelist.service
1267
	$SED "s?^ExecStart=.*?ExecStart=/usr/bin/dnsmasq -C /etc/dnsmasq-blacklist.conf?g" /lib/systemd/system/dnsmasq-blacklist.service
1269
	$SED "s?^ExecStart=.*?ExecStart=/usr/bin/dnsmasq -C /etc/dnsmasq-blacklist.conf?g" /lib/systemd/system/dnsmasq-blacklist.service
1268
	$SED "s?^ExecStart=.*?ExecStart=/usr/bin/dnsmasq -C /etc/dnsmasq-whitelist.conf?g" /lib/systemd/system/dnsmasq-whitelist.service
1270
	$SED "s?^ExecStart=.*?ExecStart=/usr/bin/dnsmasq -C /etc/dnsmasq-whitelist.conf?g" /lib/systemd/system/dnsmasq-whitelist.service
1269
# TODO Start after chilli which create tun0
1271
# TODO Start after chilli which create tun0
1270
#	$SED "s?^# chkconfig:.*?# chkconfig: 2345 99 40?g" /etc/init.d/dnsmasq
1272
#	$SED "s?^# chkconfig:.*?# chkconfig: 2345 99 40?g" /etc/init.d/dnsmasq
1271
} # End dnsmasq
1273
} # End dnsmasq
1272
 
1274
 
1273
##########################################################
1275
##########################################################
1274
##		Fonction "BL"				##
1276
##		Fonction "BL"				##
1275
##########################################################
1277
##########################################################
1276
BL ()
1278
BL ()
1277
{
1279
{
1278
# on copie par défaut la BL de toulouse embarqués dans l'archive d'ALCASAR
1280
# on copie par défaut la BL de toulouse embarqués dans l'archive d'ALCASAR
1279
	rm -rf $DIR_DG/lists/blacklists
1281
	rm -rf $DIR_DG/lists/blacklists
1280
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1282
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1281
# on crée le répertoire ossi (noms de domaine et URLs ajoutés à la BL)
1283
# on crée le répertoire ossi (noms de domaine et URLs ajoutés à la BL)
1282
	mkdir $DIR_DG/lists/blacklists/ossi
1284
	mkdir $DIR_DG/lists/blacklists/ossi
1283
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1285
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1284
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1286
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1285
# On crée les fichiers vides de sites ou d'URL réhabilités
1287
# On crée les fichiers vides de sites ou d'URL réhabilités
1286
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1288
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1287
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1289
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1288
	touch $DIR_DG/lists/exceptionsitelist
1290
	touch $DIR_DG/lists/exceptionsitelist
1289
	touch $DIR_DG/lists/exceptionurllist
1291
	touch $DIR_DG/lists/exceptionurllist
1290
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1292
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1291
	cat <<EOF > $DIR_DG/lists/bannedurllist
1293
	cat <<EOF > $DIR_DG/lists/bannedurllist
1292
# Dansguardian filter config for ALCASAR
1294
# Dansguardian filter config for ALCASAR
1293
EOF
1295
EOF
1294
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1296
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1295
# Dansguardian domain filter config for ALCASAR
1297
# Dansguardian domain filter config for ALCASAR
1296
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1298
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1297
#**
1299
#**
1298
# block all SSL and CONNECT tunnels
1300
# block all SSL and CONNECT tunnels
1299
**s
1301
**s
1300
# block all SSL and CONNECT tunnels specified only as an IP
1302
# block all SSL and CONNECT tunnels specified only as an IP
1301
*ips
1303
*ips
1302
# block all sites specified only by an IP
1304
# block all sites specified only by an IP
1303
*ip
1305
*ip
1304
EOF
1306
EOF
1305
# Add Bing and Youtube to the safesearch url regext list (parental control)
1307
# Add Bing and Youtube to the safesearch url regext list (parental control)
1306
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1308
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1307
# Bing - add 'adlt=strict'
1309
# Bing - add 'adlt=strict'
1308
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1310
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1309
# Youtube - add 'edufilter=your_ID' 
1311
# Youtube - add 'edufilter=your_ID' 
1310
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1312
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1311
EOF
1313
EOF
1312
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1314
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1313
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1315
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1314
	chown -R dansguardian:apache $DIR_DG
1316
	chown -R dansguardian:apache $DIR_DG
1315
	chmod -R g+rw $DIR_DG
1317
	chmod -R g+rw $DIR_DG
1316
# On adapte la BL de Toulouse à notre structure
1318
# On adapte la BL de Toulouse à notre structure
1317
	if [ "$mode" != "update" ]; then
1319
	if [ "$mode" != "update" ]; then
1318
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1320
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1319
	fi
1321
	fi
1320
}
1322
}
1321
 
1323
 
1322
##########################################################
1324
##########################################################
1323
##		Fonction "cron"				##
1325
##		Fonction "cron"				##
1324
## - Mise en place des différents fichiers de cron	##
1326
## - Mise en place des différents fichiers de cron	##
1325
##########################################################
1327
##########################################################
1326
cron ()
1328
cron ()
1327
{
1329
{
1328
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1330
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1329
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1331
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1330
	cat <<EOF > /etc/crontab
1332
	cat <<EOF > /etc/crontab
1331
SHELL=/bin/bash
1333
SHELL=/bin/bash
1332
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1334
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1333
MAILTO=root
1335
MAILTO=root
1334
HOME=/
1336
HOME=/
1335
 
1337
 
1336
# run-parts
1338
# run-parts
1337
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1339
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1338
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1340
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1339
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1341
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1340
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1342
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1341
EOF
1343
EOF
1342
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1344
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1343
	cat <<EOF >> /etc/anacrontab
1345
	cat <<EOF >> /etc/anacrontab
1344
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1346
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1345
7       10      cron.logExport          nice /etc/cron.d/alcasar-export_log
1347
7       10      cron.logExport          nice /etc/cron.d/alcasar-export_log
1346
7       15      cron.logClean           nice /etc/cron.d/alcasar-clean_log
1348
7       15      cron.logClean           nice /etc/cron.d/alcasar-clean_log
1347
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1349
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1348
EOF
1350
EOF
1349
 
1351
 
1350
	cat <<EOF > /etc/cron.d/alcasar-mysql
1352
	cat <<EOF > /etc/cron.d/alcasar-mysql
1351
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1353
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1352
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1354
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1353
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1355
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1354
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1356
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1355
EOF
1357
EOF
1356
	cat <<EOF > /etc/cron.d/alcasar-archive
1358
	cat <<EOF > /etc/cron.d/alcasar-archive
1357
# Archive des logs et de la base de données (tous les lundi à 5h35)
1359
# Archive des logs et de la base de données (tous les lundi à 5h35)
1358
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1360
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1359
EOF
1361
EOF
1360
	cat << EOF > /etc/cron.d/alcasar-clean_import
1362
	cat << EOF > /etc/cron.d/alcasar-clean_import
1361
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1363
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1362
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1364
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1363
EOF
1365
EOF
1364
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1366
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1365
# mise à jour automatique de la distribution tous les jours 3h30
1367
# mise à jour automatique de la distribution tous les jours 3h30
1366
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1368
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1367
EOF
1369
EOF
1368
	#cat << EOF > /etc/cron.d/alcasar-netflow
1370
	#cat << EOF > /etc/cron.d/alcasar-netflow
1369
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1371
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1370
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1372
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1371
#EOF
1373
#EOF
1372
 
1374
 
1373
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1375
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1374
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1376
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1375
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1377
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1376
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1378
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1377
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1379
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1378
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1380
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1379
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1381
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1380
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1382
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1381
	rm -f /etc/cron.daily/freeradius-web
1383
	rm -f /etc/cron.daily/freeradius-web
1382
	rm -f /etc/cron.monthly/freeradius-web
1384
	rm -f /etc/cron.monthly/freeradius-web
1383
	cat << EOF > /etc/cron.d/freeradius-web
1385
	cat << EOF > /etc/cron.d/freeradius-web
1384
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1386
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1385
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1387
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1386
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1388
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1387
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1389
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1388
EOF
1390
EOF
1389
	cat << EOF > /etc/cron.d/alcasar-watchdog
1391
	cat << EOF > /etc/cron.d/alcasar-watchdog
1390
# activation du "chien de garde" (watchdog) toutes les 3'
1392
# activation du "chien de garde" (watchdog) toutes les 3'
1391
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1393
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1392
EOF
1394
EOF
1393
# activation du "chien de garde des services" (watchdog) toutes les 18'
1395
# activation du "chien de garde des services" (watchdog) toutes les 18'
1394
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1396
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1395
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1397
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1396
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1398
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1397
EOF
1399
EOF
1398
# suppression des crons usagers
1400
# suppression des crons usagers
1399
	rm -f /var/spool/cron/*
1401
	rm -f /var/spool/cron/*
1400
} # End cron
1402
} # End cron
1401
 
1403
 
1402
##################################################################
1404
##################################################################
1403
## 			Fonction "Fail2Ban"			##
1405
## 			Fonction "Fail2Ban"			##
1404
##- Modification de la configuration de fail2ban		##
1406
##- Modification de la configuration de fail2ban		##
1405
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1407
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1406
##################################################################
1408
##################################################################
1407
fail2ban()
1409
fail2ban()
1408
{
1410
{
1409
	$DIR_CONF/fail2ban.sh
1411
	$DIR_CONF/fail2ban.sh
1410
#Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1412
#Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1411
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1413
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1412
	[ -e /var/Save/logs/security/watchdog.log ] || touch /var/Save/logs/security/watchdog.log
1414
	[ -e /var/Save/logs/security/watchdog.log ] || touch /var/Save/logs/security/watchdog.log
1413
	chmod 644 /var/log/fail2ban.log
1415
	chmod 644 /var/log/fail2ban.log
1414
	chmod 644 /var/Save/logs/security/watchdog.log
1416
	chmod 644 /var/Save/logs/security/watchdog.log
1415
} #Fin de fail2ban_install()
1417
} #Fin de fail2ban_install()
1416
 
1418
 
1417
##################################################################
1419
##################################################################
1418
##			Fonction "post_install"			##
1420
##			Fonction "post_install"			##
1419
## - Modification des bannières (locales et ssh) et des prompts ##
1421
## - Modification des bannières (locales et ssh) et des prompts ##
1420
## - Installation de la structure de chiffrement pour root	##
1422
## - Installation de la structure de chiffrement pour root	##
1421
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1423
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1422
## - Mise en place du la rotation des logs			##
1424
## - Mise en place du la rotation des logs			##
1423
## - Configuration dans le cas d'une mise à jour		##
1425
## - Configuration dans le cas d'une mise à jour		##
1424
##################################################################
1426
##################################################################
1425
post_install()
1427
post_install()
1426
{
1428
{
1427
# adaptation du script "chien de garde" (watchdog)
1429
# adaptation du script "chien de garde" (watchdog)
1428
	$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-watchdog.sh
1430
	$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-watchdog.sh
1429
	$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-watchdog.sh
1431
	$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-watchdog.sh
1430
# création de la bannière locale
1432
# création de la bannière locale
1431
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1433
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1432
	cp -f $DIR_CONF/banner /etc/mageia-release
1434
	cp -f $DIR_CONF/banner /etc/mageia-release
1433
	echo " V$VERSION" >> /etc/mageia-release
1435
	echo " V$VERSION" >> /etc/mageia-release
1434
# création de la bannière SSH
1436
# création de la bannière SSH
1435
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1437
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1436
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1438
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1437
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1439
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1438
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1440
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1439
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1441
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1440
# postfix banner anonymisation
1442
# postfix banner anonymisation
1441
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1443
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1442
# sshd écoute côté LAN et WAN
1444
# sshd écoute côté LAN et WAN
1443
	$SED "s?^#ListenAddress 0\.0\.0\.0?ListenAddress $PRIVATE_IP?g" /etc/ssh/sshd_config
1445
	$SED "s?^#ListenAddress 0\.0\.0\.0?ListenAddress $PRIVATE_IP?g" /etc/ssh/sshd_config
1444
	$SED "/^ListenAddress $PRIVATE_IP/a\ListenAddress $PUBLIC_IP" /etc/ssh/sshd_config 
1446
	$SED "/^ListenAddress $PRIVATE_IP/a\ListenAddress $PUBLIC_IP" /etc/ssh/sshd_config 
1445
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1447
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1446
	echo "SSH=off" >> $CONF_FILE
1448
	echo "SSH=off" >> $CONF_FILE
1447
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1449
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1448
	echo "QOS=off" >> $CONF_FILE
1450
	echo "QOS=off" >> $CONF_FILE
1449
	echo "LDAP=off" >> $CONF_FILE
1451
	echo "LDAP=off" >> $CONF_FILE
1450
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1452
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1451
	echo "WEB_ANTIVIRUS=on" >> $CONF_FILE # TODO to remove
1453
	echo "WEB_ANTIVIRUS=on" >> $CONF_FILE # TODO to remove
1452
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE # TODO to remove
1454
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE # TODO to remove
1453
	echo "DNS_FILTERING=off" >> $CONF_FILE # TODO to remove
1455
	echo "DNS_FILTERING=off" >> $CONF_FILE # TODO to remove
1454
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1456
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1455
	echo "MULTIWAN=off" >> $CONF_FILE
1457
	echo "MULTIWAN=off" >> $CONF_FILE
1456
	echo "FAILOVER=30" >> $CONF_FILE
1458
	echo "FAILOVER=30" >> $CONF_FILE
1457
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1459
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1458
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1460
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1459
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1461
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1460
# Coloration des prompts
1462
# Coloration des prompts
1461
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1463
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1462
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1464
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1463
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1465
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1464
# Droits d'exécution pour utilisateur apache et sysadmin
1466
# Droits d'exécution pour utilisateur apache et sysadmin
1465
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1467
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1466
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1468
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1467
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1469
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1468
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, radiusd, ulogd)
1470
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, radiusd, ulogd)
1469
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1471
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1470
	chmod 644 /etc/logrotate.d/*
1472
	chmod 644 /etc/logrotate.d/*
1471
# rectification sur versions précédentes de la compression des logs
1473
# rectification sur versions précédentes de la compression des logs
1472
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1474
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1473
# actualisation des fichiers logs compressés
1475
# actualisation des fichiers logs compressés
1474
	for dir in firewall dansguardian httpd
1476
	for dir in firewall dansguardian httpd
1475
	do
1477
	do
1476
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1478
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1477
	done
1479
	done
1478
# create the alcasar-load_balancing unit
1480
# create the alcasar-load_balancing unit
1479
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1481
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1480
#  This file is part of systemd.
1482
#  This file is part of systemd.
1481
#
1483
#
1482
#  systemd is free software; you can redistribute it and/or modify it
1484
#  systemd is free software; you can redistribute it and/or modify it
1483
#  under the terms of the GNU General Public License as published by
1485
#  under the terms of the GNU General Public License as published by
1484
#  the Free Software Foundation; either version 2 of the License, or
1486
#  the Free Software Foundation; either version 2 of the License, or
1485
#  (at your option) any later version.
1487
#  (at your option) any later version.
1486
 
1488
 
1487
# This unit lauches alcasar-load-balancing.sh script.
1489
# This unit lauches alcasar-load-balancing.sh script.
1488
[Unit]
1490
[Unit]
1489
Description=alcasar-load_balancing.sh execution
1491
Description=alcasar-load_balancing.sh execution
1490
After=network.target iptables.service
1492
After=network.target iptables.service
1491
 
1493
 
1492
[Service]
1494
[Service]
1493
Type=oneshot
1495
Type=oneshot
1494
RemainAfterExit=yes
1496
RemainAfterExit=yes
1495
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1497
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1496
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1498
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1497
TimeoutSec=0
1499
TimeoutSec=0
1498
SysVStartPriority=99
1500
SysVStartPriority=99
1499
 
1501
 
1500
[Install]
1502
[Install]
1501
WantedBy=multi-user.target
1503
WantedBy=multi-user.target
1502
EOF
1504
EOF
1503
# processes launched at boot time (SYSV)
1505
# processes launched at boot time (SYSV)
1504
	for i in chilli havp 
1506
	for i in chilli havp 
1505
	do
1507
	do
1506
		/sbin/chkconfig --add $i
1508
		/sbin/chkconfig --add $i
1507
	done
1509
	done
1508
# processes launched at boot time (Systemctl)
1510
# processes launched at boot time (Systemctl)
1509
	for i in alcasar-load_balancing nfsen mysqld httpd ntpd iptables ulogd dnsmasq radiusd dansguardian freshclam
1511
	for i in alcasar-load_balancing nfsen mysqld httpd ntpd iptables ulogd dnsmasq radiusd dansguardian freshclam
1510
 
1512
 
1511
	do
1513
	do
1512
		systemctl enable $i
1514
		systemctl enable $i
1513
	done
1515
	done
1514
# Apply French Security Agency (ANSSI) rules
1516
# Apply French Security Agency (ANSSI) rules
1515
# ignorer les broadcast ICMP. (attaque smurf) 
1517
# ignorer les broadcast ICMP. (attaque smurf) 
1516
	sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1
1518
	sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1
1517
# ignorer les erreurs ICMP bogus
1519
# ignorer les erreurs ICMP bogus
1518
	sysctl -w net.ipv4.icmp_ignore_bogus_error_responses=1
1520
	sysctl -w net.ipv4.icmp_ignore_bogus_error_responses=1
1519
# désactiver l'envoi et la réponse aux ICMP redirects
1521
# désactiver l'envoi et la réponse aux ICMP redirects
1520
	sysctl -w net.ipv4.conf.all.accept_redirects=0
1522
	sysctl -w net.ipv4.conf.all.accept_redirects=0
1521
	accept_redirect=`grep accept_redirect /etc/sysctl.conf|wc -l`
1523
	accept_redirect=`grep accept_redirect /etc/sysctl.conf|wc -l`
1522
	if [ "$accept_redirect" == "0" ]
1524
	if [ "$accept_redirect" == "0" ]
1523
	then
1525
	then
1524
		echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.conf
1526
		echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.conf
1525
	else
1527
	else
1526
		$SED "s?accept_redirects.*?accept_redirects = 0?g" /etc/sysctl.conf
1528
		$SED "s?accept_redirects.*?accept_redirects = 0?g" /etc/sysctl.conf
1527
	fi
1529
	fi
1528
	sysctl -w net.ipv4.conf.all.send_redirects=0
1530
	sysctl -w net.ipv4.conf.all.send_redirects=0
1529
	send_redirect=`grep send_redirect /etc/sysctl.conf|wc -l`
1531
	send_redirect=`grep send_redirect /etc/sysctl.conf|wc -l`
1530
	if [ "$send_redirect" == "0" ]
1532
	if [ "$send_redirect" == "0" ]
1531
	then
1533
	then
1532
		echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.conf
1534
		echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.conf
1533
	else
1535
	else
1534
		$SED "s?send_redirects.*?send_redirects = 0?g" /etc/sysctl.conf
1536
		$SED "s?send_redirects.*?send_redirects = 0?g" /etc/sysctl.conf
1535
	fi
1537
	fi
1536
# activer les SYN Cookies (attaque syn flood)
1538
# activer les SYN Cookies (attaque syn flood)
1537
	sysctl -w net.ipv4.tcp_syncookies=1
1539
	sysctl -w net.ipv4.tcp_syncookies=1
1538
	tcp_syncookies=`grep tcp_syncookies /etc/sysctl.conf|wc -l`
1540
	tcp_syncookies=`grep tcp_syncookies /etc/sysctl.conf|wc -l`
1539
	if [ "$tcp_syncookies" == "0" ]
1541
	if [ "$tcp_syncookies" == "0" ]
1540
	then
1542
	then
1541
		echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.conf
1543
		echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.conf
1542
	else
1544
	else
1543
		$SED "s?tcp_syncookies.*?tcp_syncookies = 1?g" /etc/sysctl.conf
1545
		$SED "s?tcp_syncookies.*?tcp_syncookies = 1?g" /etc/sysctl.conf
1544
	fi
1546
	fi
1545
# activer l'antispoofing niveau Noyau
1547
# activer l'antispoofing niveau Noyau
1546
	sysctl -w net.ipv4.conf.all.rp_filter=1
1548
	sysctl -w net.ipv4.conf.all.rp_filter=1
1547
# ignorer le source routing
1549
# ignorer le source routing
1548
	sysctl -w net.ipv4.conf.all.accept_source_route=0
1550
	sysctl -w net.ipv4.conf.all.accept_source_route=0
1549
	 accept_source_route=`grep accept_source_route /etc/sysctl.conf|wc -l`
1551
	 accept_source_route=`grep accept_source_route /etc/sysctl.conf|wc -l`
1550
	if [ "$accept_source_route" == "0" ]
1552
	if [ "$accept_source_route" == "0" ]
1551
	then
1553
	then
1552
		echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.conf
1554
		echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.conf
1553
	else
1555
	else
1554
		$SED "s?accept_source_route.*?accept_source_route = 0?g" /etc/sysctl.conf
1556
		$SED "s?accept_source_route.*?accept_source_route = 0?g" /etc/sysctl.conf
1555
	fi
1557
	fi
1556
# réglage du timer de maintien de suivi de session à 1h (3600s) au lieu de 5 semaines
1558
# réglage du timer de maintien de suivi de session à 1h (3600s) au lieu de 5 semaines
1557
	sysctl -w net.netfilter.nf_conntrack_tcp_timeout_established=3600
1559
	sysctl -w net.netfilter.nf_conntrack_tcp_timeout_established=3600
1558
	timeout_established=`grep timeout_established /etc/sysctl.conf|wc -l`
1560
	timeout_established=`grep timeout_established /etc/sysctl.conf|wc -l`
1559
	if [ "$timeout_established" == "0" ]
1561
	if [ "$timeout_established" == "0" ]
1560
	then
1562
	then
1561
		echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.conf
1563
		echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.conf
1562
	else
1564
	else
1563
		$SED "s?timeout_established.*?timeout_established = 3600?g" /etc/sysctl.conf
1565
		$SED "s?timeout_established.*?timeout_established = 3600?g" /etc/sysctl.conf
1564
	fi
1566
	fi
1565
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1567
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1566
	sysctl -w net.ipv4.conf.all.log_martians=0
1568
	sysctl -w net.ipv4.conf.all.log_martians=0
1567
# On supprime la gestion du <CTRL>+<ALT>+<SUPPR> et des Magic SysReq Keys
1569
# On supprime la gestion du <CTRL>+<ALT>+<SUPPR> et des Magic SysReq Keys
1568
# ???	$SED "s?^ALLOW_REBOOT=.*?ALLOW_REBOOT=no?g" /etc/security/msec/level.fileserver
1570
# ???	$SED "s?^ALLOW_REBOOT=.*?ALLOW_REBOOT=no?g" /etc/security/msec/level.fileserver
1569
# switch to multi-users runlevel (instead of x11)
1571
# switch to multi-users runlevel (instead of x11)
1570
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1572
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1571
#	GRUB modifications
1573
#	GRUB modifications
1572
# limit wait time to 3s
1574
# limit wait time to 3s
1573
# create an alcasar entry instead of linux-nonfb
1575
# create an alcasar entry instead of linux-nonfb
1574
# change display to 1024*768 (vga791)
1576
# change display to 1024*768 (vga791)
1575
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1577
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1576
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1578
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1577
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1579
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1578
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1580
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1579
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1581
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1580
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1582
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1581
# Remove unused services and users
1583
# Remove unused services and users
1582
	for old_svc in alsa sound dm
1584
	for old_svc in alsa sound dm
1583
	do
1585
	do
1584
		/sbin/chkconfig --del $old_svc
1586
		/sbin/chkconfig --del $old_svc
1585
	done
1587
	done
1586
	for svc in snmpd.service sshd.service
1588
	for svc in snmpd.service sshd.service
1587
	do
1589
	do
1588
		/bin/systemctl disable $svc
1590
		/bin/systemctl disable $svc
1589
	done
1591
	done
1590
	for rm_users in avahi-autoipd avahi icapd
1592
	for rm_users in avahi-autoipd avahi icapd
1591
	do
1593
	do
1592
		user=`cat /etc/passwd|grep $rm_users|cut -d":" -f1`
1594
		user=`cat /etc/passwd|grep $rm_users|cut -d":" -f1`
1593
		if [ "$user" == "$rm_users" ]
1595
		if [ "$user" == "$rm_users" ]
1594
		then
1596
		then
1595
			/usr/sbin/userdel -f $rm_users
1597
			/usr/sbin/userdel -f $rm_users
1596
		fi
1598
		fi
1597
	done
1599
	done
1598
# Load and apply the previous conf file
1600
# Load and apply the previous conf file
1599
	if [ "$mode" = "update" ]
1601
	if [ "$mode" = "update" ]
1600
	then
1602
	then
1601
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1603
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1602
		$DIR_DEST_BIN/alcasar-conf.sh --load
1604
		$DIR_DEST_BIN/alcasar-conf.sh --load
1603
		PARENT_SCRIPT=`basename $0`
1605
		PARENT_SCRIPT=`basename $0`
1604
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1606
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1605
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1607
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1606
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1608
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1607
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1609
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1608
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1610
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1609
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1611
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1610
		then
1612
		then
1611
			header_install
1613
			header_install
1612
			if [ $Lang == "fr" ]
1614
			if [ $Lang == "fr" ]
1613
			then 
1615
			then 
1614
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1616
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1615
				echo
1617
				echo
1616
				echo -n "Nom : "
1618
				echo -n "Nom : "
1617
			else
1619
			else
1618
				echo "This update need to redefine the first admin account"
1620
				echo "This update need to redefine the first admin account"
1619
				echo
1621
				echo
1620
				echo -n "Account : "
1622
				echo -n "Account : "
1621
			fi
1623
			fi
1622
			read admin_portal
1624
			read admin_portal
1623
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1625
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1624
			mkdir -p $DIR_DEST_ETC/digest
1626
			mkdir -p $DIR_DEST_ETC/digest
1625
			chmod 755 $DIR_DEST_ETC/digest
1627
			chmod 755 $DIR_DEST_ETC/digest
1626
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1628
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1627
			do
1629
			do
1628
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1630
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1629
			done
1631
			done
1630
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1632
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1631
		fi
1633
		fi
1632
	fi
1634
	fi
1633
	rm -f /tmp/alcasar-conf*
1635
	rm -f /tmp/alcasar-conf*
1634
	chown -R root:apache $DIR_DEST_ETC/*
1636
	chown -R root:apache $DIR_DEST_ETC/*
1635
	chmod -R 660 $DIR_DEST_ETC/*
1637
	chmod -R 660 $DIR_DEST_ETC/*
1636
	chmod ug+x $DIR_DEST_ETC/digest
1638
	chmod ug+x $DIR_DEST_ETC/digest
1637
# Apply and save the firewall rules
1639
# Apply and save the firewall rules
1638
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1640
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1639
	sleep 2
1641
	sleep 2
1640
	cd $DIR_INSTALL
1642
	cd $DIR_INSTALL
1641
	echo ""
1643
	echo ""
1642
	echo "#############################################################################"
1644
	echo "#############################################################################"
1643
	if [ $Lang == "fr" ]
1645
	if [ $Lang == "fr" ]
1644
		then
1646
		then
1645
		echo "#                        Fin d'installation d'ALCASAR                       #"
1647
		echo "#                        Fin d'installation d'ALCASAR                       #"
1646
		echo "#                                                                           #"
1648
		echo "#                                                                           #"
1647
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1649
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1648
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1650
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1649
		echo "#                                                                           #"
1651
		echo "#                                                                           #"
1650
		echo "#############################################################################"
1652
		echo "#############################################################################"
1651
		echo
1653
		echo
1652
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1654
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1653
		echo
1655
		echo
1654
		echo "- Lisez attentivement la documentation d'exploitation"
1656
		echo "- Lisez attentivement la documentation d'exploitation"
1655
		echo
1657
		echo
1656
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1658
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1657
		echo
1659
		echo
1658
		echo "                   Appuyez sur 'Entrée' pour continuer"
1660
		echo "                   Appuyez sur 'Entrée' pour continuer"
1659
	else	
1661
	else	
1660
		echo "#                        Enf of ALCASAR install process                     #"
1662
		echo "#                        Enf of ALCASAR install process                     #"
1661
		echo "#                                                                           #"
1663
		echo "#                                                                           #"
1662
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1664
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1663
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1665
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1664
		echo "#                                                                           #"
1666
		echo "#                                                                           #"
1665
		echo "#############################################################################"
1667
		echo "#############################################################################"
1666
		echo
1668
		echo
1667
		echo "- The system will be rebooted in order to operate ALCASAR"
1669
		echo "- The system will be rebooted in order to operate ALCASAR"
1668
		echo
1670
		echo
1669
		echo "- Read the exploitation documentation"
1671
		echo "- Read the exploitation documentation"
1670
		echo
1672
		echo
1671
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
1673
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
1672
		echo
1674
		echo
1673
		echo "                   Hit 'Enter' to continue"
1675
		echo "                   Hit 'Enter' to continue"
1674
	fi
1676
	fi
1675
	sleep 2
1677
	sleep 2
1676
	if [ "$mode" != "update" ]
1678
	if [ "$mode" != "update" ]
1677
	then
1679
	then
1678
		read a
1680
		read a
1679
	fi
1681
	fi
1680
	clear
1682
	clear
1681
	reboot
1683
	reboot
1682
} # End post_install ()
1684
} # End post_install ()
1683
 
1685
 
1684
 
1686
 
1685
##################################################################
1687
##################################################################
1686
## 			Fonction "gammu_smsd"			##
1688
## 			Fonction "gammu_smsd"			##
1687
## - Creation de la base de donnée Gammu			##
1689
## - Creation de la base de donnée Gammu			##
1688
## - Creation du fichier de config: gammu_smsd_conf		##
1690
## - Creation du fichier de config: gammu_smsd_conf		##
1689
##								##
1691
##								##
1690
##################################################################
1692
##################################################################
1691
gammu_smsd()
1693
gammu_smsd()
1692
{
1694
{
1693
# Create 'gammu' databse
1695
# Create 'gammu' databse
1694
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1696
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1695
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1697
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1696
# Add a gammu database structure
1698
# Add a gammu database structure
1697
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1699
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1698
 
1700
 
1699
 
1701
 
1700
# Creation du fichier de config gammu_smsd_conf
1702
# Creation du fichier de config gammu_smsd_conf
1701
cat << EOF > /etc/gammu_smsd_conf
1703
cat << EOF > /etc/gammu_smsd_conf
1702
[gammu]
1704
[gammu]
1703
port = /dev/ttyUSB0
1705
port = /dev/ttyUSB0
1704
connection = at115200
1706
connection = at115200
1705
 
1707
 
1706
;########################################################
1708
;########################################################
1707
 
1709
 
1708
[smsd]
1710
[smsd]
1709
 
1711
 
1710
PIN = 1234
1712
PIN = 1234
1711
 
1713
 
1712
logfile = /var/log/gammu-smsd/gammu-smsd.log
1714
logfile = /var/log/gammu-smsd/gammu-smsd.log
1713
logformat = textall
1715
logformat = textall
1714
debuglevel = 0
1716
debuglevel = 0
1715
 
1717
 
1716
service = sql
1718
service = sql
1717
driver = native_mysql
1719
driver = native_mysql
1718
user = $DB_USER
1720
user = $DB_USER
1719
password = $radiuspwd
1721
password = $radiuspwd
1720
pc = localhost
1722
pc = localhost
1721
database = $DB_GAMMU
1723
database = $DB_GAMMU
1722
 
1724
 
1723
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1725
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1724
 
1726
 
1725
StatusFrequency = 30
1727
StatusFrequency = 30
1726
LoopSleep = 2
1728
LoopSleep = 2
1727
 
1729
 
1728
;ResetFrequency = 300
1730
;ResetFrequency = 300
1729
;HardResetFrequency = 120
1731
;HardResetFrequency = 120
1730
 
1732
 
1731
CheckSecurity = 1 
1733
CheckSecurity = 1 
1732
CheckSignal = 1
1734
CheckSignal = 1
1733
CheckBattery = 0
1735
CheckBattery = 0
1734
EOF
1736
EOF
1735
 
1737
 
1736
chmod 755 /etc/gammu_smsd_conf
1738
chmod 755 /etc/gammu_smsd_conf
1737
 
1739
 
1738
#Creation dossier de log Gammu-smsd
1740
#Creation dossier de log Gammu-smsd
1739
mkdir /var/log/gammu-smsd
1741
mkdir /var/log/gammu-smsd
1740
chmod 755 /var/log/gammu-smsd
1742
chmod 755 /var/log/gammu-smsd
1741
 
1743
 
1742
#Edition du script sql gammu <-> radius
1744
#Edition du script sql gammu <-> radius
1743
$SED "10c u_db=\"$DB_USER\"" $DIR_DEST_BIN/alcasar-sms.sh
1745
$SED "10c u_db=\"$DB_USER\"" $DIR_DEST_BIN/alcasar-sms.sh
1744
$SED "11c p_db=\"$radiuspwd\"" $DIR_DEST_BIN/alcasar-sms.sh
1746
$SED "11c p_db=\"$radiuspwd\"" $DIR_DEST_BIN/alcasar-sms.sh
1745
 
1747
 
1746
} # END gammu_smsd()
1748
} # END gammu_smsd()
1747
 
1749
 
1748
 
1750
 
1749
 
1751
 
1750
 
1752
 
1751
#################################
1753
#################################
1752
#  	Main Install loop  	#
1754
#  	Main Install loop  	#
1753
#################################
1755
#################################
1754
dir_exec=`dirname "$0"`
1756
dir_exec=`dirname "$0"`
1755
if [ $dir_exec != "." ]
1757
if [ $dir_exec != "." ]
1756
then
1758
then
1757
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
1759
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
1758
	echo "Launch this program from the ALCASAR archive directory"
1760
	echo "Launch this program from the ALCASAR archive directory"
1759
	exit 0
1761
	exit 0
1760
fi
1762
fi
1761
VERSION=`cat $DIR_INSTALL/VERSION`
1763
VERSION=`cat $DIR_INSTALL/VERSION`
1762
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1764
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1763
nb_args=$#
1765
nb_args=$#
1764
args=$1
1766
args=$1
1765
if [ $nb_args -eq 0 ]
1767
if [ $nb_args -eq 0 ]
1766
then
1768
then
1767
	nb_args=1
1769
	nb_args=1
1768
	args="-h"
1770
	args="-h"
1769
fi
1771
fi
1770
chmod -R u+x $DIR_SCRIPTS/*
1772
chmod -R u+x $DIR_SCRIPTS/*
1771
case $args in
1773
case $args in
1772
	-\? | -h* | --h*)
1774
	-\? | -h* | --h*)
1773
		echo "$usage"
1775
		echo "$usage"
1774
		exit 0
1776
		exit 0
1775
		;;
1777
		;;
1776
	-i | --install)
1778
	-i | --install)
1777
		license
1779
		license
1778
		header_install
1780
		header_install
1779
		testing
1781
		testing
1780
# Test if ALCASAR is already installed
1782
# Test if ALCASAR is already installed
1781
		if [ -e $CONF_FILE ]
1783
		if [ -e $CONF_FILE ]
1782
		then
1784
		then
1783
			current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
1785
			current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
1784
			if [ $Lang == "fr" ]
1786
			if [ $Lang == "fr" ]
1785
				then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
1787
				then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
1786
				else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
1788
				else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
1787
			fi
1789
			fi
1788
			response=0
1790
			response=0
1789
			PTN='^[oOnNyY]$'
1791
			PTN='^[oOnNyY]$'
1790
			until [[ $(expr $response : $PTN) -gt 0 ]]
1792
			until [[ $(expr $response : $PTN) -gt 0 ]]
1791
			do
1793
			do
1792
				if [ $Lang == "fr" ]
1794
				if [ $Lang == "fr" ]
1793
					then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
1795
					then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
1794
					else echo -n "Do you want to update (Y/n)?";
1796
					else echo -n "Do you want to update (Y/n)?";
1795
				 fi
1797
				 fi
1796
				read response
1798
				read response
1797
			done
1799
			done
1798
			if [ "$response" = "n" ] || [ "$response" = "N" ] 
1800
			if [ "$response" = "n" ] || [ "$response" = "N" ] 
1799
			then
1801
			then
1800
				rm -f /tmp/alcasar-conf*
1802
				rm -f /tmp/alcasar-conf*
1801
			else
1803
			else
1802
# Create a backup of running version importants files
1804
# Create a backup of running version importants files
1803
				$DIR_SCRIPTS/alcasar-conf.sh --create
1805
				$DIR_SCRIPTS/alcasar-conf.sh --create
1804
				mode="update"
1806
				mode="update"
1805
			fi
1807
			fi
1806
		fi
1808
		fi
1807
# RPMs install
1809
# RPMs install
1808
		$DIR_SCRIPTS/alcasar-urpmi.sh
1810
		$DIR_SCRIPTS/alcasar-urpmi.sh
1809
		if [ "$?" != "0" ]
1811
		if [ "$?" != "0" ]
1810
		then
1812
		then
1811
			exit 0
1813
			exit 0
1812
		fi
1814
		fi
1813
		if [ -e $CONF_FILE ]
1815
		if [ -e $CONF_FILE ]
1814
		then
1816
		then
1815
# Uninstall the running version
1817
# Uninstall the running version
1816
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1818
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1817
		fi
1819
		fi
1818
# Test if manual update	
1820
# Test if manual update	
1819
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" != "update" ]
1821
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" != "update" ]
1820
		then
1822
		then
1821
			header_install
1823
			header_install
1822
			if [ $Lang == "fr" ]
1824
			if [ $Lang == "fr" ]
1823
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
1825
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
1824
				else echo "The configuration file of an old version has been found";
1826
				else echo "The configuration file of an old version has been found";
1825
			fi
1827
			fi
1826
			response=0
1828
			response=0
1827
			PTN='^[oOnNyY]$'
1829
			PTN='^[oOnNyY]$'
1828
			until [[ $(expr $response : $PTN) -gt 0 ]]
1830
			until [[ $(expr $response : $PTN) -gt 0 ]]
1829
			do
1831
			do
1830
				if [ $Lang == "fr" ]
1832
				if [ $Lang == "fr" ]
1831
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
1833
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
1832
					else echo -n "Do you want to use it (Y/n)?";
1834
					else echo -n "Do you want to use it (Y/n)?";
1833
				 fi
1835
				 fi
1834
				read response
1836
				read response
1835
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
1837
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
1836
				then rm -f /tmp/alcasar-conf*
1838
				then rm -f /tmp/alcasar-conf*
1837
				fi
1839
				fi
1838
			done
1840
			done
1839
		fi
1841
		fi
1840
# Test if update
1842
# Test if update
1841
		if [ -e /tmp/alcasar-conf* ] 
1843
		if [ -e /tmp/alcasar-conf* ] 
1842
		then
1844
		then
1843
			if [ $Lang == "fr" ]
1845
			if [ $Lang == "fr" ]
1844
				then echo "#### Installation avec mise à jour ####";
1846
				then echo "#### Installation avec mise à jour ####";
1845
				else echo "#### Installation with update     ####";
1847
				else echo "#### Installation with update     ####";
1846
			fi
1848
			fi
1847
# Extract the central configuration file
1849
# Extract the central configuration file
1848
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
1850
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
1849
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
1851
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
1850
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
1852
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
1851
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
1853
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
1852
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
1854
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
1853
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
1855
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
1854
			mode="update"
1856
			mode="update"
1855
		else
1857
		else
1856
			mode="install"
1858
			mode="install"
1857
		fi
1859
		fi
1858
		for func in init network ACC CA init_db param_radius param_web_radius param_chilli param_dansguardian antivirus param_ulogd param_nfsen param_dnsmasq BL cron fail2ban post_install
1860
		for func in init network ACC CA init_db param_radius param_web_radius param_chilli param_dansguardian antivirus param_ulogd param_nfsen param_dnsmasq BL cron fail2ban post_install
1859
		do
1861
		do
1860
			$func
1862
			$func
1861
# echo "*** 'debug' : end of function $func ***"; read a
1863
# echo "*** 'debug' : end of function $func ***"; read a
1862
		done
1864
		done
1863
		;;
1865
		;;
1864
	-u | --uninstall)
1866
	-u | --uninstall)
1865
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
1867
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
1866
		then
1868
		then
1867
			if [ $Lang == "fr" ]
1869
			if [ $Lang == "fr" ]
1868
				then echo "ALCASAR n'est pas installé!";
1870
				then echo "ALCASAR n'est pas installé!";
1869
				else echo "ALCASAR isn't installed!";
1871
				else echo "ALCASAR isn't installed!";
1870
			fi
1872
			fi
1871
			exit 0
1873
			exit 0
1872
		fi
1874
		fi
1873
		response=0
1875
		response=0
1874
		PTN='^[oOnN]$'
1876
		PTN='^[oOnN]$'
1875
		until [[ $(expr $response : $PTN) -gt 0 ]]
1877
		until [[ $(expr $response : $PTN) -gt 0 ]]
1876
		do
1878
		do
1877
			if [ $Lang == "fr" ]
1879
			if [ $Lang == "fr" ]
1878
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
1880
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
1879
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
1881
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
1880
			fi
1882
			fi
1881
			read response
1883
			read response
1882
		done
1884
		done
1883
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
1885
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
1884
		then
1886
		then
1885
			$DIR_SCRIPTS/alcasar-conf.sh --create
1887
			$DIR_SCRIPTS/alcasar-conf.sh --create
1886
		else	
1888
		else	
1887
			rm -f /tmp/alcasar-conf*
1889
			rm -f /tmp/alcasar-conf*
1888
		fi
1890
		fi
1889
# Uninstall the running version
1891
# Uninstall the running version
1890
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1892
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1891
		;;
1893
		;;
1892
	*)
1894
	*)
1893
		echo "Argument inconnu :$1";
1895
		echo "Argument inconnu :$1";
1894
		echo "Unknown argument :$1";
1896
		echo "Unknown argument :$1";
1895
		echo "$usage"
1897
		echo "$usage"
1896
		exit 1
1898
		exit 1
1897
		;;
1899
		;;
1898
esac
1900
esac
1899
# end of script
1901
# end of script
1900
 
1902
 
1901
 
1903