Subversion Repositories ALCASAR

Rev

Rev 1534 | Rev 1538 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1534 Rev 1536
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 1534 2014-12-21 22:11:15Z richard $ 
2
#  $Id: alcasar.sh 1536 2014-12-21 23:11:16Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
23
 
23
 
24
# Options :
24
# Options :
25
#       -i or --install
25
#       -i or --install
26
#       -u or --uninstall
26
#       -u or --uninstall
27
 
27
 
28
# Functions :
28
# Functions :
29
#	testing			: connectivity tests, free space test and mageia version test
29
#	testing			: connectivity tests, free space test and mageia version test
30
#	init			: Installation of RPM and scripts
30
#	init			: Installation of RPM and scripts
31
#	network			: Network parameters
31
#	network			: Network parameters
32
#	ACC			: ALCASAR Control Center installation
32
#	ACC			: ALCASAR Control Center installation
33
#	CA			: Certification Authority initialization
33
#	CA			: Certification Authority initialization
34
#	init_db			: Initilization of radius database managed with MariaDB
34
#	init_db			: Initilization of radius database managed with MariaDB
35
#	radius			: FreeRadius initialisation
35
#	radius			: FreeRadius initialisation
36
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
36
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
37
#	chilli			: coovachilli initialisation (+authentication page)
37
#	chilli			: coovachilli initialisation (+authentication page)
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	antivirus		: HAVP + libclamav configuration
39
#	antivirus		: HAVP + libclamav configuration
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
44
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	cron			: Logs export + watchdog + connexion statistics
45
#	cron			: Logs export + watchdog + connexion statistics
46
#	fail2ban		: Fail2ban IDS installation and configuration
46
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
47
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	post_install		: Security, log rotation, etc.
48
#	post_install		: Security, log rotation, etc.
49
 
49
 
50
DATE=`date '+%d %B %Y - %Hh%M'`
50
DATE=`date '+%d %B %Y - %Hh%M'`
51
DATE_SHORT=`date '+%d/%m/%Y'`
51
DATE_SHORT=`date '+%d/%m/%Y'`
52
Lang=`echo $LANG|cut -c 1-2`
52
Lang=`echo $LANG|cut -c 1-2`
53
mode="install"
53
mode="install"
54
# ******* Files parameters - paramètres fichiers *********
54
# ******* Files parameters - paramètres fichiers *********
55
DIR_INSTALL=`pwd`				# current directory 
55
DIR_INSTALL=`pwd`				# current directory 
56
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
56
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
57
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
57
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
58
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
58
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
59
DIR_WEB="/var/www/html"				# directory of APACHE
59
DIR_WEB="/var/www/html"				# directory of APACHE
60
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
60
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
61
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
61
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
62
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
62
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
63
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
63
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
64
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
64
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
65
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
65
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
66
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
66
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
67
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
67
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
68
# ******* DBMS parameters - paramètres SGBD ********
68
# ******* DBMS parameters - paramètres SGBD ********
69
DB_RADIUS="radius"				# database name used by FreeRadius server
69
DB_RADIUS="radius"				# database name used by FreeRadius server
70
DB_USER="radius"				# user name allows to request the users database
70
DB_USER="radius"				# user name allows to request the users database
71
DB_GAMMU="gammu"				# database name used by Gammu-smsd
71
DB_GAMMU="gammu"				# database name used by Gammu-smsd
72
# ******* Network parameters - paramètres réseau *******
72
# ******* Network parameters - paramètres réseau *******
73
HOSTNAME="alcasar"				# default hostname
73
HOSTNAME="alcasar"				# default hostname
74
DOMAIN="localdomain"				# default local domain
74
DOMAIN="localdomain"				# default local domain
75
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
75
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
76
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
76
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
77
MTU="1500"
77
MTU="1500"
78
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
78
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
79
# ****** Paths - chemin des commandes *******
79
# ****** Paths - chemin des commandes *******
80
SED="/bin/sed -i"
80
SED="/bin/sed -i"
81
# ****************** End of global parameters *********************
81
# ****************** End of global parameters *********************
82
 
82
 
83
license ()
83
license ()
84
{
84
{
85
	if [ $Lang == "fr" ]
85
	if [ $Lang == "fr" ]
86
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
86
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
87
	else cat $DIR_INSTALL/gpl-3.0.txt | more
87
	else cat $DIR_INSTALL/gpl-3.0.txt | more
88
	fi
88
	fi
89
	echo "Taper sur Entrée pour continuer !"
89
	echo "Taper sur Entrée pour continuer !"
90
	echo "Enter to continue."
90
	echo "Enter to continue."
91
	read a
91
	read a
92
}
92
}
93
 
93
 
94
header_install ()
94
header_install ()
95
{
95
{
96
	clear
96
	clear
97
	echo "-----------------------------------------------------------------------------"
97
	echo "-----------------------------------------------------------------------------"
98
	echo "                     ALCASAR V$VERSION Installation"
98
	echo "                     ALCASAR V$VERSION Installation"
99
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
99
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
100
	echo "-----------------------------------------------------------------------------"
100
	echo "-----------------------------------------------------------------------------"
101
}
101
}
102
 
102
 
103
##################################################################
103
##################################################################
104
##			Function "testing"			##
104
##			Function "testing"			##
105
## - Test of Mageia version					##
105
## - Test of Mageia version					##
106
## - Test of ALCASAR version (if already installed)		##
106
## - Test of ALCASAR version (if already installed)		##
107
## - Test of free space on /var  (>10G)				##
107
## - Test of free space on /var  (>10G)				##
108
## - Test of Internet access					##
108
## - Test of Internet access					##
109
##################################################################
109
##################################################################
110
testing ()
110
testing ()
111
{
111
{
112
# Test of Mageia version
112
# Test of Mageia version
113
# extract the current Mageia version and hardware architecture (i586 ou X64)
113
# extract the current Mageia version and hardware architecture (i586 ou X64)
114
	fic=`cat /etc/product.id`
114
	fic=`cat /etc/product.id`
115
	unknown_os=0
115
	unknown_os=0
116
	old="$IFS"
116
	old="$IFS"
117
	IFS=","
117
	IFS=","
118
	set $fic
118
	set $fic
119
	for i in $*
119
	for i in $*
120
	do
120
	do
121
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
121
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
122
			then 
122
			then 
123
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
123
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
124
			unknown_os=`expr $unknown_os + 1`
124
			unknown_os=`expr $unknown_os + 1`
125
		fi
125
		fi
126
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
126
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
127
			then 
127
			then 
128
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
128
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
129
			unknown_os=`expr $unknown_os + 1`
129
			unknown_os=`expr $unknown_os + 1`
130
		fi
130
		fi
131
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
131
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
132
			then 
132
			then 
133
			ARCH=`echo $i|cut -d"=" -f2`
133
			ARCH=`echo $i|cut -d"=" -f2`
134
			unknown_os=`expr $unknown_os + 1`
134
			unknown_os=`expr $unknown_os + 1`
135
		fi
135
		fi
136
	done
136
	done
137
	IFS="$old"
137
	IFS="$old"
138
# Test if ALCASAR is already installed
138
# Test if ALCASAR is already installed
139
	if [ -e $CONF_FILE ]
139
	if [ -e $CONF_FILE ]
140
	then
140
	then
141
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
141
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
142
		if [ $Lang == "fr" ]
142
		if [ $Lang == "fr" ]
143
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
143
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
144
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
144
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
145
		fi
145
		fi
146
		response=0
146
		response=0
147
		PTN='^[oOnNyY]$'
147
		PTN='^[oOnNyY]$'
148
		until [[ $(expr $response : $PTN) -gt 0 ]]
148
		until [[ $(expr $response : $PTN) -gt 0 ]]
149
		do
149
		do
150
			if [ $Lang == "fr" ]
150
			if [ $Lang == "fr" ]
151
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
151
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
152
				else echo -n "Do you want to update (Y/n)?";
152
				else echo -n "Do you want to update (Y/n)?";
153
			 fi
153
			 fi
154
			read response
154
			read response
155
		done
155
		done
156
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
156
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
157
		then
157
		then
158
			rm -f /tmp/alcasar-conf*
158
			rm -f /tmp/alcasar-conf*
159
		else
159
		else
160
# Create a backup of running importants files
160
# Create a backup of running importants files
161
			$DIR_SCRIPTS/alcasar-conf.sh --create
161
			$DIR_SCRIPTS/alcasar-conf.sh --create
162
			mode="update"
162
			mode="update"
163
		fi
163
		fi
164
	fi
164
	fi
165
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
165
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
166
		then
166
		then
167
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
167
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
168
			then
168
			then
169
			echo
169
			echo
170
			if [ $Lang == "fr" ]
170
			if [ $Lang == "fr" ]
171
				then	
171
				then	
172
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
172
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
173
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
173
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
174
				echo "2 - Installez Linux-Mageia4.1 (cf. doc d'installation)"
174
				echo "2 - Installez Linux-Mageia4.1 (cf. doc d'installation)"
175
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
175
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
176
			else
176
			else
177
				echo "The automatic update of ALCASAR can't be performed."
177
				echo "The automatic update of ALCASAR can't be performed."
178
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
178
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
179
				echo "2 - Install Linux-Mageia4.1 (cf. installation doc)"
179
				echo "2 - Install Linux-Mageia4.1 (cf. installation doc)"
180
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
180
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
181
			fi
181
			fi
182
		else
182
		else
183
			if [ $Lang == "fr" ]
183
			if [ $Lang == "fr" ]
184
				then	
184
				then	
185
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
185
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
186
			else
186
			else
187
				echo "The installation of ALCASAR can't be performed."
187
				echo "The installation of ALCASAR can't be performed."
188
			fi
188
			fi
189
		fi
189
		fi
190
		echo
190
		echo
191
		if [ $Lang == "fr" ]
191
		if [ $Lang == "fr" ]
192
			then	
192
			then	
193
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
193
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
194
		else
194
		else
195
			echo "The OS must be replaced (Mageia4.1)"
195
			echo "The OS must be replaced (Mageia4.1)"
196
		fi
196
		fi
197
		exit 0
197
		exit 0
198
	fi
198
	fi
199
	if [ ! -d /var/log/netflow/porttracker ]
199
	if [ ! -d /var/log/netflow/porttracker ]
200
		then
200
		then
201
# Test of free space on /var
201
# Test of free space on /var
202
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
202
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
203
		if [ $free_space -lt 10 ]
203
		if [ $free_space -lt 10 ]
204
			then
204
			then
205
			if [ $Lang == "fr" ]
205
			if [ $Lang == "fr" ]
206
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
206
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
207
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
207
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
208
			fi
208
			fi
209
		exit 0
209
		exit 0
210
		fi
210
		fi
211
	fi
211
	fi
212
	if [ $Lang == "fr" ]
212
	if [ $Lang == "fr" ]
213
		then echo -n "Tests des paramètres réseau : "
213
		then echo -n "Tests des paramètres réseau : "
214
		else echo -n "Network parameters tests : "
214
		else echo -n "Network parameters tests : "
215
	fi
215
	fi
216
# Test of Ethernet links state
216
# Test of Ethernet links state
217
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
217
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
218
	for i in $DOWN_IF
218
	for i in $DOWN_IF
219
	do
219
	do
220
		if [ $Lang == "fr" ]
220
		if [ $Lang == "fr" ]
221
		then 
221
		then 
222
			echo "Échec"
222
			echo "Échec"
223
			echo "Le lien réseau de la carte $i n'est pas actif."
223
			echo "Le lien réseau de la carte $i n'est pas actif."
224
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
224
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
225
		else
225
		else
226
			echo "Failed"
226
			echo "Failed"
227
			echo "The link state of $i interface is down."
227
			echo "The link state of $i interface is down."
228
			echo "Make sure that this network card is connected to a switch or an A.P."
228
			echo "Make sure that this network card is connected to a switch or an A.P."
229
		fi
229
		fi
230
		exit 0
230
		exit 0
231
	done
231
	done
232
	echo -n "."
232
	echo -n "."
233
 
233
 
234
# Test EXTIF config files
234
# Test EXTIF config files
235
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
235
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
236
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
236
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
237
	PUBLIC_GATEWAY=`ip route list|grep ^default|cut -d" " -f3`
237
	PUBLIC_GATEWAY=`ip route list|grep ^default|cut -d" " -f3`
238
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
238
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
239
	then
239
	then
240
		if [ $Lang == "fr" ]
240
		if [ $Lang == "fr" ]
241
		then 
241
		then 
242
			echo "Échec"
242
			echo "Échec"
243
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
243
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
244
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
244
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
245
			echo "Appliquez les changements : 'systemctl restart network'"
245
			echo "Appliquez les changements : 'systemctl restart network'"
246
		else
246
		else
247
			echo "Failed"
247
			echo "Failed"
248
			echo "The Internet connected network card ($EXTIF) isn't well configured."
248
			echo "The Internet connected network card ($EXTIF) isn't well configured."
249
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
249
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
250
			echo "Apply the new configuration 'systemctl restart network'"
250
			echo "Apply the new configuration 'systemctl restart network'"
251
		fi
251
		fi
252
		echo "DEVICE=$EXTIF"
252
		echo "DEVICE=$EXTIF"
253
		echo "IPADDR="
253
		echo "IPADDR="
254
		echo "NETMASK="
254
		echo "NETMASK="
255
		echo "GATEWAY="
255
		echo "GATEWAY="
256
		echo "DNS1="
256
		echo "DNS1="
257
		echo "DNS2="
257
		echo "DNS2="
258
		echo "ONBOOT=yes"
258
		echo "ONBOOT=yes"
259
		exit 0
259
		exit 0
260
	fi
260
	fi
261
	echo -n "."
261
	echo -n "."
262
 
262
 
263
# Test if router is alive (Box FAI)
263
# Test if router is alive (Box FAI)
264
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
264
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
265
		if [ $Lang == "fr" ]
265
		if [ $Lang == "fr" ]
266
		then 
266
		then 
267
			echo "Échec"
267
			echo "Échec"
268
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
268
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
269
			echo "Réglez ce problème puis relancez ce script."
269
			echo "Réglez ce problème puis relancez ce script."
270
		else
270
		else
271
			echo "Failed"
271
			echo "Failed"
272
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
272
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
273
			echo "Resolv this problem, then restart this script."
273
			echo "Resolv this problem, then restart this script."
274
		fi
274
		fi
275
		exit 0
275
		exit 0
276
	fi
276
	fi
277
	echo -n "."
277
	echo -n "."
278
# On teste le lien vers le routeur par defaut
278
# On teste le lien vers le routeur par defaut
279
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
279
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
280
	if [ $(expr $arp_reply) -eq 0 ]
280
	if [ $(expr $arp_reply) -eq 0 ]
281
	       	then
281
	       	then
282
		if [ $Lang == "fr" ]
282
		if [ $Lang == "fr" ]
283
		then 
283
		then 
284
			echo "Échec"
284
			echo "Échec"
285
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
285
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
286
			echo "Réglez ce problème puis relancez ce script."
286
			echo "Réglez ce problème puis relancez ce script."
287
		else
287
		else
288
			echo "Failed"
288
			echo "Failed"
289
			echo "The Internet gateway doesn't answered"
289
			echo "The Internet gateway doesn't answered"
290
			echo "Resolv this problem, then restart this script."
290
			echo "Resolv this problem, then restart this script."
291
		fi
291
		fi
292
		exit 0
292
		exit 0
293
	fi
293
	fi
294
	echo -n "."
294
	echo -n "."
295
# On teste la connectivité Internet
295
# On teste la connectivité Internet
296
	rm -rf /tmp/con_ok.html
296
	rm -rf /tmp/con_ok.html
297
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
297
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
298
	if [ ! -e /tmp/con_ok.html ]
298
	if [ ! -e /tmp/con_ok.html ]
299
	then
299
	then
300
		if [ $Lang == "fr" ]
300
		if [ $Lang == "fr" ]
301
		then 
301
		then 
302
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
302
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
303
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
303
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
304
			echo "Vérifiez la validité des adresses IP des DNS."
304
			echo "Vérifiez la validité des adresses IP des DNS."
305
		else
305
		else
306
			echo "The Internet connection try failed (google.fr)."
306
			echo "The Internet connection try failed (google.fr)."
307
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
307
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
308
			echo "Verify the DNS IP addresses"
308
			echo "Verify the DNS IP addresses"
309
		fi
309
		fi
310
		exit 0
310
		exit 0
311
	fi
311
	fi
312
	rm -rf /tmp/con_ok.html
312
	rm -rf /tmp/con_ok.html
313
	echo ". : ok"
313
	echo ". : ok"
314
} # end of testing ()
314
} # end of testing ()
315
 
315
 
316
##################################################################
316
##################################################################
317
##			Function "init"				##
317
##			Function "init"				##
318
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
318
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
319
## - Installation et modification des scripts du portail	##
319
## - Installation et modification des scripts du portail	##
320
##################################################################
320
##################################################################
321
init ()
321
init ()
322
{
322
{
323
	if [ "$mode" != "update" ]
323
	if [ "$mode" != "update" ]
324
	then
324
	then
325
# On affecte le nom d'organisme
325
# On affecte le nom d'organisme
326
		header_install
326
		header_install
327
		ORGANISME=!
327
		ORGANISME=!
328
		PTN='^[a-zA-Z0-9-]*$'
328
		PTN='^[a-zA-Z0-9-]*$'
329
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
329
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
330
                do
330
                do
331
			if [ $Lang == "fr" ]
331
			if [ $Lang == "fr" ]
332
			       	then echo -n "Entrez le nom de votre organisme : "
332
			       	then echo -n "Entrez le nom de votre organisme : "
333
				else echo -n "Enter the name of your organism : "
333
				else echo -n "Enter the name of your organism : "
334
			fi
334
			fi
335
			read ORGANISME
335
			read ORGANISME
336
			if [ "$ORGANISME" == "" ]
336
			if [ "$ORGANISME" == "" ]
337
				then
337
				then
338
				ORGANISME=!
338
				ORGANISME=!
339
			fi
339
			fi
340
		done
340
		done
341
	fi
341
	fi
342
# On crée aléatoirement les mots de passe et les secrets partagés
342
# On crée aléatoirement les mots de passe et les secrets partagés
343
	rm -f $PASSWD_FILE
343
	rm -f $PASSWD_FILE
344
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
344
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
345
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
345
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
346
	echo "$grubpwd" >> $PASSWD_FILE
346
	echo "$grubpwd" >> $PASSWD_FILE
347
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
347
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
348
	$SED "/^password.*/d" /boot/grub/menu.lst
348
	$SED "/^password.*/d" /boot/grub/menu.lst
349
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
349
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
350
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
350
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
351
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
351
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
352
	echo "root / $mysqlpwd" >> $PASSWD_FILE
352
	echo "root / $mysqlpwd" >> $PASSWD_FILE
353
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
353
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
354
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
354
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
355
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
355
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
356
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
356
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
357
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
357
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
358
	echo "$secretuam" >> $PASSWD_FILE
358
	echo "$secretuam" >> $PASSWD_FILE
359
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
359
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
360
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
360
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
361
	echo "$secretradius" >> $PASSWD_FILE
361
	echo "$secretradius" >> $PASSWD_FILE
362
	chmod 640 $PASSWD_FILE
362
	chmod 640 $PASSWD_FILE
363
# Scripts and conf files copy 
363
# Scripts and conf files copy 
364
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
364
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
365
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
365
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
366
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
366
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
367
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
367
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
368
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
368
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
369
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
369
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
370
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
370
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
371
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
371
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
372
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
372
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
373
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
373
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
374
# generate central conf file
374
# generate central conf file
375
	cat <<EOF > $CONF_FILE
375
	cat <<EOF > $CONF_FILE
376
##########################################
376
##########################################
377
##                                      ##
377
##                                      ##
378
##          ALCASAR Parameters          ##
378
##          ALCASAR Parameters          ##
379
##                                      ##
379
##                                      ##
380
##########################################
380
##########################################
381
 
381
 
382
INSTALL_DATE=$DATE
382
INSTALL_DATE=$DATE
383
VERSION=$VERSION
383
VERSION=$VERSION
384
ORGANISM=$ORGANISME
384
ORGANISM=$ORGANISME
385
DOMAIN=$DOMAIN
385
DOMAIN=$DOMAIN
386
EOF
386
EOF
387
	chmod o-rwx $CONF_FILE
387
	chmod o-rwx $CONF_FILE
388
} # End of init ()
388
} # End of init ()
389
 
389
 
390
##################################################################
390
##################################################################
391
##			Function "network"			##
391
##			Function "network"			##
392
## - Définition du plan d'adressage du réseau de consultation	##
392
## - Définition du plan d'adressage du réseau de consultation	##
393
## - Nommage DNS du système 					##
393
## - Nommage DNS du système 					##
394
## - Configuration de l'interface INTIF (réseau de consultation)##
394
## - Configuration de l'interface INTIF (réseau de consultation)##
395
## - Modification du fichier /etc/hosts				##
395
## - Modification du fichier /etc/hosts				##
396
## - Configuration du serveur de temps (NTP)			##
396
## - Configuration du serveur de temps (NTP)			##
397
## - Renseignement des fichiers hosts.allow et hosts.deny	##
397
## - Renseignement des fichiers hosts.allow et hosts.deny	##
398
##################################################################
398
##################################################################
399
network ()
399
network ()
400
{
400
{
401
	header_install
401
	header_install
402
	if [ "$mode" != "update" ]
402
	if [ "$mode" != "update" ]
403
		then
403
		then
404
		if [ $Lang == "fr" ]
404
		if [ $Lang == "fr" ]
405
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
405
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
406
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
406
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
407
		fi
407
		fi
408
		response=0
408
		response=0
409
		PTN='^[oOyYnN]$'
409
		PTN='^[oOyYnN]$'
410
		until [[ $(expr $response : $PTN) -gt 0 ]]
410
		until [[ $(expr $response : $PTN) -gt 0 ]]
411
		do
411
		do
412
			if [ $Lang == "fr" ]
412
			if [ $Lang == "fr" ]
413
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
413
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
414
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
414
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
415
			fi
415
			fi
416
			read response
416
			read response
417
		done
417
		done
418
		if [ "$response" = "n" ] || [ "$response" = "N" ]
418
		if [ "$response" = "n" ] || [ "$response" = "N" ]
419
		then
419
		then
420
			PRIVATE_IP_MASK="0"
420
			PRIVATE_IP_MASK="0"
421
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
421
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
422
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
422
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
423
			do
423
			do
424
				if [ $Lang == "fr" ]
424
				if [ $Lang == "fr" ]
425
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
425
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
426
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
426
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
427
				fi
427
				fi
428
				read PRIVATE_IP_MASK
428
				read PRIVATE_IP_MASK
429
			done
429
			done
430
		else
430
		else
431
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
431
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
432
		fi
432
		fi
433
	else
433
	else
434
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
434
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
435
		rm -rf conf/etc/alcasar.conf
435
		rm -rf conf/etc/alcasar.conf
436
	fi
436
	fi
437
# Define LAN side global parameters
437
# Define LAN side global parameters
438
	hostname $HOSTNAME.$DOMAIN
438
	hostname $HOSTNAME.$DOMAIN
439
	echo $HOSTNAME.$DOMAIN > /etc/hostname
439
	echo $HOSTNAME.$DOMAIN > /etc/hostname
440
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
440
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
441
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
441
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
442
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
442
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
443
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
443
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
444
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
444
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
445
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
445
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
446
		then
446
		then
447
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
447
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
448
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
448
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
449
	fi	
449
	fi	
450
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
450
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
451
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
451
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
452
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
452
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
453
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
453
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
454
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
454
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
455
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
455
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
456
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
456
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
457
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
457
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
458
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
458
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
459
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
459
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
460
# Define Internet parameters
460
# Define Internet parameters
461
	DNS1=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|head -n 1`				# 1st DNS server
461
	DNS1=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|head -n 1`				# 1st DNS server
462
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
462
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
463
	if [ $nb_dns == 2 ]
463
	if [ $nb_dns == 2 ]
464
		then
464
		then
465
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
465
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
466
	fi
466
	fi
467
	DNS1=${DNS1:=208.67.220.220}
467
	DNS1=${DNS1:=208.67.220.220}
468
	DNS2=${DNS2:=208.67.222.222}
468
	DNS2=${DNS2:=208.67.222.222}
469
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
469
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
470
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
470
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
471
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
471
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
472
# Wrtie the conf file
472
# Wrtie the conf file
473
	echo "EXTIF=$EXTIF" >> $CONF_FILE
473
	echo "EXTIF=$EXTIF" >> $CONF_FILE
474
	echo "INTIF=$INTIF" >> $CONF_FILE
474
	echo "INTIF=$INTIF" >> $CONF_FILE
475
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
475
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
476
	if [ $IP_SETTING == "dhcp" ]
476
	if [ $IP_SETTING == "dhcp" ]
477
		then
477
		then
478
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
478
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
479
		echo "GW=dhcp" >> $CONF_FILE 
479
		echo "GW=dhcp" >> $CONF_FILE 
480
	else
480
	else
481
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
481
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
482
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
482
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
483
	fi
483
	fi
484
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
484
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
485
	echo "DNS1=$DNS1" >> $CONF_FILE
485
	echo "DNS1=$DNS1" >> $CONF_FILE
486
	echo "DNS2=$DNS2" >> $CONF_FILE
486
	echo "DNS2=$DNS2" >> $CONF_FILE
487
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
487
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
488
	echo "DHCP=on" >> $CONF_FILE
488
	echo "DHCP=on" >> $CONF_FILE
489
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
489
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
490
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
490
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
491
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
491
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
492
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
492
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
493
# network default
493
# network default
494
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
494
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
495
	cat <<EOF > /etc/sysconfig/network
495
	cat <<EOF > /etc/sysconfig/network
496
NETWORKING=yes
496
NETWORKING=yes
497
HOSTNAME="$HOSTNAME.$DOMAIN"
497
HOSTNAME="$HOSTNAME.$DOMAIN"
498
FORWARD_IPV4=true
498
FORWARD_IPV4=true
499
EOF
499
EOF
500
# /etc/hosts config
500
# /etc/hosts config
501
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
501
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
502
	cat <<EOF > /etc/hosts
502
	cat <<EOF > /etc/hosts
503
127.0.0.1	localhost
503
127.0.0.1	localhost
504
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
504
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
505
EOF
505
EOF
506
# EXTIF (Internet) config
506
# EXTIF (Internet) config
507
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
507
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
508
	if [ $IP_SETTING == "dhcp" ]
508
	if [ $IP_SETTING == "dhcp" ]
509
		then
509
		then
510
		$SED "s?^RESOLV_MODS=.*?RESOLV_MODS=yes?g" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
510
		$SED "s?^RESOLV_MODS=.*?RESOLV_MODS=yes?g" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
511
		$SED "s?^PEERDNS=.*?PEERDNS=no?g" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
511
		$SED "s?^PEERDNS=.*?PEERDNS=no?g" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
512
		echo "DNS1=127.0.0.1" >> /etc/sysconfig/network-scripts/ifcfg-$EXTIF
512
		echo "DNS1=127.0.0.1" >> /etc/sysconfig/network-scripts/ifcfg-$EXTIF
513
	else	
513
	else	
514
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
514
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
515
DEVICE=$EXTIF
515
DEVICE=$EXTIF
516
BOOTPROTO=static
516
BOOTPROTO=static
517
IPADDR=$PUBLIC_IP
517
IPADDR=$PUBLIC_IP
518
NETMASK=$PUBLIC_NETMASK
518
NETMASK=$PUBLIC_NETMASK
519
GATEWAY=$PUBLIC_GATEWAY
519
GATEWAY=$PUBLIC_GATEWAY
520
DNS1=127.0.0.1
520
DNS1=127.0.0.1
521
RESOLV_MODS=yes
521
RESOLV_MODS=yes
522
ONBOOT=yes
522
ONBOOT=yes
523
METRIC=10
523
METRIC=10
524
MII_NOT_SUPPORTED=yes
524
MII_NOT_SUPPORTED=yes
525
IPV6INIT=no
525
IPV6INIT=no
526
IPV6TO4INIT=no
526
IPV6TO4INIT=no
527
ACCOUNTING=no
527
ACCOUNTING=no
528
USERCTL=no
528
USERCTL=no
529
MTU=$MTU
529
MTU=$MTU
530
EOF
530
EOF
531
	fi
531
	fi
532
# Config INTIF (consultation LAN) in normal mode
532
# Config INTIF (consultation LAN) in normal mode
533
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
533
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
534
DEVICE=$INTIF
534
DEVICE=$INTIF
535
BOOTPROTO=static
535
BOOTPROTO=static
536
ONBOOT=yes
536
ONBOOT=yes
537
NOZEROCONF=yes
537
NOZEROCONF=yes
538
MII_NOT_SUPPORTED=yes
538
MII_NOT_SUPPORTED=yes
539
IPV6INIT=no
539
IPV6INIT=no
540
IPV6TO4INIT=no
540
IPV6TO4INIT=no
541
ACCOUNTING=no
541
ACCOUNTING=no
542
USERCTL=no
542
USERCTL=no
543
EOF
543
EOF
544
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
544
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
545
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
545
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
546
DEVICE=$INTIF
546
DEVICE=$INTIF
547
BOOTPROTO=static
547
BOOTPROTO=static
548
IPADDR=$PRIVATE_IP
548
IPADDR=$PRIVATE_IP
549
NETMASK=$PRIVATE_NETMASK
549
NETMASK=$PRIVATE_NETMASK
550
ONBOOT=yes
550
ONBOOT=yes
551
METRIC=10
551
METRIC=10
552
NOZEROCONF=yes
552
NOZEROCONF=yes
553
MII_NOT_SUPPORTED=yes
553
MII_NOT_SUPPORTED=yes
554
IPV6INIT=no
554
IPV6INIT=no
555
IPV6TO4INIT=no
555
IPV6TO4INIT=no
556
ACCOUNTING=no
556
ACCOUNTING=no
557
USERCTL=no
557
USERCTL=no
558
EOF
558
EOF
559
# Mise à l'heure du serveur
559
# Mise à l'heure du serveur
560
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
560
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
561
	cat <<EOF > /etc/ntp/step-tickers
561
	cat <<EOF > /etc/ntp/step-tickers
562
0.fr.pool.ntp.org	# adapt to your country
562
0.fr.pool.ntp.org	# adapt to your country
563
1.fr.pool.ntp.org
563
1.fr.pool.ntp.org
564
2.fr.pool.ntp.org
564
2.fr.pool.ntp.org
565
EOF
565
EOF
566
# Configuration du serveur de temps (sur lui même)
566
# Configuration du serveur de temps (sur lui même)
567
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
567
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
568
	cat <<EOF > /etc/ntp.conf
568
	cat <<EOF > /etc/ntp.conf
569
server 0.fr.pool.ntp.org	# adapt to your country
569
server 0.fr.pool.ntp.org	# adapt to your country
570
server 1.fr.pool.ntp.org
570
server 1.fr.pool.ntp.org
571
server 2.fr.pool.ntp.org
571
server 2.fr.pool.ntp.org
572
server 127.127.1.0   		# local clock si NTP internet indisponible ...
572
server 127.127.1.0   		# local clock si NTP internet indisponible ...
573
fudge 127.127.1.0 stratum 10
573
fudge 127.127.1.0 stratum 10
574
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
574
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
575
restrict 127.0.0.1
575
restrict 127.0.0.1
576
driftfile /var/lib/ntp/drift
576
driftfile /var/lib/ntp/drift
577
logfile /var/log/ntp.log
577
logfile /var/log/ntp.log
578
EOF
578
EOF
579
 
579
 
580
	chown -R ntp:ntp /var/lib/ntp
580
	chown -R ntp:ntp /var/lib/ntp
581
# Renseignement des fichiers hosts.allow et hosts.deny
581
# Renseignement des fichiers hosts.allow et hosts.deny
582
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
582
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
583
	cat <<EOF > /etc/hosts.allow
583
	cat <<EOF > /etc/hosts.allow
584
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
584
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
585
sshd: ALL
585
sshd: ALL
586
ntpd: $PRIVATE_NETWORK_SHORT
586
ntpd: $PRIVATE_NETWORK_SHORT
587
EOF
587
EOF
588
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
588
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
589
	cat <<EOF > /etc/hosts.deny
589
	cat <<EOF > /etc/hosts.deny
590
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
590
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
591
EOF
591
EOF
592
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
592
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
593
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
593
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
594
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
594
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
595
# load conntrack ftp module
595
# load conntrack ftp module
596
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
596
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
597
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
597
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
598
# load ipt_NETFLOW module
598
# load ipt_NETFLOW module
599
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
599
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
600
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
600
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
601
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
601
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
602
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
602
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
603
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
603
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
604
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
604
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
605
# 
605
# 
606
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
606
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
607
} # End of network ()
607
} # End of network ()
608
 
608
 
609
##################################################################
609
##################################################################
610
##			Function "ACC"				##
610
##			Function "ACC"				##
611
## - installation du centre de gestion (ALCASAR Control Center)	##
611
## - installation du centre de gestion (ALCASAR Control Center)	##
612
## - configuration du serveur web (Apache)			##
612
## - configuration du serveur web (Apache)			##
613
## - définition du 1er comptes de gestion 			##
613
## - définition du 1er comptes de gestion 			##
614
## - sécurisation des accès					##
614
## - sécurisation des accès					##
615
##################################################################
615
##################################################################
616
ACC ()
616
ACC ()
617
{
617
{
618
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
618
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
619
	mkdir $DIR_WEB
619
	mkdir $DIR_WEB
620
# Copie et configuration des fichiers du centre de gestion
620
# Copie et configuration des fichiers du centre de gestion
621
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
621
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
622
	echo "$VERSION" > $DIR_WEB/VERSION
622
	echo "$VERSION" > $DIR_WEB/VERSION
623
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
623
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
624
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
624
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
625
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
625
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
626
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
626
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
627
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
627
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
628
	chown -R apache:apache $DIR_WEB/*
628
	chown -R apache:apache $DIR_WEB/*
629
# create the backup structure :
629
# create the backup structure :
630
# - base = users database
630
# - base = users database
631
# - system_backup = alcasar conf file + users database
631
# - system_backup = alcasar conf file + users database
632
# - archive = tarball of "base + http firewall + netflow"
632
# - archive = tarball of "base + http firewall + netflow"
633
# - security = watchdog disconnection)
633
# - security = watchdog disconnection)
634
	for i in system_backup base archive security;
634
	for i in system_backup base archive security;
635
	do
635
	do
636
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
636
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
637
	done
637
	done
638
	chown -R root:apache $DIR_SAVE
638
	chown -R root:apache $DIR_SAVE
639
# Configuration et sécurisation php
639
# Configuration et sécurisation php
640
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
640
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
641
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
641
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
642
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
642
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
643
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
643
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
644
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
644
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
645
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
645
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
646
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
646
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
647
# Configuration et sécurisation Apache
647
# Configuration et sécurisation Apache
648
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
648
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
649
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
649
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
650
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
650
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
651
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
651
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
652
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
652
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
653
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
653
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
654
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
654
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
655
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
655
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
656
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
656
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
657
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
657
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
658
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/modules.d/00_base.conf
-
 
659
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
658
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
660
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
659
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
661
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
660
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
662
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
661
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
663
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
662
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
664
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
663
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
665
# Error page management
664
# Error page management
666
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
665
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
667
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
666
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
668
Alias /error/ "/var/www/html/"
667
Alias /error/ "/var/www/html/"
669
<Directory "/usr/share/httpd/error">
668
<Directory "/usr/share/httpd/error">
670
    AllowOverride None
669
    AllowOverride None
671
    Options IncludesNoExec
670
    Options IncludesNoExec
672
    AddOutputFilter Includes html
671
    AddOutputFilter Includes html
673
    AddHandler type-map var
672
    AddHandler type-map var
674
    Require all granted
673
    Require all granted
675
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
674
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
676
    ForceLanguagePriority Prefer Fallback
675
    ForceLanguagePriority Prefer Fallback
677
</Directory>
676
</Directory>
678
ErrorDocument 400 /error/error.php?error=400
677
ErrorDocument 400 /error/error.php?error=400
679
ErrorDocument 401 /error/error.php?error=401
678
ErrorDocument 401 /error/error.php?error=401
680
ErrorDocument 403 /error/error.php?error=403
679
ErrorDocument 403 /error/error.php?error=403
681
ErrorDocument 404 /error/error.php?error=404
680
ErrorDocument 404 /error/error.php?error=404
682
ErrorDocument 405 /error/error.php?error=405
681
ErrorDocument 405 /error/error.php?error=405
683
ErrorDocument 408 /error/error.php?error=408
682
ErrorDocument 408 /error/error.php?error=408
684
ErrorDocument 410 /error/error.php?error=410
683
ErrorDocument 410 /error/error.php?error=410
685
ErrorDocument 411 /error/error.php?error=411
684
ErrorDocument 411 /error/error.php?error=411
686
ErrorDocument 412 /error/error.php?error=412
685
ErrorDocument 412 /error/error.php?error=412
687
ErrorDocument 413 /error/error.php?error=413
686
ErrorDocument 413 /error/error.php?error=413
688
ErrorDocument 414 /error/error.php?error=414
687
ErrorDocument 414 /error/error.php?error=414
689
ErrorDocument 415 /error/error.php?error=415
688
ErrorDocument 415 /error/error.php?error=415
690
ErrorDocument 500 /error/error.php?error=500
689
ErrorDocument 500 /error/error.php?error=500
691
ErrorDocument 501 /error/error.php?error=501
690
ErrorDocument 501 /error/error.php?error=501
692
ErrorDocument 502 /error/error.php?error=502
691
ErrorDocument 502 /error/error.php?error=502
693
ErrorDocument 503 /error/error.php?error=503
692
ErrorDocument 503 /error/error.php?error=503
694
ErrorDocument 506 /error/error.php?error=506
693
ErrorDocument 506 /error/error.php?error=506
695
EOF
694
EOF
696
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
695
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
697
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
696
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
698
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
697
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
699
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
698
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
700
</body>
699
</body>
701
</html>
700
</html>
702
EOF
701
EOF
703
# Définition du premier compte lié au profil 'admin'
702
# Définition du premier compte lié au profil 'admin'
704
	header_install
703
	header_install
705
	if [ "$mode" = "install" ]
704
	if [ "$mode" = "install" ]
706
	then
705
	then
707
		admin_portal=!
706
		admin_portal=!
708
		PTN='^[a-zA-Z0-9-]*$'
707
		PTN='^[a-zA-Z0-9-]*$'
709
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
708
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
710
                	do
709
                	do
711
			header_install
710
			header_install
712
			if [ $Lang == "fr" ]
711
			if [ $Lang == "fr" ]
713
			then 
712
			then 
714
				echo ""
713
				echo ""
715
				echo "Définissez un premier compte d'administration du portail :"
714
				echo "Définissez un premier compte d'administration du portail :"
716
				echo
715
				echo
717
				echo -n "Nom : "
716
				echo -n "Nom : "
718
			else
717
			else
719
				echo ""
718
				echo ""
720
				echo "Define the first account allow to administrate the portal :"
719
				echo "Define the first account allow to administrate the portal :"
721
				echo
720
				echo
722
				echo -n "Account : "
721
				echo -n "Account : "
723
			fi
722
			fi
724
			read admin_portal
723
			read admin_portal
725
			if [ "$admin_portal" == "" ]
724
			if [ "$admin_portal" == "" ]
726
				then
725
				then
727
				admin_portal=!
726
				admin_portal=!
728
			fi
727
			fi
729
			done
728
			done
730
# Creation of keys file for the admin account ("admin")
729
# Creation of keys file for the admin account ("admin")
731
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
730
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
732
		mkdir -p $DIR_DEST_ETC/digest
731
		mkdir -p $DIR_DEST_ETC/digest
733
		chmod 755 $DIR_DEST_ETC/digest
732
		chmod 755 $DIR_DEST_ETC/digest
734
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
733
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
735
			do
734
			do
736
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
735
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
737
			done
736
			done
738
		$DIR_DEST_SBIN/alcasar-profil.sh --list
737
		$DIR_DEST_SBIN/alcasar-profil.sh --list
739
	fi
738
	fi
740
# synchronisation horaire
739
# synchronisation horaire
741
	ntpd -q -g &
740
	ntpd -q -g &
742
# Sécurisation du centre
741
# Sécurisation du centre
743
	rm -f /etc/httpd/conf/webapps.d/alcasar*
742
	rm -f /etc/httpd/conf/webapps.d/alcasar*
744
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
743
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
745
<Directory $DIR_ACC>
744
<Directory $DIR_ACC>
746
	SSLRequireSSL
745
	SSLRequireSSL
747
	AllowOverride None
746
	AllowOverride None
748
	Order deny,allow
747
	Order deny,allow
749
	Deny from all
748
	Deny from all
750
	Allow from 127.0.0.1
749
	Allow from 127.0.0.1
751
	Allow from $PRIVATE_NETWORK_MASK
750
	Allow from $PRIVATE_NETWORK_MASK
752
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
751
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
753
	require valid-user
752
	require valid-user
754
	AuthType digest
753
	AuthType digest
755
	AuthName $HOSTNAME.$DOMAIN
754
	AuthName $HOSTNAME.$DOMAIN
756
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
755
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
757
	AuthUserFile $DIR_DEST_ETC/digest/key_all
756
	AuthUserFile $DIR_DEST_ETC/digest/key_all
758
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
757
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
759
</Directory>
758
</Directory>
760
<Directory $DIR_ACC/admin>
759
<Directory $DIR_ACC/admin>
761
	SSLRequireSSL
760
	SSLRequireSSL
762
	AllowOverride None
761
	AllowOverride None
763
	Order deny,allow
762
	Order deny,allow
764
	Deny from all
763
	Deny from all
765
	Allow from 127.0.0.1
764
	Allow from 127.0.0.1
766
	Allow from $PRIVATE_NETWORK_MASK
765
	Allow from $PRIVATE_NETWORK_MASK
767
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
766
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
768
	require valid-user
767
	require valid-user
769
	AuthType digest
768
	AuthType digest
770
	AuthName $HOSTNAME.$DOMAIN
769
	AuthName $HOSTNAME.$DOMAIN
771
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
770
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
772
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
771
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
773
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
772
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
774
</Directory>
773
</Directory>
775
<Directory $DIR_ACC/manager>
774
<Directory $DIR_ACC/manager>
776
	SSLRequireSSL
775
	SSLRequireSSL
777
	AllowOverride None
776
	AllowOverride None
778
	Order deny,allow
777
	Order deny,allow
779
	Deny from all
778
	Deny from all
780
	Allow from 127.0.0.1
779
	Allow from 127.0.0.1
781
	Allow from $PRIVATE_NETWORK_MASK
780
	Allow from $PRIVATE_NETWORK_MASK
782
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
781
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
783
	require valid-user
782
	require valid-user
784
	AuthType digest
783
	AuthType digest
785
	AuthName $HOSTNAME.$DOMAIN
784
	AuthName $HOSTNAME.$DOMAIN
786
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
785
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
787
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
786
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
788
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
787
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
789
</Directory>
788
</Directory>
790
<Directory $DIR_ACC/backup>
789
<Directory $DIR_ACC/backup>
791
	SSLRequireSSL
790
	SSLRequireSSL
792
	AllowOverride None
791
	AllowOverride None
793
	Order deny,allow
792
	Order deny,allow
794
	Deny from all
793
	Deny from all
795
	Allow from 127.0.0.1
794
	Allow from 127.0.0.1
796
	Allow from $PRIVATE_NETWORK_MASK
795
	Allow from $PRIVATE_NETWORK_MASK
797
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
796
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
798
	require valid-user
797
	require valid-user
799
	AuthType digest
798
	AuthType digest
800
	AuthName $HOSTNAME.$DOMAIN
799
	AuthName $HOSTNAME.$DOMAIN
801
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
800
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
802
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
801
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
803
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
802
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
804
</Directory>
803
</Directory>
805
Alias /save/ "$DIR_SAVE/"
804
Alias /save/ "$DIR_SAVE/"
806
<Directory $DIR_SAVE>
805
<Directory $DIR_SAVE>
807
	SSLRequireSSL
806
	SSLRequireSSL
808
	Options Indexes
807
	Options Indexes
809
	Order deny,allow
808
	Order deny,allow
810
	Deny from all
809
	Deny from all
811
	Allow from 127.0.0.1
810
	Allow from 127.0.0.1
812
	Allow from $PRIVATE_NETWORK_MASK
811
	Allow from $PRIVATE_NETWORK_MASK
813
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
812
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
814
	require valid-user
813
	require valid-user
815
	AuthType digest
814
	AuthType digest
816
	AuthName $HOSTNAME.$DOMAIN
815
	AuthName $HOSTNAME.$DOMAIN
817
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
816
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
818
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
817
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
819
</Directory>
818
</Directory>
820
EOF
819
EOF
821
# Launch after coova
820
# Launch after coova
822
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
821
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
823
# Initialization of Vnstat
822
# Initialization of Vnstat
824
	 [ -e /etc/vnstat.conf.default ]  || cp /etc/vnstat.conf /etc/vnstat.conf.default
823
	 [ -e /etc/vnstat.conf.default ]  || cp /etc/vnstat.conf /etc/vnstat.conf.default
825
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
824
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
826
	/usr/bin/vnstat -u -i $EXTIF
825
	/usr/bin/vnstat -u -i $EXTIF
827
} # End of ACC ()
826
} # End of ACC ()
828
 
827
 
829
##########################################################################################
828
##########################################################################################
830
##				Fonction "CA"						##
829
##				Fonction "CA"						##
831
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
830
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
832
##########################################################################################
831
##########################################################################################
833
CA ()
832
CA ()
834
{
833
{
835
	$DIR_DEST_BIN/alcasar-CA.sh
834
	$DIR_DEST_BIN/alcasar-CA.sh
836
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
835
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
837
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
836
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
838
	cat <<EOF > $FIC_VIRTUAL_SSL
837
	cat <<EOF > $FIC_VIRTUAL_SSL
839
# default SSL virtual host, used for all HTTPS requests that do not
838
# default SSL virtual host, used for all HTTPS requests that do not
840
# match a ServerName or ServerAlias in any <VirtualHost> block.
839
# match a ServerName or ServerAlias in any <VirtualHost> block.
841
 
840
 
842
<VirtualHost _default_:443>
841
<VirtualHost _default_:443>
843
# general configuration
842
# general configuration
844
    ServerAdmin root@localhost
843
    ServerAdmin root@localhost
845
    ServerName localhost
844
    ServerName localhost
846
 
845
 
847
# SSL configuration
846
# SSL configuration
848
    SSLEngine on
847
    SSLEngine on
849
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
848
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
850
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
849
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
851
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
850
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
852
    CustomLog logs/ssl_request_log \
851
    CustomLog logs/ssl_request_log \
853
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
852
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
854
    ErrorLog logs/ssl_error_log
853
    ErrorLog logs/ssl_error_log
855
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
854
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
856
</VirtualHost>
855
</VirtualHost>
857
EOF
856
EOF
858
 
857
 
859
	chown -R root:apache /etc/pki
858
	chown -R root:apache /etc/pki
860
	chmod -R 750 /etc/pki
859
	chmod -R 750 /etc/pki
861
} # End of CA ()
860
} # End of CA ()
862
 
861
 
863
##########################################################################################
862
##########################################################################################
864
##			Fonction "init_db"						##
863
##			Fonction "init_db"						##
865
## - Initialisation de la base Mysql							##
864
## - Initialisation de la base Mysql							##
866
## - Affectation du mot de passe de l'administrateur (root)				##
865
## - Affectation du mot de passe de l'administrateur (root)				##
867
## - Suppression des bases et des utilisateurs superflus				##
866
## - Suppression des bases et des utilisateurs superflus				##
868
## - Création de la base 'radius'							##
867
## - Création de la base 'radius'							##
869
## - Installation du schéma de cette base						##
868
## - Installation du schéma de cette base						##
870
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
869
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
871
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
870
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
872
##########################################################################################
871
##########################################################################################
873
init_db ()
872
init_db ()
874
{
873
{
875
	rm -rf /var/lib/mysql # to be sure that there is no former installation
874
	rm -rf /var/lib/mysql # to be sure that there is no former installation
876
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
875
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
877
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
876
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
878
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
877
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
879
	systemctl start mysqld.service
878
	systemctl start mysqld.service
880
	sleep 4
879
	sleep 4
881
	mysqladmin -u root password $mysqlpwd
880
	mysqladmin -u root password $mysqlpwd
882
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
881
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
883
# Secure the server
882
# Secure the server
884
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
883
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
885
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
884
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
886
# Create 'radius' database
885
# Create 'radius' database
887
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
886
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
888
# Add an empty radius database structure
887
# Add an empty radius database structure
889
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
888
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
890
# modify the start script in order to close accounting connexion when the system is comming down or up
889
# modify the start script in order to close accounting connexion when the system is comming down or up
891
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
890
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
892
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
891
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
893
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
892
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
894
	systemctl daemon-reload
893
	systemctl daemon-reload
895
} # End of init_db ()
894
} # End of init_db ()
896
 
895
 
897
##########################################################################
896
##########################################################################
898
##			Fonction "radius"				##
897
##			Fonction "radius"				##
899
## - Paramètrage des fichiers de configuration FreeRadius		##
898
## - Paramètrage des fichiers de configuration FreeRadius		##
900
## - Affectation du secret partagé entre coova-chilli et freeradius	##
899
## - Affectation du secret partagé entre coova-chilli et freeradius	##
901
## - Modification de fichier de conf pour l'accès à Mysql		##
900
## - Modification de fichier de conf pour l'accès à Mysql		##
902
##########################################################################
901
##########################################################################
903
radius ()
902
radius ()
904
{
903
{
905
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
904
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
906
	chown -R radius:radius /etc/raddb
905
	chown -R radius:radius /etc/raddb
907
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
906
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
908
# Set radius.conf parameters
907
# Set radius.conf parameters
909
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
908
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
910
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
909
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
911
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
910
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
912
# remove the proxy function
911
# remove the proxy function
913
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
912
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
914
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
913
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
915
# remove EAP module
914
# remove EAP module
916
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
915
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
917
# listen on loopback (should be modified later if EAP enabled)
916
# listen on loopback (should be modified later if EAP enabled)
918
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
917
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
919
# enable the  SQL module (and SQL counter)
918
# enable the  SQL module (and SQL counter)
920
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
919
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
921
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
920
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
922
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
921
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
923
# only include modules for ALCASAR needs
922
# only include modules for ALCASAR needs
924
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
923
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
925
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
924
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
926
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
925
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
927
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
926
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
928
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
927
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
929
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
928
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
930
# remvove virtual server and copy our conf file
929
# remvove virtual server and copy our conf file
931
	rm -f /etc/raddb/sites-enabled/*
930
	rm -f /etc/raddb/sites-enabled/*
932
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
931
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
933
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
932
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
934
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
933
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
935
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
934
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
936
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
935
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
937
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
936
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
938
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
937
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
939
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
938
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
940
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
939
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
941
	cat << EOF > /etc/raddb/clients.conf
940
	cat << EOF > /etc/raddb/clients.conf
942
client 127.0.0.1 {
941
client 127.0.0.1 {
943
	secret = $secretradius
942
	secret = $secretradius
944
	shortname = localhost
943
	shortname = localhost
945
}
944
}
946
EOF
945
EOF
947
# sql.conf modification
946
# sql.conf modification
948
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
947
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
949
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
948
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
950
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
949
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
951
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
950
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
952
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
951
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
953
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
952
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
954
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
953
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
955
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
954
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
956
# counter.conf modification (change the Max-All-Session-Time counter)
955
# counter.conf modification (change the Max-All-Session-Time counter)
957
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
956
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
958
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
957
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
959
	chown -R radius:radius /etc/raddb/sql/mysql/*
958
	chown -R radius:radius /etc/raddb/sql/mysql/*
960
# make certain that mysql is up before radius start
959
# make certain that mysql is up before radius start
961
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
960
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
962
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
961
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
963
	systemctl daemon-reload
962
	systemctl daemon-reload
964
} # End radius ()
963
} # End radius ()
965
 
964
 
966
##########################################################################
965
##########################################################################
967
##			Function "radius_web"				##
966
##			Function "radius_web"				##
968
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
967
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
969
## - Création du lien vers la page de changement de mot de passe        ##
968
## - Création du lien vers la page de changement de mot de passe        ##
970
##########################################################################
969
##########################################################################
971
radius_web ()
970
radius_web ()
972
{
971
{
973
# copie de l'interface d'origine dans la structure Alcasar
972
# copie de l'interface d'origine dans la structure Alcasar
974
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
973
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
975
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
974
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
976
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
975
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
977
# copie des fichiers modifiés
976
# copie des fichiers modifiés
978
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
977
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
979
	chown -R apache:apache $DIR_ACC/manager/
978
	chown -R apache:apache $DIR_ACC/manager/
980
# Modification des fichiers de configuration
979
# Modification des fichiers de configuration
981
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
980
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
982
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
981
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
983
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
982
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
984
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
983
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
985
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
984
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
986
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
985
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
987
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
986
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
988
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
987
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
989
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
988
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
990
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
989
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
991
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
990
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
992
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
991
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
993
	cat <<EOF > /etc/freeradius-web/naslist.conf
992
	cat <<EOF > /etc/freeradius-web/naslist.conf
994
nas1_name: alcasar-$ORGANISME
993
nas1_name: alcasar-$ORGANISME
995
nas1_model: Portail captif
994
nas1_model: Portail captif
996
nas1_ip: $PRIVATE_IP
995
nas1_ip: $PRIVATE_IP
997
nas1_port_num: 0
996
nas1_port_num: 0
998
nas1_community: public
997
nas1_community: public
999
EOF
998
EOF
1000
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
999
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1001
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1000
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1002
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1001
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1003
# Ajout du mappage des attributs chillispot
1002
# Ajout du mappage des attributs chillispot
1004
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1003
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1005
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1004
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1006
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1005
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1007
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1006
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1008
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1007
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1009
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1008
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1010
	chown -R apache:apache /etc/freeradius-web
1009
	chown -R apache:apache /etc/freeradius-web
1011
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1010
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1012
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1011
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1013
<Directory $DIR_WEB/pass>
1012
<Directory $DIR_WEB/pass>
1014
	SSLRequireSSL
1013
	SSLRequireSSL
1015
	AllowOverride None
1014
	AllowOverride None
1016
	Order deny,allow
1015
	Order deny,allow
1017
	Deny from all
1016
	Deny from all
1018
	Allow from 127.0.0.1
1017
	Allow from 127.0.0.1
1019
	Allow from $PRIVATE_NETWORK_MASK
1018
	Allow from $PRIVATE_NETWORK_MASK
1020
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1019
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1021
</Directory>
1020
</Directory>
1022
EOF
1021
EOF
1023
} # End of radius_web ()
1022
} # End of radius_web ()
1024
 
1023
 
1025
##################################################################################
1024
##################################################################################
1026
##			Fonction "chilli"					##
1025
##			Fonction "chilli"					##
1027
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1026
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1028
## - Paramètrage de la page d'authentification (intercept.php)			##
1027
## - Paramètrage de la page d'authentification (intercept.php)			##
1029
##################################################################################
1028
##################################################################################
1030
chilli ()
1029
chilli ()
1031
{
1030
{
1032
# chilli unit for systemd
1031
# chilli unit for systemd
1033
cat << EOF > /lib/systemd/system/chilli.service
1032
cat << EOF > /lib/systemd/system/chilli.service
1034
#  This file is part of systemd.
1033
#  This file is part of systemd.
1035
#
1034
#
1036
#  systemd is free software; you can redistribute it and/or modify it
1035
#  systemd is free software; you can redistribute it and/or modify it
1037
#  under the terms of the GNU General Public License as published by
1036
#  under the terms of the GNU General Public License as published by
1038
#  the Free Software Foundation; either version 2 of the License, or
1037
#  the Free Software Foundation; either version 2 of the License, or
1039
#  (at your option) any later version.
1038
#  (at your option) any later version.
1040
[Unit]
1039
[Unit]
1041
Description=chilli is a captive portal daemon
1040
Description=chilli is a captive portal daemon
1042
After=network.target
1041
After=network.target
1043
 
1042
 
1044
[Service]
1043
[Service]
1045
Type=forking
1044
Type=forking
1046
ExecStart=/usr/libexec/chilli start
1045
ExecStart=/usr/libexec/chilli start
1047
ExecStop=/usr/libexec/chilli stop
1046
ExecStop=/usr/libexec/chilli stop
1048
ExecReload=/usr/libexec/chilli reload
1047
ExecReload=/usr/libexec/chilli reload
1049
PIDFile=/var/run/chilli.pid
1048
PIDFile=/var/run/chilli.pid
1050
 
1049
 
1051
[Install]
1050
[Install]
1052
WantedBy=multi-user.target
1051
WantedBy=multi-user.target
1053
EOF
1052
EOF
1054
# init file creation
1053
# init file creation
1055
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1054
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1056
	cat <<EOF > /usr/libexec/chilli
1055
	cat <<EOF > /usr/libexec/chilli
1057
#!/bin/sh
1056
#!/bin/sh
1058
#
1057
#
1059
# chilli CoovaChilli init
1058
# chilli CoovaChilli init
1060
#
1059
#
1061
# chkconfig: 2345 65 35
1060
# chkconfig: 2345 65 35
1062
# description: CoovaChilli
1061
# description: CoovaChilli
1063
### BEGIN INIT INFO
1062
### BEGIN INIT INFO
1064
# Provides:       chilli
1063
# Provides:       chilli
1065
# Required-Start: network 
1064
# Required-Start: network 
1066
# Should-Start: 
1065
# Should-Start: 
1067
# Required-Stop:  network
1066
# Required-Stop:  network
1068
# Should-Stop: 
1067
# Should-Stop: 
1069
# Default-Start:  2 3 5
1068
# Default-Start:  2 3 5
1070
# Default-Stop:
1069
# Default-Stop:
1071
# Description:    CoovaChilli access controller
1070
# Description:    CoovaChilli access controller
1072
### END INIT INFO
1071
### END INIT INFO
1073
 
1072
 
1074
[ -f /usr/sbin/chilli ] || exit 0
1073
[ -f /usr/sbin/chilli ] || exit 0
1075
. /etc/init.d/functions
1074
. /etc/init.d/functions
1076
CONFIG=/etc/chilli.conf
1075
CONFIG=/etc/chilli.conf
1077
pidfile=/var/run/chilli.pid
1076
pidfile=/var/run/chilli.pid
1078
[ -f \$CONFIG ] || {
1077
[ -f \$CONFIG ] || {
1079
    echo "\$CONFIG Not found"
1078
    echo "\$CONFIG Not found"
1080
    exit 0
1079
    exit 0
1081
}
1080
}
1082
RETVAL=0
1081
RETVAL=0
1083
prog="chilli"
1082
prog="chilli"
1084
case \$1 in
1083
case \$1 in
1085
    start)
1084
    start)
1086
	if [ -f \$pidfile ] ; then 
1085
	if [ -f \$pidfile ] ; then 
1087
		gprintf "chilli is already running"
1086
		gprintf "chilli is already running"
1088
	else
1087
	else
1089
        	gprintf "Starting \$prog: "
1088
        	gprintf "Starting \$prog: "
1090
		rm -f /var/run/chilli* # cleaning
1089
		rm -f /var/run/chilli* # cleaning
1091
        	/sbin/modprobe tun >/dev/null 2>&1
1090
        	/sbin/modprobe tun >/dev/null 2>&1
1092
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1091
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1093
		[ -e /dev/net/tun ] || {
1092
		[ -e /dev/net/tun ] || {
1094
	    	(cd /dev; 
1093
	    	(cd /dev; 
1095
			mkdir net; 
1094
			mkdir net; 
1096
			cd net; 
1095
			cd net; 
1097
			mknod tun c 10 200)
1096
			mknod tun c 10 200)
1098
		}
1097
		}
1099
		ifconfig $INTIF 0.0.0.0
1098
		ifconfig $INTIF 0.0.0.0
1100
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1099
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1101
        	RETVAL=$?
1100
        	RETVAL=$?
1102
	fi
1101
	fi
1103
	;;
1102
	;;
1104
 
1103
 
1105
    reload)
1104
    reload)
1106
	killall -HUP chilli
1105
	killall -HUP chilli
1107
	;;
1106
	;;
1108
 
1107
 
1109
    restart)
1108
    restart)
1110
	\$0 stop
1109
	\$0 stop
1111
        sleep 2
1110
        sleep 2
1112
	\$0 start
1111
	\$0 start
1113
	;;
1112
	;;
1114
    
1113
    
1115
    status)
1114
    status)
1116
        status chilli
1115
        status chilli
1117
        RETVAL=0
1116
        RETVAL=0
1118
        ;;
1117
        ;;
1119
 
1118
 
1120
    stop)
1119
    stop)
1121
	if [ -f \$pidfile ] ; then  
1120
	if [ -f \$pidfile ] ; then  
1122
        	gprintf "Shutting down \$prog: "
1121
        	gprintf "Shutting down \$prog: "
1123
		killproc /usr/sbin/chilli
1122
		killproc /usr/sbin/chilli
1124
		RETVAL=\$?
1123
		RETVAL=\$?
1125
		[ \$RETVAL = 0 ] && rm -f $pidfile
1124
		[ \$RETVAL = 0 ] && rm -f $pidfile
1126
	else	
1125
	else	
1127
        	gprintf "chilli is not running"
1126
        	gprintf "chilli is not running"
1128
	fi
1127
	fi
1129
	;;
1128
	;;
1130
    
1129
    
1131
    *)
1130
    *)
1132
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1131
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1133
        exit 1
1132
        exit 1
1134
esac
1133
esac
1135
echo
1134
echo
1136
EOF
1135
EOF
1137
chmod a+x /usr/libexec/chilli
1136
chmod a+x /usr/libexec/chilli
1138
# conf file creation
1137
# conf file creation
1139
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1138
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1140
	cat <<EOF > /etc/chilli.conf
1139
	cat <<EOF > /etc/chilli.conf
1141
# coova config for ALCASAR
1140
# coova config for ALCASAR
1142
cmdsocket	/var/run/chilli.sock
1141
cmdsocket	/var/run/chilli.sock
1143
unixipc		chilli.$INTIF.ipc
1142
unixipc		chilli.$INTIF.ipc
1144
pidfile		/var/run/chilli.$INTIF.pid
1143
pidfile		/var/run/chilli.$INTIF.pid
1145
net		$PRIVATE_NETWORK_MASK
1144
net		$PRIVATE_NETWORK_MASK
1146
dhcpif		$INTIF
1145
dhcpif		$INTIF
1147
ethers		$DIR_DEST_ETC/alcasar-ethers
1146
ethers		$DIR_DEST_ETC/alcasar-ethers
1148
#nodynip
1147
#nodynip
1149
#statip
1148
#statip
1150
dynip		$PRIVATE_NETWORK_MASK
1149
dynip		$PRIVATE_NETWORK_MASK
1151
domain		$DOMAIN
1150
domain		$DOMAIN
1152
dns1		$PRIVATE_IP
1151
dns1		$PRIVATE_IP
1153
dns2		$PRIVATE_IP
1152
dns2		$PRIVATE_IP
1154
uamlisten	$PRIVATE_IP
1153
uamlisten	$PRIVATE_IP
1155
uamport		3990
1154
uamport		3990
1156
macauth
1155
macauth
1157
macpasswd	password
1156
macpasswd	password
1158
locationname	$HOSTNAME.$DOMAIN
1157
locationname	$HOSTNAME.$DOMAIN
1159
radiusserver1	127.0.0.1
1158
radiusserver1	127.0.0.1
1160
radiusserver2	127.0.0.1
1159
radiusserver2	127.0.0.1
1161
radiussecret	$secretradius
1160
radiussecret	$secretradius
1162
radiusauthport	1812
1161
radiusauthport	1812
1163
radiusacctport	1813
1162
radiusacctport	1813
1164
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1163
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1165
radiusnasid	$HOSTNAME.$DOMAIN
1164
radiusnasid	$HOSTNAME.$DOMAIN
1166
uamsecret	$secretuam
1165
uamsecret	$secretuam
1167
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1166
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1168
coaport		3799
1167
coaport		3799
1169
conup		$DIR_DEST_BIN/alcasar-conup.sh
1168
conup		$DIR_DEST_BIN/alcasar-conup.sh
1170
condown		$DIR_DEST_BIN/alcasar-condown.sh
1169
condown		$DIR_DEST_BIN/alcasar-condown.sh
1171
include		$DIR_DEST_ETC/alcasar-uamallowed
1170
include		$DIR_DEST_ETC/alcasar-uamallowed
1172
include		$DIR_DEST_ETC/alcasar-uamdomain
1171
include		$DIR_DEST_ETC/alcasar-uamdomain
1173
#dhcpgateway
1172
#dhcpgateway
1174
#dhcprelayagent
1173
#dhcprelayagent
1175
#dhcpgatewayport
1174
#dhcpgatewayport
1176
EOF
1175
EOF
1177
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1176
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1178
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1177
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1179
# create files for trusted domains and urls
1178
# create files for trusted domains and urls
1180
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1179
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1181
	chown root:apache $DIR_DEST_ETC/alcasar-*
1180
	chown root:apache $DIR_DEST_ETC/alcasar-*
1182
	chmod 660 $DIR_DEST_ETC/alcasar-*
1181
	chmod 660 $DIR_DEST_ETC/alcasar-*
1183
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1182
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1184
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1183
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1185
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1184
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1186
# user 'chilli' creation (in order to run conup/off and up/down scripts
1185
# user 'chilli' creation (in order to run conup/off and up/down scripts
1187
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1186
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1188
	if [ "$chilli_exist" == "1" ]
1187
	if [ "$chilli_exist" == "1" ]
1189
	then
1188
	then
1190
	      userdel -r chilli 2>/dev/null
1189
	      userdel -r chilli 2>/dev/null
1191
	fi
1190
	fi
1192
	groupadd -f chilli
1191
	groupadd -f chilli
1193
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1192
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1194
}  # End of chilli ()
1193
}  # End of chilli ()
1195
 
1194
 
1196
##################################################################
1195
##################################################################
1197
##		Fonction "dansguardian"				##
1196
##		Fonction "dansguardian"				##
1198
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1197
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1199
##################################################################
1198
##################################################################
1200
dansguardian ()
1199
dansguardian ()
1201
{
1200
{
1202
	mkdir /var/dansguardian
1201
	mkdir /var/dansguardian
1203
	chown dansguardian /var/dansguardian
1202
	chown dansguardian /var/dansguardian
1204
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1203
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1205
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1204
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1206
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1205
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1207
# By default the filter is off 
1206
# By default the filter is off 
1208
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1207
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1209
# French deny HTML page
1208
# French deny HTML page
1210
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1209
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1211
# Listen only on LAN side
1210
# Listen only on LAN side
1212
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1211
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1213
# DG send its flow to HAVP
1212
# DG send its flow to HAVP
1214
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1213
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1215
# replace the default deny HTML page
1214
# replace the default deny HTML page
1216
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1215
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1217
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1216
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1218
# Don't log
1217
# Don't log
1219
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1218
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1220
# Run 10 daemons (20 in largest server)
1219
# Run 10 daemons (20 in largest server)
1221
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1220
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1222
# on désactive par défaut le controle de contenu des pages html
1221
# on désactive par défaut le controle de contenu des pages html
1223
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1222
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1224
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1223
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1225
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1224
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1226
# on désactive par défaut le contrôle d'URL par expressions régulières
1225
# on désactive par défaut le contrôle d'URL par expressions régulières
1227
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1226
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1228
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1227
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1229
# on désactive par défaut le contrôle de téléchargement de fichiers
1228
# on désactive par défaut le contrôle de téléchargement de fichiers
1230
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1229
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1231
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1230
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1232
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1231
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1233
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1232
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1234
	touch $DIR_DG/lists/bannedextensionlist
1233
	touch $DIR_DG/lists/bannedextensionlist
1235
	touch $DIR_DG/lists/bannedmimetypelist
1234
	touch $DIR_DG/lists/bannedmimetypelist
1236
# 'Safesearch' regex actualisation
1235
# 'Safesearch' regex actualisation
1237
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1236
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1238
# empty LAN IP list that won't be WEB filtered
1237
# empty LAN IP list that won't be WEB filtered
1239
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1238
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1240
	touch $DIR_DG/lists/exceptioniplist
1239
	touch $DIR_DG/lists/exceptioniplist
1241
# Keep a copy of URL & domain filter configuration files
1240
# Keep a copy of URL & domain filter configuration files
1242
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1241
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1243
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1242
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1244
} # End of dansguardian ()
1243
} # End of dansguardian ()
1245
 
1244
 
1246
##################################################################
1245
##################################################################
1247
##			Fonction "antivirus"			##
1246
##			Fonction "antivirus"			##
1248
## - configuration of havp, libclamav and freshclam		##
1247
## - configuration of havp, libclamav and freshclam		##
1249
##################################################################
1248
##################################################################
1250
antivirus ()		
1249
antivirus ()		
1251
{
1250
{
1252
# create 'havp' user
1251
# create 'havp' user
1253
	havp_exist=`grep havp /etc/passwd|wc -l`
1252
	havp_exist=`grep havp /etc/passwd|wc -l`
1254
	if [ "$havp_exist" == "1" ]
1253
	if [ "$havp_exist" == "1" ]
1255
	then
1254
	then
1256
	      userdel -r havp 2>/dev/null
1255
	      userdel -r havp 2>/dev/null
1257
	      groupdel havp 2>/dev/null
1256
	      groupdel havp 2>/dev/null
1258
	fi
1257
	fi
1259
	groupadd -f havp
1258
	groupadd -f havp
1260
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1259
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1261
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1260
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1262
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1261
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1263
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1262
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1264
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1263
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1265
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1264
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1266
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1265
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1267
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1266
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1268
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1267
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1269
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1268
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1270
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1269
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1271
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1270
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1272
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1271
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1273
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1272
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1274
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1273
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1275
# skip checking of youtube flow (too heavy load / risk too low)
1274
# skip checking of youtube flow (too heavy load / risk too low)
1276
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1275
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1277
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1276
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1278
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1277
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1279
# replacement of init script
1278
# replacement of init script
1280
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1279
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1281
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1280
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1282
# replace of the intercept page (template)
1281
# replace of the intercept page (template)
1283
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1282
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1284
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1283
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1285
# update virus database every 4 hours (24h/6)
1284
# update virus database every 4 hours (24h/6)
1286
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1285
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1287
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1286
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1288
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1287
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1289
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1288
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1290
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1289
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1291
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1290
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1292
# update now
1291
# update now
1293
	/usr/bin/freshclam --no-warnings
1292
	/usr/bin/freshclam --no-warnings
1294
} # End of antivirus ()
1293
} # End of antivirus ()
1295
 
1294
 
1296
##########################################################################
1295
##########################################################################
1297
##			Fonction "tinyproxy"				##
1296
##			Fonction "tinyproxy"				##
1298
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1297
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1299
##########################################################################
1298
##########################################################################
1300
tinyproxy ()		
1299
tinyproxy ()		
1301
{
1300
{
1302
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1301
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1303
	if [ "$tinyproxy_exist" == "1" ]
1302
	if [ "$tinyproxy_exist" == "1" ]
1304
	then
1303
	then
1305
	      userdel -r tinyproxy 2>/dev/null
1304
	      userdel -r tinyproxy 2>/dev/null
1306
	      groupdel tinyproxy 2>/dev/null
1305
	      groupdel tinyproxy 2>/dev/null
1307
	fi
1306
	fi
1308
	groupadd -f tinyproxy
1307
	groupadd -f tinyproxy
1309
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1308
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1310
	mkdir -p var/run/tinyproxy /var/log/tinyproxy
1309
	mkdir -p var/run/tinyproxy /var/log/tinyproxy
1311
	chown -R tinyproxy.tinyproxy /run/tinyproxy /var/log/tinyproxy
1310
	chown -R tinyproxy.tinyproxy /run/tinyproxy /var/log/tinyproxy
1312
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1311
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1313
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1312
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1314
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1313
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1315
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1314
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1316
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1315
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1317
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1316
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1318
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1317
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1319
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1318
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1320
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1319
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1321
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1320
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1322
# Create the systemd unit
1321
# Create the systemd unit
1323
cat << EOF > /lib/systemd/system/tinyproxy.service
1322
cat << EOF > /lib/systemd/system/tinyproxy.service
1324
#  This file is part of systemd.
1323
#  This file is part of systemd.
1325
#
1324
#
1326
#  systemd is free software; you can redistribute it and/or modify it
1325
#  systemd is free software; you can redistribute it and/or modify it
1327
#  under the terms of the GNU General Public License as published by
1326
#  under the terms of the GNU General Public License as published by
1328
#  the Free Software Foundation; either version 2 of the License, or
1327
#  the Free Software Foundation; either version 2 of the License, or
1329
#  (at your option) any later version.
1328
#  (at your option) any later version.
1330
 
1329
 
1331
# This unit launches tinyproxy (a very light proxy).
1330
# This unit launches tinyproxy (a very light proxy).
1332
# The "sleep 2" is needed because the pid file isn't ready for systemd
1331
# The "sleep 2" is needed because the pid file isn't ready for systemd
1333
[Unit]
1332
[Unit]
1334
Description=Tinyproxy Web Proxy Server
1333
Description=Tinyproxy Web Proxy Server
1335
After=network.target iptables.service
1334
After=network.target iptables.service
1336
 
1335
 
1337
[Service]
1336
[Service]
1338
Type=forking
1337
Type=forking
1339
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1338
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1340
ExecStartPre=/bin/sleep 2
1339
ExecStartPre=/bin/sleep 2
1341
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1340
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1342
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1341
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1343
 
1342
 
1344
[Install]
1343
[Install]
1345
WantedBy=multi-user.target
1344
WantedBy=multi-user.target
1346
EOF
1345
EOF
1347
 
1346
 
1348
} # end of tinyproxy
1347
} # end of tinyproxy
1349
##################################################################################
1348
##################################################################################
1350
##			function "ulogd"					##
1349
##			function "ulogd"					##
1351
## - Ulog config for multi-log files 						##
1350
## - Ulog config for multi-log files 						##
1352
##################################################################################
1351
##################################################################################
1353
ulogd ()
1352
ulogd ()
1354
{
1353
{
1355
# Three instances of ulogd (three different logfiles)
1354
# Three instances of ulogd (three different logfiles)
1356
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1355
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1357
	nl=1
1356
	nl=1
1358
	for log_type in traceability ssh ext-access
1357
	for log_type in traceability ssh ext-access
1359
	do
1358
	do
1360
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1359
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1361
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1360
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1362
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1361
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1363
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1362
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1364
		cat << EOF >> /etc/ulogd-$log_type.conf
1363
		cat << EOF >> /etc/ulogd-$log_type.conf
1365
[emu1]
1364
[emu1]
1366
file="/var/log/firewall/$log_type.log"
1365
file="/var/log/firewall/$log_type.log"
1367
sync=1
1366
sync=1
1368
EOF
1367
EOF
1369
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1368
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1370
		nl=`expr $nl + 1`
1369
		nl=`expr $nl + 1`
1371
	done
1370
	done
1372
	chown -R root:apache /var/log/firewall
1371
	chown -R root:apache /var/log/firewall
1373
	chmod 750 /var/log/firewall
1372
	chmod 750 /var/log/firewall
1374
	chmod 640 /var/log/firewall/*
1373
	chmod 640 /var/log/firewall/*
1375
}  # End of ulogd ()
1374
}  # End of ulogd ()
1376
 
1375
 
1377
 
1376
 
1378
##########################################################
1377
##########################################################
1379
##              Function "nfsen"			##
1378
##              Function "nfsen"			##
1380
##########################################################
1379
##########################################################
1381
nfsen()
1380
nfsen()
1382
{
1381
{
1383
	tar xzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1382
	tar xzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1384
# Add PortTracker plugin
1383
# Add PortTracker plugin
1385
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1384
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1386
	do
1385
	do
1387
	[ ! -d $i ] && mkdir $i && chown -R apache:apache $i
1386
	[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1388
	done
1387
	done
1389
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm
1388
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm
1390
# use of our conf file and init unit
1389
# use of our conf file and init unit
1391
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1390
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1392
# Installation of nfsen
1391
# Installation of nfsen
1393
	DirTmp=$(pwd)
1392
	DirTmp=$(pwd)
1394
	cd /tmp/nfsen-1.3.6p1/
1393
	cd /tmp/nfsen-1.3.6p1/
1395
	/usr/bin/perl5 install.pl etc/nfsen.conf
1394
	/usr/bin/perl5 install.pl etc/nfsen.conf
1396
	/usr/bin/perl5 install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1395
	/usr/bin/perl5 install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1397
# Create RRD DB for porttracker (only in it still doesn't exist)
1396
# Create RRD DB for porttracker (only in it still doesn't exist)
1398
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1397
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1399
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1398
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1400
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1399
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1401
	chmod -R 770 /var/log/netflow/porttracker
1400
	chmod -R 770 /var/log/netflow/porttracker
1402
# Apache conf file
-
 
1403
	cat << EOF > /etc/httpd/conf/conf.d/nfsen.conf
-
 
1404
Alias /nfsen /var/www/html/acc/manager/nfsen 
-
 
1405
<Directory /var/www/html/acc/manager/nfsen/> 
-
 
1406
DirectoryIndex nfsen.php 
-
 
1407
Options -Indexes 
-
 
1408
AllowOverride all 
-
 
1409
order allow,deny 
-
 
1410
allow from all 
-
 
1411
AddType application/x-httpd-php .php 
-
 
1412
php_flag magic_quotes_gpc on 
-
 
1413
php_flag track_vars on 
-
 
1414
</Directory>
-
 
1415
EOF
-
 
1416
# nfsen unit for systemd
1401
# nfsen unit for systemd
1417
cat << EOF > /lib/systemd/system/nfsen.service
1402
cat << EOF > /lib/systemd/system/nfsen.service
1418
#  This file is part of systemd.
1403
#  This file is part of systemd.
1419
#
1404
#
1420
#  systemd is free software; you can redistribute it and/or modify it
1405
#  systemd is free software; you can redistribute it and/or modify it
1421
#  under the terms of the GNU General Public License as published by
1406
#  under the terms of the GNU General Public License as published by
1422
#  the Free Software Foundation; either version 2 of the License, or
1407
#  the Free Software Foundation; either version 2 of the License, or
1423
#  (at your option) any later version.
1408
#  (at your option) any later version.
1424
 
1409
 
1425
# This unit launches nfsen (a Netflow grapher).
1410
# This unit launches nfsen (a Netflow grapher).
1426
[Unit]
1411
[Unit]
1427
Description= NfSen init script
1412
Description= NfSen init script
1428
After=network.target iptables.service
1413
After=network.target iptables.service
1429
 
1414
 
1430
[Service]
1415
[Service]
1431
Type=oneshot
1416
Type=oneshot
1432
RemainAfterExit=yes
1417
RemainAfterExit=yes
1433
PIDFile=/var/run/nfsen/nfsen.pid
1418
PIDFile=/var/run/nfsen/nfsen.pid
1434
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1419
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1435
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1420
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1436
ExecStart=/usr/bin/nfsen start 
1421
ExecStart=/usr/bin/nfsen start 
1437
ExecStop=/usr/bin/nfsen stop
1422
ExecStop=/usr/bin/nfsen stop
1438
ExecReload=/usr/bin/nfsen restart
1423
ExecReload=/usr/bin/nfsen restart
1439
TimeoutSec=0
1424
TimeoutSec=0
1440
 
1425
 
1441
[Install]
1426
[Install]
1442
WantedBy=multi-user.target
1427
WantedBy=multi-user.target
1443
EOF
1428
EOF
1444
# Add the listen port to collect netflow packet (nfcapd)
1429
# Add the listen port to collect netflow packet (nfcapd)
1445
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1430
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1446
# expire delay for the profile "live"
1431
# expire delay for the profile "live"
1447
	systemctl start nfsen
1432
	systemctl start nfsen
1448
	/bin/nfsen -m live -e 62d 2>/dev/null
1433
	/bin/nfsen -m live -e 62d 2>/dev/null
1449
# add SURFmap plugin
1434
# add SURFmap plugin
1450
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1435
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1451
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1436
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1452
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1437
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1453
	cd /tmp/
1438
	cd /tmp/
1454
	/usr/bin/sh SURFmap/install.sh
1439
	/usr/bin/sh SURFmap/install.sh
-
 
1440
chown -R apache:apache /var/www/html/acc/manager/nfsen
1455
# clear the installation
1441
# clear the installation
1456
	cd $DirTmp
1442
	cd $DirTmp
1457
	rm -rf /tmp/nfsen*
1443
	rm -rf /tmp/nfsen*
1458
	rm -rf /tmp/SURFmap*
1444
	rm -rf /tmp/SURFmap*
1459
} # End of nfsen ()
1445
} # End of nfsen ()
1460
 
1446
 
1461
##################################################
1447
##################################################
1462
##		Function "dnsmasq"		##
1448
##		Function "dnsmasq"		##
1463
##################################################
1449
##################################################
1464
dnsmasq ()
1450
dnsmasq ()
1465
{
1451
{
1466
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1452
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1467
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1453
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1468
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1454
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1469
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1455
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1470
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1456
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1471
	cat << EOF > /etc/dnsmasq.conf 
1457
	cat << EOF > /etc/dnsmasq.conf 
1472
# Configuration file for "dnsmasq in forward mode"
1458
# Configuration file for "dnsmasq in forward mode"
1473
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1459
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1474
listen-address=$PRIVATE_IP
1460
listen-address=$PRIVATE_IP
1475
pid-file=/var/run/dnsmasq.pid
1461
pid-file=/var/run/dnsmasq.pid
1476
listen-address=127.0.0.1
1462
listen-address=127.0.0.1
1477
no-dhcp-interface=$INTIF
1463
no-dhcp-interface=$INTIF
1478
no-dhcp-interface=tun0
1464
no-dhcp-interface=tun0
1479
no-dhcp-interface=lo
1465
no-dhcp-interface=lo
1480
bind-interfaces
1466
bind-interfaces
1481
cache-size=256
1467
cache-size=256
1482
domain=$DOMAIN
1468
domain=$DOMAIN
1483
domain-needed
1469
domain-needed
1484
expand-hosts
1470
expand-hosts
1485
bogus-priv
1471
bogus-priv
1486
filterwin2k
1472
filterwin2k
1487
server=$DNS1
1473
server=$DNS1
1488
server=$DNS2
1474
server=$DNS2
1489
# DHCP service is configured. It will be enabled in "bypass" mode
1475
# DHCP service is configured. It will be enabled in "bypass" mode
1490
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1476
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1491
dhcp-option=option:router,$PRIVATE_IP
1477
dhcp-option=option:router,$PRIVATE_IP
1492
dhcp-option=option:ntp-server,$PRIVATE_IP
1478
dhcp-option=option:ntp-server,$PRIVATE_IP
1493
 
1479
 
1494
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1480
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1495
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1481
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1496
EOF
1482
EOF
1497
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1483
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1498
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1484
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1499
# Configuration file for "dnsmasq with blacklist"
1485
# Configuration file for "dnsmasq with blacklist"
1500
# Add Toulouse blacklist domains
1486
# Add Toulouse blacklist domains
1501
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1487
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1502
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1488
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1503
pid-file=/var/run/dnsmasq-blacklist.pid
1489
pid-file=/var/run/dnsmasq-blacklist.pid
1504
listen-address=$PRIVATE_IP
1490
listen-address=$PRIVATE_IP
1505
port=54
1491
port=54
1506
no-dhcp-interface=$INTIF
1492
no-dhcp-interface=$INTIF
1507
no-dhcp-interface=tun0
1493
no-dhcp-interface=tun0
1508
no-dhcp-interface=lo
1494
no-dhcp-interface=lo
1509
bind-interfaces
1495
bind-interfaces
1510
cache-size=256
1496
cache-size=256
1511
domain=$DOMAIN
1497
domain=$DOMAIN
1512
domain-needed
1498
domain-needed
1513
expand-hosts
1499
expand-hosts
1514
bogus-priv
1500
bogus-priv
1515
filterwin2k
1501
filterwin2k
1516
server=$DNS1
1502
server=$DNS1
1517
server=$DNS2
1503
server=$DNS2
1518
EOF
1504
EOF
1519
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1505
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1520
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1506
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1521
# Configuration file for "dnsmasq with whitelist"
1507
# Configuration file for "dnsmasq with whitelist"
1522
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1508
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1523
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1509
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1524
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1510
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1525
pid-file=/var/run/dnsmasq-whitelist.pid
1511
pid-file=/var/run/dnsmasq-whitelist.pid
1526
listen-address=$PRIVATE_IP
1512
listen-address=$PRIVATE_IP
1527
port=55
1513
port=55
1528
no-dhcp-interface=$INTIF
1514
no-dhcp-interface=$INTIF
1529
no-dhcp-interface=tun0
1515
no-dhcp-interface=tun0
1530
no-dhcp-interface=lo
1516
no-dhcp-interface=lo
1531
bind-interfaces
1517
bind-interfaces
1532
cache-size=256
1518
cache-size=256
1533
domain=$DOMAIN
1519
domain=$DOMAIN
1534
domain-needed
1520
domain-needed
1535
expand-hosts
1521
expand-hosts
1536
bogus-priv
1522
bogus-priv
1537
filterwin2k
1523
filterwin2k
1538
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1524
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1539
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1525
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1540
EOF
1526
EOF
1541
# 4th dnsmasq listen on udp 56 ("blackhole")
1527
# 4th dnsmasq listen on udp 56 ("blackhole")
1542
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1528
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1543
# Configuration file for "dnsmasq as a blackhole"
1529
# Configuration file for "dnsmasq as a blackhole"
1544
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1530
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1545
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1531
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1546
pid-file=/var/run/dnsmasq-blackhole.pid
1532
pid-file=/var/run/dnsmasq-blackhole.pid
1547
listen-address=$PRIVATE_IP
1533
listen-address=$PRIVATE_IP
1548
port=56
1534
port=56
1549
no-dhcp-interface=$INTIF
1535
no-dhcp-interface=$INTIF
1550
no-dhcp-interface=tun0
1536
no-dhcp-interface=tun0
1551
no-dhcp-interface=lo
1537
no-dhcp-interface=lo
1552
bind-interfaces
1538
bind-interfaces
1553
cache-size=256
1539
cache-size=256
1554
domain=$DOMAIN
1540
domain=$DOMAIN
1555
domain-needed
1541
domain-needed
1556
expand-hosts
1542
expand-hosts
1557
bogus-priv
1543
bogus-priv
1558
filterwin2k
1544
filterwin2k
1559
EOF
1545
EOF
1560
 
1546
 
1561
# the main instance should start after network and chilli (which create tun0)
1547
# the main instance should start after network and chilli (which create tun0)
1562
	[ -e /lib/systemd/system/dnsmasq.service.old ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.old
1548
	[ -e /lib/systemd/system/dnsmasq.service.old ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.old
1563
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1549
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1564
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1550
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1565
	for list in blacklist whitelist blackhole
1551
	for list in blacklist whitelist blackhole
1566
	do
1552
	do
1567
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1553
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1568
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1554
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1569
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1555
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1570
	done
1556
	done
1571
} # End dnsmasq
1557
} # End dnsmasq
1572
 
1558
 
1573
##########################################################
1559
##########################################################
1574
##		Fonction "BL"				##
1560
##		Fonction "BL"				##
1575
##########################################################
1561
##########################################################
1576
BL ()
1562
BL ()
1577
{
1563
{
1578
# copy and extract toulouse BL
1564
# copy and extract toulouse BL
1579
	rm -rf $DIR_DG/lists/blacklists
1565
	rm -rf $DIR_DG/lists/blacklists
1580
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1566
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1581
# creation of the OSSI BL and WL categories (domain name and url)
1567
# creation of the OSSI BL and WL categories (domain name and url)
1582
	mkdir $DIR_DG/lists/blacklists/ossi
1568
	mkdir $DIR_DG/lists/blacklists/ossi
1583
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1569
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1584
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1570
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1585
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1571
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1586
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1572
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1587
# creation of file for the rehabilited domains and urls
1573
# creation of file for the rehabilited domains and urls
1588
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1574
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1589
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1575
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1590
	touch $DIR_DG/lists/exceptionsitelist
1576
	touch $DIR_DG/lists/exceptionsitelist
1591
	touch $DIR_DG/lists/exceptionurllist
1577
	touch $DIR_DG/lists/exceptionurllist
1592
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1578
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1593
	cat <<EOF > $DIR_DG/lists/bannedurllist
1579
	cat <<EOF > $DIR_DG/lists/bannedurllist
1594
# Dansguardian filter config for ALCASAR
1580
# Dansguardian filter config for ALCASAR
1595
EOF
1581
EOF
1596
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1582
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1597
# Dansguardian domain filter config for ALCASAR
1583
# Dansguardian domain filter config for ALCASAR
1598
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1584
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1599
#**
1585
#**
1600
# block all SSL and CONNECT tunnels
1586
# block all SSL and CONNECT tunnels
1601
**s
1587
**s
1602
# block all SSL and CONNECT tunnels specified only as an IP
1588
# block all SSL and CONNECT tunnels specified only as an IP
1603
*ips
1589
*ips
1604
# block all sites specified only by an IP
1590
# block all sites specified only by an IP
1605
*ip
1591
*ip
1606
EOF
1592
EOF
1607
# Add Bing and Youtube to the safesearch url regext list (parental control)
1593
# Add Bing and Youtube to the safesearch url regext list (parental control)
1608
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1594
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1609
# Bing - add 'adlt=strict'
1595
# Bing - add 'adlt=strict'
1610
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1596
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1611
# Youtube - add 'edufilter=your_ID' 
1597
# Youtube - add 'edufilter=your_ID' 
1612
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1598
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1613
EOF
1599
EOF
1614
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1600
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1615
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1601
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1616
# adapt the BL to ALCASAR architecture. Enable the default categories
1602
# adapt the BL to ALCASAR architecture. Enable the default categories
1617
	if [ "$mode" != "update" ]; then
1603
	if [ "$mode" != "update" ]; then
1618
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1604
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1619
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1605
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1620
	fi
1606
	fi
1621
}
1607
}
1622
 
1608
 
1623
##########################################################
1609
##########################################################
1624
##		Fonction "cron"				##
1610
##		Fonction "cron"				##
1625
## - Mise en place des différents fichiers de cron	##
1611
## - Mise en place des différents fichiers de cron	##
1626
##########################################################
1612
##########################################################
1627
cron ()
1613
cron ()
1628
{
1614
{
1629
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1615
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1630
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1616
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1631
	cat <<EOF > /etc/crontab
1617
	cat <<EOF > /etc/crontab
1632
SHELL=/bin/bash
1618
SHELL=/bin/bash
1633
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1619
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1634
MAILTO=root
1620
MAILTO=root
1635
HOME=/
1621
HOME=/
1636
 
1622
 
1637
# run-parts
1623
# run-parts
1638
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1624
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1639
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1625
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1640
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1626
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1641
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1627
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1642
EOF
1628
EOF
1643
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1629
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1644
	cat <<EOF >> /etc/anacrontab
1630
	cat <<EOF >> /etc/anacrontab
1645
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1631
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1646
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1632
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1647
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1633
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1648
EOF
1634
EOF
1649
 
1635
 
1650
	cat <<EOF > /etc/cron.d/alcasar-mysql
1636
	cat <<EOF > /etc/cron.d/alcasar-mysql
1651
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1637
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1652
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1638
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1653
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1639
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1654
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1640
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1655
EOF
1641
EOF
1656
	cat <<EOF > /etc/cron.d/alcasar-archive
1642
	cat <<EOF > /etc/cron.d/alcasar-archive
1657
# Archive des logs et de la base de données (tous les lundi à 5h35)
1643
# Archive des logs et de la base de données (tous les lundi à 5h35)
1658
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1644
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1659
EOF
1645
EOF
1660
	cat << EOF > /etc/cron.d/alcasar-clean_import
1646
	cat << EOF > /etc/cron.d/alcasar-clean_import
1661
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1647
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1662
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1648
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1663
EOF
1649
EOF
1664
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1650
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1665
# mise à jour automatique de la distribution tous les jours 3h30
1651
# mise à jour automatique de la distribution tous les jours 3h30
1666
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1652
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1667
EOF
1653
EOF
1668
	#cat << EOF > /etc/cron.d/alcasar-netflow
1654
	#cat << EOF > /etc/cron.d/alcasar-netflow
1669
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1655
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1670
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1656
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1671
#EOF
1657
#EOF
1672
 
1658
 
1673
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1659
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1674
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1660
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1675
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1661
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1676
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1662
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1677
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1663
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1678
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1664
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1679
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1665
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1680
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1666
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1681
	rm -f /etc/cron.daily/freeradius-web
1667
	rm -f /etc/cron.daily/freeradius-web
1682
	rm -f /etc/cron.monthly/freeradius-web
1668
	rm -f /etc/cron.monthly/freeradius-web
1683
	cat << EOF > /etc/cron.d/freeradius-web
1669
	cat << EOF > /etc/cron.d/freeradius-web
1684
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1670
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1685
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1671
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1686
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1672
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1687
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1673
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1688
EOF
1674
EOF
1689
	cat << EOF > /etc/cron.d/alcasar-watchdog
1675
	cat << EOF > /etc/cron.d/alcasar-watchdog
1690
# activation du "chien de garde" (watchdog) toutes les 3'
1676
# activation du "chien de garde" (watchdog) toutes les 3'
1691
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1677
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1692
EOF
1678
EOF
1693
# activation du "chien de garde des services" (watchdog) toutes les 18'
1679
# activation du "chien de garde des services" (watchdog) toutes les 18'
1694
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1680
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1695
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1681
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1696
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1682
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1697
EOF
1683
EOF
1698
# suppression des crons usagers
1684
# suppression des crons usagers
1699
	rm -f /var/spool/cron/*
1685
	rm -f /var/spool/cron/*
1700
} # End cron
1686
} # End cron
1701
 
1687
 
1702
##################################################################
1688
##################################################################
1703
## 			Fonction "Fail2Ban"			##
1689
## 			Fonction "Fail2Ban"			##
1704
##- Modification de la configuration de fail2ban		##
1690
##- Modification de la configuration de fail2ban		##
1705
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1691
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1706
##################################################################
1692
##################################################################
1707
fail2ban()
1693
fail2ban()
1708
{
1694
{
1709
	$DIR_CONF/fail2ban.sh
1695
	$DIR_CONF/fail2ban.sh
1710
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1696
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1711
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1697
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1712
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1698
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1713
	chmod 644 /var/log/fail2ban.log
1699
	chmod 644 /var/log/fail2ban.log
1714
	chmod 644 /var/Save/security/watchdog.log
1700
	chmod 644 /var/Save/security/watchdog.log
1715
	/usr/bin/touch /var/log/auth.log
1701
	/usr/bin/touch /var/log/auth.log
1716
# fail2ban unit
1702
# fail2ban unit
1717
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1703
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1718
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1704
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1719
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1705
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1720
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1706
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1721
} #Fin de fail2ban_install()
1707
} #Fin de fail2ban_install()
1722
 
1708
 
1723
##################################################################
1709
##################################################################
1724
## 			Fonction "gammu_smsd"			##
1710
## 			Fonction "gammu_smsd"			##
1725
## - Creation de la base de donnée Gammu			##
1711
## - Creation de la base de donnée Gammu			##
1726
## - Creation du fichier de config: gammu_smsd_conf		##
1712
## - Creation du fichier de config: gammu_smsd_conf		##
1727
##								##
1713
##								##
1728
##################################################################
1714
##################################################################
1729
gammu_smsd()
1715
gammu_smsd()
1730
{
1716
{
1731
# Create 'gammu' databse
1717
# Create 'gammu' databse
1732
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1718
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1733
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1719
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1734
# Add a gammu database structure
1720
# Add a gammu database structure
1735
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1721
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1736
 
1722
 
1737
# config file for the daemon
1723
# config file for the daemon
1738
cat << EOF > /etc/gammu_smsd_conf
1724
cat << EOF > /etc/gammu_smsd_conf
1739
[gammu]
1725
[gammu]
1740
port = /dev/ttyUSB0
1726
port = /dev/ttyUSB0
1741
connection = at115200
1727
connection = at115200
1742
 
1728
 
1743
;########################################################
1729
;########################################################
1744
 
1730
 
1745
[smsd]
1731
[smsd]
1746
 
1732
 
1747
PIN = 1234
1733
PIN = 1234
1748
 
1734
 
1749
logfile = /var/log/gammu-smsd/gammu-smsd.log
1735
logfile = /var/log/gammu-smsd/gammu-smsd.log
1750
logformat = textall
1736
logformat = textall
1751
debuglevel = 0
1737
debuglevel = 0
1752
 
1738
 
1753
service = sql
1739
service = sql
1754
driver = native_mysql
1740
driver = native_mysql
1755
user = $DB_USER
1741
user = $DB_USER
1756
password = $radiuspwd
1742
password = $radiuspwd
1757
pc = localhost
1743
pc = localhost
1758
database = $DB_GAMMU
1744
database = $DB_GAMMU
1759
 
1745
 
1760
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1746
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1761
 
1747
 
1762
StatusFrequency = 30
1748
StatusFrequency = 30
1763
;LoopSleep = 2
1749
;LoopSleep = 2
1764
 
1750
 
1765
;ResetFrequency = 300
1751
;ResetFrequency = 300
1766
;HardResetFrequency = 120
1752
;HardResetFrequency = 120
1767
 
1753
 
1768
CheckSecurity = 1 
1754
CheckSecurity = 1 
1769
CheckSignal = 1
1755
CheckSignal = 1
1770
CheckBattery = 0
1756
CheckBattery = 0
1771
EOF
1757
EOF
1772
 
1758
 
1773
chmod 755 /etc/gammu_smsd_conf
1759
chmod 755 /etc/gammu_smsd_conf
1774
 
1760
 
1775
#Creation dossier de log Gammu-smsd
1761
#Creation dossier de log Gammu-smsd
1776
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1762
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1777
chmod 755 /var/log/gammu-smsd
1763
chmod 755 /var/log/gammu-smsd
1778
 
1764
 
1779
#Edition du script sql gammu <-> radius
1765
#Edition du script sql gammu <-> radius
1780
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1766
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1781
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1767
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1782
 
1768
 
1783
#Création de la règle udev pour les Huawei // idVendor: 12d1
1769
#Création de la règle udev pour les Huawei // idVendor: 12d1
1784
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1770
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1785
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1771
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1786
EOF
1772
EOF
1787
 
1773
 
1788
} # END gammu_smsd()
1774
} # END gammu_smsd()
1789
 
1775
 
1790
##################################################################
1776
##################################################################
1791
##			Fonction "post_install"			##
1777
##			Fonction "post_install"			##
1792
## - Modification des bannières (locales et ssh) et des prompts ##
1778
## - Modification des bannières (locales et ssh) et des prompts ##
1793
## - Installation de la structure de chiffrement pour root	##
1779
## - Installation de la structure de chiffrement pour root	##
1794
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1780
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1795
## - Mise en place du la rotation des logs			##
1781
## - Mise en place du la rotation des logs			##
1796
## - Configuration dans le cas d'une mise à jour		##
1782
## - Configuration dans le cas d'une mise à jour		##
1797
##################################################################
1783
##################################################################
1798
post_install()
1784
post_install()
1799
{
1785
{
1800
# création de la bannière locale
1786
# création de la bannière locale
1801
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1787
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1802
	cp -f $DIR_CONF/banner /etc/mageia-release
1788
	cp -f $DIR_CONF/banner /etc/mageia-release
1803
	echo " V$VERSION" >> /etc/mageia-release
1789
	echo " V$VERSION" >> /etc/mageia-release
1804
# création de la bannière SSH
1790
# création de la bannière SSH
1805
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1791
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1806
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1792
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1807
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1793
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1808
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1794
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1809
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1795
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1810
# postfix banner anonymisation
1796
# postfix banner anonymisation
1811
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1797
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1812
# sshd écoute côté LAN et WAN
1798
# sshd écoute côté LAN et WAN
1813
	$SED "s?^#ListenAddress.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1799
	$SED "s?^#ListenAddress.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1814
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1800
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1815
	echo "SSH=off" >> $CONF_FILE
1801
	echo "SSH=off" >> $CONF_FILE
1816
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1802
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1817
	echo "QOS=off" >> $CONF_FILE
1803
	echo "QOS=off" >> $CONF_FILE
1818
	echo "LDAP=off" >> $CONF_FILE
1804
	echo "LDAP=off" >> $CONF_FILE
1819
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1805
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1820
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1806
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1821
	echo "MULTIWAN=off" >> $CONF_FILE
1807
	echo "MULTIWAN=off" >> $CONF_FILE
1822
	echo "FAILOVER=30" >> $CONF_FILE
1808
	echo "FAILOVER=30" >> $CONF_FILE
1823
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1809
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1824
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1810
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1825
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1811
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1826
# Coloration des prompts
1812
# Coloration des prompts
1827
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1813
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1828
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1814
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1829
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1815
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1830
# Droits d'exécution pour utilisateur apache et sysadmin
1816
# Droits d'exécution pour utilisateur apache et sysadmin
1831
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1817
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1832
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1818
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1833
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1819
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1834
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, radiusd, ulogd)
1820
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, radiusd, ulogd)
1835
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1821
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1836
	chmod 644 /etc/logrotate.d/*
1822
	chmod 644 /etc/logrotate.d/*
1837
# rectification sur versions précédentes de la compression des logs
1823
# rectification sur versions précédentes de la compression des logs
1838
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1824
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1839
# actualisation des fichiers logs compressés
1825
# actualisation des fichiers logs compressés
1840
	for dir in firewall dansguardian httpd
1826
	for dir in firewall dansguardian httpd
1841
	do
1827
	do
1842
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1828
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1843
	done
1829
	done
1844
# create the alcasar-load_balancing unit
1830
# create the alcasar-load_balancing unit
1845
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1831
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1846
#  This file is part of systemd.
1832
#  This file is part of systemd.
1847
#
1833
#
1848
#  systemd is free software; you can redistribute it and/or modify it
1834
#  systemd is free software; you can redistribute it and/or modify it
1849
#  under the terms of the GNU General Public License as published by
1835
#  under the terms of the GNU General Public License as published by
1850
#  the Free Software Foundation; either version 2 of the License, or
1836
#  the Free Software Foundation; either version 2 of the License, or
1851
#  (at your option) any later version.
1837
#  (at your option) any later version.
1852
 
1838
 
1853
# This unit lauches alcasar-load-balancing.sh script.
1839
# This unit lauches alcasar-load-balancing.sh script.
1854
[Unit]
1840
[Unit]
1855
Description=alcasar-load_balancing.sh execution
1841
Description=alcasar-load_balancing.sh execution
1856
After=network.target iptables.service
1842
After=network.target iptables.service
1857
 
1843
 
1858
[Service]
1844
[Service]
1859
Type=oneshot
1845
Type=oneshot
1860
RemainAfterExit=yes
1846
RemainAfterExit=yes
1861
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1847
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1862
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1848
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1863
TimeoutSec=0
1849
TimeoutSec=0
1864
SysVStartPriority=99
1850
SysVStartPriority=99
1865
 
1851
 
1866
[Install]
1852
[Install]
1867
WantedBy=multi-user.target
1853
WantedBy=multi-user.target
1868
EOF
1854
EOF
1869
# processes launched at boot time (Systemctl)
1855
# processes launched at boot time (Systemctl)
1870
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1856
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1871
	do
1857
	do
1872
		systemctl -q enable $i.service
1858
		systemctl -q enable $i.service
1873
	done
1859
	done
1874
	
1860
	
1875
# disable processes at boot time (Systemctl)
1861
# disable processes at boot time (Systemctl)
1876
	for i in ulogd
1862
	for i in ulogd
1877
	do
1863
	do
1878
		systemctl -q disable $i.service
1864
		systemctl -q disable $i.service
1879
	done
1865
	done
1880
	
1866
	
1881
# Apply French Security Agency (ANSSI) rules
1867
# Apply French Security Agency (ANSSI) rules
1882
# ignore ICMP broadcast (smurf attack)
1868
# ignore ICMP broadcast (smurf attack)
1883
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1869
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1884
# ignore ICMP errors bogus
1870
# ignore ICMP errors bogus
1885
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1871
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1886
# remove ICMP redirects responces
1872
# remove ICMP redirects responces
1887
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1873
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1888
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1874
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1889
# enable SYN Cookies (Syn flood attacks)
1875
# enable SYN Cookies (Syn flood attacks)
1890
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1876
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1891
# enable kernel antispoofing
1877
# enable kernel antispoofing
1892
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1878
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1893
# ignore source routing
1879
# ignore source routing
1894
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1880
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1895
# set conntrack timer to 1h (3600s) instead of 5 weeks
1881
# set conntrack timer to 1h (3600s) instead of 5 weeks
1896
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1882
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1897
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1883
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1898
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1884
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1899
# remove Magic SysReq Keys
1885
# remove Magic SysReq Keys
1900
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1886
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1901
# switch to multi-users runlevel (instead of x11)
1887
# switch to multi-users runlevel (instead of x11)
1902
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1888
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1903
#	GRUB modifications
1889
#	GRUB modifications
1904
# limit wait time to 3s
1890
# limit wait time to 3s
1905
# create an alcasar entry instead of linux-nonfb
1891
# create an alcasar entry instead of linux-nonfb
1906
# change display to 1024*768 (vga791)
1892
# change display to 1024*768 (vga791)
1907
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1893
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1908
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1894
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1909
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1895
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1910
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1896
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1911
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1897
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1912
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1898
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1913
# Remove unused services and users
1899
# Remove unused services and users
1914
	for svc in sshd
1900
	for svc in sshd
1915
	do
1901
	do
1916
		/bin/systemctl -q disable $svc.service
1902
		/bin/systemctl -q disable $svc.service
1917
	done
1903
	done
1918
# Load and apply the previous conf file
1904
# Load and apply the previous conf file
1919
	if [ "$mode" = "update" ]
1905
	if [ "$mode" = "update" ]
1920
	then
1906
	then
1921
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1907
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1922
		$DIR_DEST_BIN/alcasar-conf.sh --load
1908
		$DIR_DEST_BIN/alcasar-conf.sh --load
1923
		PARENT_SCRIPT=`basename $0`
1909
		PARENT_SCRIPT=`basename $0`
1924
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1910
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1925
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1911
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1926
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1912
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1927
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1913
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1928
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1914
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1929
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1915
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1930
		then
1916
		then
1931
			header_install
1917
			header_install
1932
			if [ $Lang == "fr" ]
1918
			if [ $Lang == "fr" ]
1933
			then 
1919
			then 
1934
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1920
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1935
				echo
1921
				echo
1936
				echo -n "Nom : "
1922
				echo -n "Nom : "
1937
			else
1923
			else
1938
				echo "This update need to redefine the first admin account"
1924
				echo "This update need to redefine the first admin account"
1939
				echo
1925
				echo
1940
				echo -n "Account : "
1926
				echo -n "Account : "
1941
			fi
1927
			fi
1942
			read admin_portal
1928
			read admin_portal
1943
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1929
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1944
			mkdir -p $DIR_DEST_ETC/digest
1930
			mkdir -p $DIR_DEST_ETC/digest
1945
			chmod 755 $DIR_DEST_ETC/digest
1931
			chmod 755 $DIR_DEST_ETC/digest
1946
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1932
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1947
			do
1933
			do
1948
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1934
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1949
			done
1935
			done
1950
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1936
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1951
		fi
1937
		fi
1952
	fi
1938
	fi
1953
	rm -f /tmp/alcasar-conf*
1939
	rm -f /tmp/alcasar-conf*
1954
	chown -R root:apache $DIR_DEST_ETC/*
1940
	chown -R root:apache $DIR_DEST_ETC/*
1955
	chmod -R 660 $DIR_DEST_ETC/*
1941
	chmod -R 660 $DIR_DEST_ETC/*
1956
	chmod ug+x $DIR_DEST_ETC/digest
1942
	chmod ug+x $DIR_DEST_ETC/digest
1957
# Apply and save the firewall rules
1943
# Apply and save the firewall rules
1958
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1944
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1959
	sleep 2
1945
	sleep 2
1960
	cd $DIR_INSTALL
1946
	cd $DIR_INSTALL
1961
	echo ""
1947
	echo ""
1962
	echo "#############################################################################"
1948
	echo "#############################################################################"
1963
	if [ $Lang == "fr" ]
1949
	if [ $Lang == "fr" ]
1964
		then
1950
		then
1965
		echo "#                        Fin d'installation d'ALCASAR                       #"
1951
		echo "#                        Fin d'installation d'ALCASAR                       #"
1966
		echo "#                                                                           #"
1952
		echo "#                                                                           #"
1967
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1953
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1968
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1954
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1969
		echo "#                                                                           #"
1955
		echo "#                                                                           #"
1970
		echo "#############################################################################"
1956
		echo "#############################################################################"
1971
		echo
1957
		echo
1972
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1958
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1973
		echo
1959
		echo
1974
		echo "- Lisez attentivement la documentation d'exploitation"
1960
		echo "- Lisez attentivement la documentation d'exploitation"
1975
		echo
1961
		echo
1976
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1962
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1977
		echo
1963
		echo
1978
		echo "                   Appuyez sur 'Entrée' pour continuer"
1964
		echo "                   Appuyez sur 'Entrée' pour continuer"
1979
	else	
1965
	else	
1980
		echo "#                        Enf of ALCASAR install process                     #"
1966
		echo "#                        Enf of ALCASAR install process                     #"
1981
		echo "#                                                                           #"
1967
		echo "#                                                                           #"
1982
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1968
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1983
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1969
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1984
		echo "#                                                                           #"
1970
		echo "#                                                                           #"
1985
		echo "#############################################################################"
1971
		echo "#############################################################################"
1986
		echo
1972
		echo
1987
		echo "- The system will be rebooted in order to operate ALCASAR"
1973
		echo "- The system will be rebooted in order to operate ALCASAR"
1988
		echo
1974
		echo
1989
		echo "- Read the exploitation documentation"
1975
		echo "- Read the exploitation documentation"
1990
		echo
1976
		echo
1991
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
1977
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
1992
		echo
1978
		echo
1993
		echo "                   Hit 'Enter' to continue"
1979
		echo "                   Hit 'Enter' to continue"
1994
	fi
1980
	fi
1995
	sleep 2
1981
	sleep 2
1996
	if [ "$mode" != "update" ]
1982
	if [ "$mode" != "update" ]
1997
	then
1983
	then
1998
		read a
1984
		read a
1999
	fi
1985
	fi
2000
	clear
1986
	clear
2001
	reboot
1987
	reboot
2002
} # End post_install ()
1988
} # End post_install ()
2003
 
1989
 
2004
#################################
1990
#################################
2005
#  	Main Install loop  	#
1991
#  	Main Install loop  	#
2006
#################################
1992
#################################
2007
dir_exec=`dirname "$0"`
1993
dir_exec=`dirname "$0"`
2008
if [ $dir_exec != "." ]
1994
if [ $dir_exec != "." ]
2009
then
1995
then
2010
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
1996
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2011
	echo "Launch this program from the ALCASAR archive directory"
1997
	echo "Launch this program from the ALCASAR archive directory"
2012
	exit 0
1998
	exit 0
2013
fi
1999
fi
2014
VERSION=`cat $DIR_INSTALL/VERSION`
2000
VERSION=`cat $DIR_INSTALL/VERSION`
2015
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2001
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2016
nb_args=$#
2002
nb_args=$#
2017
args=$1
2003
args=$1
2018
if [ $nb_args -eq 0 ]
2004
if [ $nb_args -eq 0 ]
2019
then
2005
then
2020
	nb_args=1
2006
	nb_args=1
2021
	args="-h"
2007
	args="-h"
2022
fi
2008
fi
2023
chmod -R u+x $DIR_SCRIPTS/*
2009
chmod -R u+x $DIR_SCRIPTS/*
2024
case $args in
2010
case $args in
2025
	-\? | -h* | --h*)
2011
	-\? | -h* | --h*)
2026
		echo "$usage"
2012
		echo "$usage"
2027
		exit 0
2013
		exit 0
2028
		;;
2014
		;;
2029
	-i | --install)
2015
	-i | --install)
2030
		license
2016
		license
2031
		header_install
2017
		header_install
2032
		testing
2018
		testing
2033
# RPMs install
2019
# RPMs install
2034
		$DIR_SCRIPTS/alcasar-urpmi.sh
2020
		$DIR_SCRIPTS/alcasar-urpmi.sh
2035
		if [ "$?" != "0" ]
2021
		if [ "$?" != "0" ]
2036
		then
2022
		then
2037
			exit 0
2023
			exit 0
2038
		fi
2024
		fi
2039
		if [ -e $CONF_FILE ]
2025
		if [ -e $CONF_FILE ]
2040
		then
2026
		then
2041
# Uninstall the running version
2027
# Uninstall the running version
2042
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2028
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2043
		fi
2029
		fi
2044
# Test if manual update	
2030
# Test if manual update	
2045
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2031
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2046
		then
2032
		then
2047
			header_install
2033
			header_install
2048
			if [ $Lang == "fr" ]
2034
			if [ $Lang == "fr" ]
2049
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2035
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2050
				else echo "The configuration file of an old version has been found";
2036
				else echo "The configuration file of an old version has been found";
2051
			fi
2037
			fi
2052
			response=0
2038
			response=0
2053
			PTN='^[oOnNyY]$'
2039
			PTN='^[oOnNyY]$'
2054
			until [[ $(expr $response : $PTN) -gt 0 ]]
2040
			until [[ $(expr $response : $PTN) -gt 0 ]]
2055
			do
2041
			do
2056
				if [ $Lang == "fr" ]
2042
				if [ $Lang == "fr" ]
2057
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2043
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2058
					else echo -n "Do you want to use it (Y/n)?";
2044
					else echo -n "Do you want to use it (Y/n)?";
2059
				 fi
2045
				 fi
2060
				read response
2046
				read response
2061
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2047
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2062
				then rm -f /tmp/alcasar-conf*
2048
				then rm -f /tmp/alcasar-conf*
2063
				fi
2049
				fi
2064
			done
2050
			done
2065
		fi
2051
		fi
2066
# Test if update
2052
# Test if update
2067
		if [ -e /tmp/alcasar-conf* ] 
2053
		if [ -e /tmp/alcasar-conf* ] 
2068
		then
2054
		then
2069
			if [ $Lang == "fr" ]
2055
			if [ $Lang == "fr" ]
2070
				then echo "#### Installation avec mise à jour ####";
2056
				then echo "#### Installation avec mise à jour ####";
2071
				else echo "#### Installation with update     ####";
2057
				else echo "#### Installation with update     ####";
2072
			fi
2058
			fi
2073
# Extract the central configuration file
2059
# Extract the central configuration file
2074
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2060
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2075
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2061
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2076
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2062
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2077
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2063
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2078
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2064
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2079
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2065
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2080
			mode="update"
2066
			mode="update"
2081
		fi
2067
		fi
2082
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen dnsmasq BL cron fail2ban gammu_smsd post_install
2068
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen dnsmasq BL cron fail2ban gammu_smsd post_install
2083
		do
2069
		do
2084
			$func
2070
			$func
2085
# echo "*** 'debug' : end of function $func ***"; read a
2071
# echo "*** 'debug' : end of function $func ***"; read a
2086
		done
2072
		done
2087
		;;
2073
		;;
2088
	-u | --uninstall)
2074
	-u | --uninstall)
2089
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2075
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2090
		then
2076
		then
2091
			if [ $Lang == "fr" ]
2077
			if [ $Lang == "fr" ]
2092
				then echo "ALCASAR n'est pas installé!";
2078
				then echo "ALCASAR n'est pas installé!";
2093
				else echo "ALCASAR isn't installed!";
2079
				else echo "ALCASAR isn't installed!";
2094
			fi
2080
			fi
2095
			exit 0
2081
			exit 0
2096
		fi
2082
		fi
2097
		response=0
2083
		response=0
2098
		PTN='^[oOnN]$'
2084
		PTN='^[oOnN]$'
2099
		until [[ $(expr $response : $PTN) -gt 0 ]]
2085
		until [[ $(expr $response : $PTN) -gt 0 ]]
2100
		do
2086
		do
2101
			if [ $Lang == "fr" ]
2087
			if [ $Lang == "fr" ]
2102
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2088
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2103
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2089
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2104
			fi
2090
			fi
2105
			read response
2091
			read response
2106
		done
2092
		done
2107
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2093
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2108
		then
2094
		then
2109
			$DIR_SCRIPTS/alcasar-conf.sh --create
2095
			$DIR_SCRIPTS/alcasar-conf.sh --create
2110
		else	
2096
		else	
2111
			rm -f /tmp/alcasar-conf*
2097
			rm -f /tmp/alcasar-conf*
2112
		fi
2098
		fi
2113
# Uninstall the running version
2099
# Uninstall the running version
2114
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2100
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2115
		;;
2101
		;;
2116
	*)
2102
	*)
2117
		echo "Argument inconnu :$1";
2103
		echo "Argument inconnu :$1";
2118
		echo "Unknown argument :$1";
2104
		echo "Unknown argument :$1";
2119
		echo "$usage"
2105
		echo "$usage"
2120
		exit 1
2106
		exit 1
2121
		;;
2107
		;;
2122
esac
2108
esac
2123
# end of script
2109
# end of script
2124
 
2110
 
2125
 
2111