Subversion Repositories ALCASAR

Rev

Rev 1610 | Rev 1631 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1610 Rev 1613
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 1610 2015-04-06 16:21:59Z franck $ 
2
#  $Id: alcasar.sh 1613 2015-04-07 12:14:12Z franck $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
23
 
23
 
24
# Options :
24
# Options :
25
#       -i or --install
25
#       -i or --install
26
#       -u or --uninstall
26
#       -u or --uninstall
27
 
27
 
28
# Functions :
28
# Functions :
29
#	testing			: connectivity tests, free space test and mageia version test
29
#	testing			: connectivity tests, free space test and mageia version test
30
#	init			: Installation of RPM and scripts
30
#	init			: Installation of RPM and scripts
31
#	network			: Network parameters
31
#	network			: Network parameters
32
#	ACC			: ALCASAR Control Center installation
32
#	ACC			: ALCASAR Control Center installation
33
#	CA			: Certification Authority initialization
33
#	CA			: Certification Authority initialization
34
#	init_db			: Initilization of radius database managed with MariaDB
34
#	init_db			: Initilization of radius database managed with MariaDB
35
#	radius			: FreeRadius initialisation
35
#	radius			: FreeRadius initialisation
36
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
36
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
37
#	chilli			: coovachilli initialisation (+authentication page)
37
#	chilli			: coovachilli initialisation (+authentication page)
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	antivirus		: HAVP + libclamav configuration
39
#	antivirus		: HAVP + libclamav configuration
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	vnstat			: little network stat daemon
44
#	vnstat			: little network stat daemon
45
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
46
#	cron			: Logs export + watchdog + connexion statistics
46
#	cron			: Logs export + watchdog + connexion statistics
47
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	fail2ban		: Fail2ban IDS installation and configuration
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
49
#	post_install		: Security, log rotation, etc.
49
#	post_install		: Security, log rotation, etc.
50
 
50
 
51
DATE=`date '+%d %B %Y - %Hh%M'`
51
DATE=`date '+%d %B %Y - %Hh%M'`
52
DATE_SHORT=`date '+%d/%m/%Y'`
52
DATE_SHORT=`date '+%d/%m/%Y'`
53
Lang=`echo $LANG|cut -c 1-2`
53
Lang=`echo $LANG|cut -c 1-2`
54
mode="install"
54
mode="install"
55
# ******* Files parameters - paramètres fichiers *********
55
# ******* Files parameters - paramètres fichiers *********
56
DIR_INSTALL=`pwd`				# current directory 
56
DIR_INSTALL=`pwd`				# current directory 
57
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
57
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
58
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
58
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
59
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
59
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
60
DIR_WEB="/var/www/html"				# directory of APACHE
60
DIR_WEB="/var/www/html"				# directory of APACHE
61
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
61
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
62
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
62
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
63
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
63
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
64
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
64
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
65
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
65
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
66
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
66
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
67
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
67
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
68
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
68
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
69
# ******* DBMS parameters - paramètres SGBD ********
69
# ******* DBMS parameters - paramètres SGBD ********
70
DB_RADIUS="radius"				# database name used by FreeRadius server
70
DB_RADIUS="radius"				# database name used by FreeRadius server
71
DB_USER="radius"				# user name allows to request the users database
71
DB_USER="radius"				# user name allows to request the users database
72
DB_GAMMU="gammu"				# database name used by Gammu-smsd
72
DB_GAMMU="gammu"				# database name used by Gammu-smsd
73
# ******* Network parameters - paramètres réseau *******
73
# ******* Network parameters - paramètres réseau *******
74
HOSTNAME="alcasar"				# default hostname
74
HOSTNAME="alcasar"				# default hostname
75
DOMAIN="localdomain"				# default local domain
75
DOMAIN="localdomain"				# default local domain
76
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
76
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
77
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
77
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
78
MTU="1500"
78
MTU="1500"
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
80
# ****** Paths - chemin des commandes *******
80
# ****** Paths - chemin des commandes *******
81
SED="/bin/sed -i"
81
SED="/bin/sed -i"
82
# ****************** End of global parameters *********************
82
# ****************** End of global parameters *********************
83
 
83
 
84
license ()
84
license ()
85
{
85
{
86
	if [ $Lang == "fr" ]
86
	if [ $Lang == "fr" ]
87
	then
87
	then
88
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
88
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
89
	else
89
	else
90
		cat $DIR_INSTALL/gpl-warning.txt | more
90
		cat $DIR_INSTALL/gpl-warning.txt | more
91
	fi
91
	fi
92
	response=0
92
	response=0
93
	PTN='^[oOyYnN]$'
93
	PTN='^[oOyYnN]$'
94
	until [[ $(expr $response : $PTN) -gt 0 ]]
94
	until [[ $(expr $response : $PTN) -gt 0 ]]
95
	do
95
	do
96
		if [ $Lang == "fr" ]
96
		if [ $Lang == "fr" ]
97
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
97
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
98
			else echo -n "Do you accept the terms of this license (Y/n)? : "
98
			else echo -n "Do you accept the terms of this license (Y/n)? : "
99
		fi
99
		fi
100
		read response
100
		read response
101
	done
101
	done
102
	if [ "$response" = "n" ] || [ "$response" = "N" ]
102
	if [ "$response" = "n" ] || [ "$response" = "N" ]
103
	then
103
	then
104
		exit 1
104
		exit 1
105
	fi
105
	fi
106
}
106
}
107
 
107
 
108
header_install ()
108
header_install ()
109
{
109
{
110
	clear
110
	clear
111
	echo "-----------------------------------------------------------------------------"
111
	echo "-----------------------------------------------------------------------------"
112
	echo "                     ALCASAR V$VERSION Installation"
112
	echo "                     ALCASAR V$VERSION Installation"
113
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
113
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
114
	echo "-----------------------------------------------------------------------------"
114
	echo "-----------------------------------------------------------------------------"
115
}
115
}
116
 
116
 
117
##################################################################
117
##################################################################
118
##			Function "testing"			##
118
##			Function "testing"			##
119
## - Test of Mageia version					##
119
## - Test of Mageia version					##
120
## - Test of ALCASAR version (if already installed)		##
120
## - Test of ALCASAR version (if already installed)		##
121
## - Test of free space on /var  (>10G)				##
121
## - Test of free space on /var  (>10G)				##
122
## - Test of Internet access					##
122
## - Test of Internet access					##
123
##################################################################
123
##################################################################
124
testing ()
124
testing ()
125
{
125
{
126
# Test of Mageia version
126
# Test of Mageia version
127
# extract the current Mageia version and hardware architecture (i586 ou X64)
127
# extract the current Mageia version and hardware architecture (i586 ou X64)
128
	fic=`cat /etc/product.id`
128
	fic=`cat /etc/product.id`
129
	unknown_os=0
129
	unknown_os=0
130
	old="$IFS"
130
	old="$IFS"
131
	IFS=","
131
	IFS=","
132
	set $fic
132
	set $fic
133
	for i in $*
133
	for i in $*
134
	do
134
	do
135
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
135
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
136
			then 
136
			then 
137
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
137
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
138
			unknown_os=`expr $unknown_os + 1`
138
			unknown_os=`expr $unknown_os + 1`
139
		fi
139
		fi
140
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
140
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
141
			then 
141
			then 
142
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
142
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
143
			unknown_os=`expr $unknown_os + 1`
143
			unknown_os=`expr $unknown_os + 1`
144
		fi
144
		fi
145
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
145
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
146
			then 
146
			then 
147
			ARCH=`echo $i|cut -d"=" -f2`
147
			ARCH=`echo $i|cut -d"=" -f2`
148
			unknown_os=`expr $unknown_os + 1`
148
			unknown_os=`expr $unknown_os + 1`
149
		fi
149
		fi
150
	done
150
	done
151
	IFS="$old"
151
	IFS="$old"
152
# Test if ALCASAR is already installed
152
# Test if ALCASAR is already installed
153
	if [ -e $CONF_FILE ]
153
	if [ -e $CONF_FILE ]
154
	then
154
	then
155
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
155
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
156
		if [ $Lang == "fr" ]
156
		if [ $Lang == "fr" ]
157
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
157
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
158
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
158
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
159
		fi
159
		fi
160
		response=0
160
		response=0
161
		PTN='^[oOnNyY]$'
161
		PTN='^[oOnNyY]$'
162
		until [[ $(expr $response : $PTN) -gt 0 ]]
162
		until [[ $(expr $response : $PTN) -gt 0 ]]
163
		do
163
		do
164
			if [ $Lang == "fr" ]
164
			if [ $Lang == "fr" ]
165
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
165
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
166
				else echo -n "Do you want to update (Y/n)?";
166
				else echo -n "Do you want to update (Y/n)?";
167
			 fi
167
			 fi
168
			read response
168
			read response
169
		done
169
		done
170
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
170
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
171
		then
171
		then
172
			rm -f /tmp/alcasar-conf*
172
			rm -f /tmp/alcasar-conf*
173
		else
173
		else
174
# Create the current conf file
174
# Create the current conf file
175
			$DIR_SCRIPTS/alcasar-conf.sh --create
175
			$DIR_SCRIPTS/alcasar-conf.sh --create
176
			mode="update"
176
			mode="update"
177
		fi
177
		fi
178
	fi
178
	fi
179
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
179
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
180
		then
180
		then
181
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
181
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
182
			then
182
			then
183
			echo
183
			echo
184
			if [ $Lang == "fr" ]
184
			if [ $Lang == "fr" ]
185
				then	
185
				then	
186
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
186
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
187
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
187
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
188
				echo "2 - Installez Linux-Mageia 4.1 (cf. doc d'installation)"
188
				echo "2 - Installez Linux-Mageia 4.1 (cf. doc d'installation)"
189
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
189
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
190
			else
190
			else
191
				echo "The automatic update of ALCASAR can't be performed."
191
				echo "The automatic update of ALCASAR can't be performed."
192
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
192
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
193
				echo "2 - Install Linux-Mageia 4.1 (cf. installation doc)"
193
				echo "2 - Install Linux-Mageia 4.1 (cf. installation doc)"
194
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
194
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
195
			fi
195
			fi
196
		else
196
		else
197
			if [ $Lang == "fr" ]
197
			if [ $Lang == "fr" ]
198
				then	
198
				then	
199
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
199
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
200
			else
200
			else
201
				echo "The installation of ALCASAR can't be performed."
201
				echo "The installation of ALCASAR can't be performed."
202
			fi
202
			fi
203
		fi
203
		fi
204
		echo
204
		echo
205
		if [ $Lang == "fr" ]
205
		if [ $Lang == "fr" ]
206
			then	
206
			then	
207
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
207
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
208
		else
208
		else
209
			echo "The OS must be replaced (Mageia4.1)"
209
			echo "The OS must be replaced (Mageia4.1)"
210
		fi
210
		fi
211
		exit 0
211
		exit 0
212
	fi
212
	fi
213
	if [ ! -d /var/log/netflow/porttracker ]
213
	if [ ! -d /var/log/netflow/porttracker ]
214
		then
214
		then
215
# Test of free space on /var
215
# Test of free space on /var
216
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
216
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
217
		if [ $free_space -lt 10 ]
217
		if [ $free_space -lt 10 ]
218
			then
218
			then
219
			if [ $Lang == "fr" ]
219
			if [ $Lang == "fr" ]
220
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
220
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
221
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
221
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
222
			fi
222
			fi
223
		exit 0
223
		exit 0
224
		fi
224
		fi
225
	fi
225
	fi
226
	if [ $Lang == "fr" ]
226
	if [ $Lang == "fr" ]
227
		then echo -n "Tests des paramètres réseau : "
227
		then echo -n "Tests des paramètres réseau : "
228
		else echo -n "Network parameters tests : "
228
		else echo -n "Network parameters tests : "
229
	fi
229
	fi
230
# Test of Ethernet links state
230
# Test of Ethernet links state
231
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
231
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
232
	for i in $DOWN_IF
232
	for i in $DOWN_IF
233
	do
233
	do
234
		if [ $Lang == "fr" ]
234
		if [ $Lang == "fr" ]
235
		then 
235
		then 
236
			echo "Échec"
236
			echo "Échec"
237
			echo "Le lien réseau de la carte $i n'est pas actif."
237
			echo "Le lien réseau de la carte $i n'est pas actif."
238
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
238
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
239
		else
239
		else
240
			echo "Failed"
240
			echo "Failed"
241
			echo "The link state of $i interface is down."
241
			echo "The link state of $i interface is down."
242
			echo "Make sure that this network card is connected to a switch or an A.P."
242
			echo "Make sure that this network card is connected to a switch or an A.P."
243
		fi
243
		fi
244
		exit 0
244
		exit 0
245
	done
245
	done
246
	echo -n "."
246
	echo -n "."
247
 
247
 
248
# Test EXTIF config files
248
# Test EXTIF config files
249
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
249
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
250
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
250
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
251
	PUBLIC_GATEWAY=`ip route list|grep ^default|cut -d" " -f3`
251
	PUBLIC_GATEWAY=`ip route list|grep ^default|cut -d" " -f3`
252
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
252
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
253
	then
253
	then
254
		if [ $Lang == "fr" ]
254
		if [ $Lang == "fr" ]
255
		then 
255
		then 
256
			echo "Échec"
256
			echo "Échec"
257
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
257
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
258
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
258
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
259
			echo "Appliquez les changements : 'systemctl restart network'"
259
			echo "Appliquez les changements : 'systemctl restart network'"
260
		else
260
		else
261
			echo "Failed"
261
			echo "Failed"
262
			echo "The Internet connected network card ($EXTIF) isn't well configured."
262
			echo "The Internet connected network card ($EXTIF) isn't well configured."
263
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
263
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
264
			echo "Apply the new configuration 'systemctl restart network'"
264
			echo "Apply the new configuration 'systemctl restart network'"
265
		fi
265
		fi
266
		echo "DEVICE=$EXTIF"
266
		echo "DEVICE=$EXTIF"
267
		echo "IPADDR="
267
		echo "IPADDR="
268
		echo "NETMASK="
268
		echo "NETMASK="
269
		echo "GATEWAY="
269
		echo "GATEWAY="
270
		echo "DNS1="
270
		echo "DNS1="
271
		echo "DNS2="
271
		echo "DNS2="
272
		echo "ONBOOT=yes"
272
		echo "ONBOOT=yes"
273
		exit 0
273
		exit 0
274
	fi
274
	fi
275
	echo -n "."
275
	echo -n "."
276
 
276
 
277
# Test if router is alive (Box FAI)
277
# Test if router is alive (Box FAI)
278
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
278
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
279
		if [ $Lang == "fr" ]
279
		if [ $Lang == "fr" ]
280
		then 
280
		then 
281
			echo "Échec"
281
			echo "Échec"
282
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
282
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
283
			echo "Réglez ce problème puis relancez ce script."
283
			echo "Réglez ce problème puis relancez ce script."
284
		else
284
		else
285
			echo "Failed"
285
			echo "Failed"
286
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
286
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
287
			echo "Resolv this problem, then restart this script."
287
			echo "Resolv this problem, then restart this script."
288
		fi
288
		fi
289
		exit 0
289
		exit 0
290
	fi
290
	fi
291
	echo -n "."
291
	echo -n "."
292
# On teste le lien vers le routeur par defaut
292
# On teste le lien vers le routeur par defaut
293
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
293
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
294
	if [ $(expr $arp_reply) -eq 0 ]
294
	if [ $(expr $arp_reply) -eq 0 ]
295
	       	then
295
	       	then
296
		if [ $Lang == "fr" ]
296
		if [ $Lang == "fr" ]
297
		then 
297
		then 
298
			echo "Échec"
298
			echo "Échec"
299
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
299
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
300
			echo "Réglez ce problème puis relancez ce script."
300
			echo "Réglez ce problème puis relancez ce script."
301
		else
301
		else
302
			echo "Failed"
302
			echo "Failed"
303
			echo "The Internet gateway doesn't answered"
303
			echo "The Internet gateway doesn't answered"
304
			echo "Resolv this problem, then restart this script."
304
			echo "Resolv this problem, then restart this script."
305
		fi
305
		fi
306
		exit 0
306
		exit 0
307
	fi
307
	fi
308
	echo -n "."
308
	echo -n "."
309
# On teste la connectivité Internet
309
# On teste la connectivité Internet
310
	rm -rf /tmp/con_ok.html
310
	rm -rf /tmp/con_ok.html
311
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
311
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
312
	if [ ! -e /tmp/con_ok.html ]
312
	if [ ! -e /tmp/con_ok.html ]
313
	then
313
	then
314
		if [ $Lang == "fr" ]
314
		if [ $Lang == "fr" ]
315
		then 
315
		then 
316
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
316
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
317
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
317
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
318
			echo "Vérifiez la validité des adresses IP des DNS."
318
			echo "Vérifiez la validité des adresses IP des DNS."
319
		else
319
		else
320
			echo "The Internet connection try failed (google.fr)."
320
			echo "The Internet connection try failed (google.fr)."
321
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
321
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
322
			echo "Verify the DNS IP addresses"
322
			echo "Verify the DNS IP addresses"
323
		fi
323
		fi
324
		exit 0
324
		exit 0
325
	fi
325
	fi
326
	rm -rf /tmp/con_ok.html
326
	rm -rf /tmp/con_ok.html
327
	echo ". : ok"
327
	echo ". : ok"
328
} # end of testing ()
328
} # end of testing ()
329
 
329
 
330
##################################################################
330
##################################################################
331
##			Function "init"				##
331
##			Function "init"				##
332
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
332
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
333
## - Installation et modification des scripts du portail	##
333
## - Installation et modification des scripts du portail	##
334
##################################################################
334
##################################################################
335
init ()
335
init ()
336
{
336
{
337
	if [ "$mode" != "update" ]
337
	if [ "$mode" != "update" ]
338
	then
338
	then
339
# On affecte le nom d'organisme
339
# On affecte le nom d'organisme
340
		header_install
340
		header_install
341
		ORGANISME=!
341
		ORGANISME=!
342
		PTN='^[a-zA-Z0-9-]*$'
342
		PTN='^[a-zA-Z0-9-]*$'
343
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
343
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
344
                do
344
                do
345
			if [ $Lang == "fr" ]
345
			if [ $Lang == "fr" ]
346
			       	then echo -n "Entrez le nom de votre organisme : "
346
			       	then echo -n "Entrez le nom de votre organisme : "
347
				else echo -n "Enter the name of your organism : "
347
				else echo -n "Enter the name of your organism : "
348
			fi
348
			fi
349
			read ORGANISME
349
			read ORGANISME
350
			if [ "$ORGANISME" == "" ]
350
			if [ "$ORGANISME" == "" ]
351
				then
351
				then
352
				ORGANISME=!
352
				ORGANISME=!
353
			fi
353
			fi
354
		done
354
		done
355
	fi
355
	fi
356
# On crée aléatoirement les mots de passe et les secrets partagés
356
# On crée aléatoirement les mots de passe et les secrets partagés
357
	rm -f $PASSWD_FILE
357
	rm -f $PASSWD_FILE
358
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
358
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
359
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
359
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
360
	echo "$grubpwd" >> $PASSWD_FILE
360
	echo "$grubpwd" >> $PASSWD_FILE
361
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
361
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
362
	$SED "/^password.*/d" /boot/grub/menu.lst
362
	$SED "/^password.*/d" /boot/grub/menu.lst
363
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
363
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
364
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
364
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
365
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
365
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
366
	echo "root / $mysqlpwd" >> $PASSWD_FILE
366
	echo "root / $mysqlpwd" >> $PASSWD_FILE
367
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
367
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
368
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
368
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
369
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
369
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
370
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
370
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
371
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
371
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
372
	echo "$secretuam" >> $PASSWD_FILE
372
	echo "$secretuam" >> $PASSWD_FILE
373
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
373
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
374
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
374
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
375
	echo "$secretradius" >> $PASSWD_FILE
375
	echo "$secretradius" >> $PASSWD_FILE
376
	chmod 640 $PASSWD_FILE
376
	chmod 640 $PASSWD_FILE
377
# Scripts and conf files copy 
377
# Scripts and conf files copy 
378
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
378
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
379
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
379
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
380
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
380
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
381
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
381
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
382
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
382
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
383
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
383
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
384
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
384
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
385
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
385
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
386
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
386
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
387
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
387
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
388
# generate central conf file
388
# generate central conf file
389
	cat <<EOF > $CONF_FILE
389
	cat <<EOF > $CONF_FILE
390
##########################################
390
##########################################
391
##                                      ##
391
##                                      ##
392
##          ALCASAR Parameters          ##
392
##          ALCASAR Parameters          ##
393
##                                      ##
393
##                                      ##
394
##########################################
394
##########################################
395
 
395
 
396
INSTALL_DATE=$DATE
396
INSTALL_DATE=$DATE
397
VERSION=$VERSION
397
VERSION=$VERSION
398
ORGANISM=$ORGANISME
398
ORGANISM=$ORGANISME
399
DOMAIN=$DOMAIN
399
DOMAIN=$DOMAIN
400
EOF
400
EOF
401
	chmod o-rwx $CONF_FILE
401
	chmod o-rwx $CONF_FILE
402
} # End of init ()
402
} # End of init ()
403
 
403
 
404
##################################################################
404
##################################################################
405
##			Function "network"			##
405
##			Function "network"			##
406
## - Définition du plan d'adressage du réseau de consultation	##
406
## - Définition du plan d'adressage du réseau de consultation	##
407
## - Nommage DNS du système 					##
407
## - Nommage DNS du système 					##
408
## - Configuration de l'interface INTIF (réseau de consultation)##
408
## - Configuration de l'interface INTIF (réseau de consultation)##
409
## - Modification du fichier /etc/hosts				##
409
## - Modification du fichier /etc/hosts				##
410
## - Configuration du serveur de temps (NTP)			##
410
## - Configuration du serveur de temps (NTP)			##
411
## - Renseignement des fichiers hosts.allow et hosts.deny	##
411
## - Renseignement des fichiers hosts.allow et hosts.deny	##
412
##################################################################
412
##################################################################
413
network ()
413
network ()
414
{
414
{
415
	header_install
415
	header_install
416
	if [ "$mode" != "update" ]
416
	if [ "$mode" != "update" ]
417
		then
417
		then
418
		if [ $Lang == "fr" ]
418
		if [ $Lang == "fr" ]
419
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
419
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
420
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
420
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
421
		fi
421
		fi
422
		response=0
422
		response=0
423
		PTN='^[oOyYnN]$'
423
		PTN='^[oOyYnN]$'
424
		until [[ $(expr $response : $PTN) -gt 0 ]]
424
		until [[ $(expr $response : $PTN) -gt 0 ]]
425
		do
425
		do
426
			if [ $Lang == "fr" ]
426
			if [ $Lang == "fr" ]
427
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
427
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
428
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
428
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
429
			fi
429
			fi
430
			read response
430
			read response
431
		done
431
		done
432
		if [ "$response" = "n" ] || [ "$response" = "N" ]
432
		if [ "$response" = "n" ] || [ "$response" = "N" ]
433
		then
433
		then
434
			PRIVATE_IP_MASK="0"
434
			PRIVATE_IP_MASK="0"
435
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
435
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
436
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
436
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
437
			do
437
			do
438
				if [ $Lang == "fr" ]
438
				if [ $Lang == "fr" ]
439
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
439
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
440
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
440
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
441
				fi
441
				fi
442
				read PRIVATE_IP_MASK
442
				read PRIVATE_IP_MASK
443
			done
443
			done
444
		else
444
		else
445
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
445
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
446
		fi
446
		fi
447
	else
447
	else
448
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
448
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
449
		rm -rf conf/etc/alcasar.conf
449
		rm -rf conf/etc/alcasar.conf
450
	fi
450
	fi
451
# Define LAN side global parameters
451
# Define LAN side global parameters
452
	hostname $HOSTNAME.$DOMAIN
452
	hostname $HOSTNAME.$DOMAIN
453
	echo $HOSTNAME.$DOMAIN > /etc/hostname
453
	echo $HOSTNAME.$DOMAIN > /etc/hostname
454
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
454
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
455
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
455
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
456
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
456
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
457
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
457
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
458
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
458
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
459
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
459
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
460
		then
460
		then
461
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
461
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
462
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
462
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
463
	fi	
463
	fi	
464
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
464
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
465
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
465
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
466
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
466
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
467
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
467
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
468
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
468
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
469
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
469
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
470
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
470
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
471
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
471
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
472
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
472
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
473
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
473
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
474
# Define Internet parameters
474
# Define Internet parameters
475
	DNS1=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|head -n 1`				# 1st DNS server
475
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
476
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
476
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
477
	if [ $nb_dns == 2 ]
477
	if [ $nb_dns == 2 ]
478
		then
478
		then
479
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
479
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
480
	fi
480
	fi
481
	DNS1=${DNS1:=208.67.220.220}
481
	DNS1=${DNS1:=208.67.220.220}
482
	DNS2=${DNS2:=208.67.222.222}
482
	DNS2=${DNS2:=208.67.222.222}
483
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
483
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
484
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
484
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
485
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
485
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
486
# Wrtie the conf file
486
# Wrtie the conf file
487
	echo "EXTIF=$EXTIF" >> $CONF_FILE
487
	echo "EXTIF=$EXTIF" >> $CONF_FILE
488
	echo "INTIF=$INTIF" >> $CONF_FILE
488
	echo "INTIF=$INTIF" >> $CONF_FILE
489
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
489
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
490
	if [ $IP_SETTING == "dhcp" ]
490
	if [ $IP_SETTING == "dhcp" ]
491
		then
491
		then
492
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
492
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
493
		echo "GW=dhcp" >> $CONF_FILE
493
		echo "GW=dhcp" >> $CONF_FILE
494
	else
494
	else
495
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
495
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
496
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
496
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
497
	fi
497
	fi
498
	echo "DNS1=$DNS1" >> $CONF_FILE
498
	echo "DNS1=$DNS1" >> $CONF_FILE
499
	echo "DNS2=$DNS2" >> $CONF_FILE
499
	echo "DNS2=$DNS2" >> $CONF_FILE
500
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
500
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
501
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
501
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
502
	echo "DHCP=on" >> $CONF_FILE
502
	echo "DHCP=on" >> $CONF_FILE
503
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
503
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
504
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
504
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
505
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
505
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
506
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
506
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
507
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
507
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
508
	echo "INT_DNS_IP=none" >> $CONF_FILE
508
	echo "INT_DNS_IP=none" >> $CONF_FILE
509
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
509
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
510
# network default
510
# network default
511
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
511
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
512
	cat <<EOF > /etc/sysconfig/network
512
	cat <<EOF > /etc/sysconfig/network
513
NETWORKING=yes
513
NETWORKING=yes
514
HOSTNAME="$HOSTNAME.$DOMAIN"
514
HOSTNAME="$HOSTNAME.$DOMAIN"
515
FORWARD_IPV4=true
515
FORWARD_IPV4=true
516
EOF
516
EOF
517
# /etc/hosts config
517
# /etc/hosts config
518
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
518
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
519
	cat <<EOF > /etc/hosts
519
	cat <<EOF > /etc/hosts
520
127.0.0.1	localhost
520
127.0.0.1	localhost
521
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
521
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
522
EOF
522
EOF
523
# EXTIF (Internet) config
523
# EXTIF (Internet) config
524
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
524
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
525
	if [ $IP_SETTING == "dhcp" ]
525
	if [ $IP_SETTING == "dhcp" ]
526
		then
526
		then
527
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
527
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
528
DEVICE=$EXTIF
528
DEVICE=$EXTIF
529
BOOTPROTO=dhcp
529
BOOTPROTO=dhcp
530
DNS1=127.0.0.1
530
DNS1=127.0.0.1
531
PEERDNS=no
531
PEERDNS=no
532
RESOLV_MODS=yes
532
RESOLV_MODS=yes
533
ONBOOT=yes
533
ONBOOT=yes
-
 
534
NOZEROCONF=yes
534
METRIC=10
535
METRIC=10
535
MII_NOT_SUPPORTED=yes
536
MII_NOT_SUPPORTED=yes
536
IPV6INIT=no
537
IPV6INIT=no
537
IPV6TO4INIT=no
538
IPV6TO4INIT=no
538
ACCOUNTING=no
539
ACCOUNTING=no
539
USERCTL=no
540
USERCTL=no
540
MTU=$MTU
541
MTU=$MTU
541
EOF
542
EOF
542
		else	
543
		else	
543
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
544
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
544
DEVICE=$EXTIF
545
DEVICE=$EXTIF
545
BOOTPROTO=static
546
BOOTPROTO=static
546
IPADDR=$PUBLIC_IP
547
IPADDR=$PUBLIC_IP
547
NETMASK=$PUBLIC_NETMASK
548
NETMASK=$PUBLIC_NETMASK
548
GATEWAY=$PUBLIC_GATEWAY
549
GATEWAY=$PUBLIC_GATEWAY
549
DNS1=127.0.0.1
550
DNS1=127.0.0.1
550
RESOLV_MODS=yes
551
RESOLV_MODS=yes
551
ONBOOT=yes
552
ONBOOT=yes
552
METRIC=10
553
METRIC=10
553
NOZEROCONF=yes
554
NOZEROCONF=yes
554
MII_NOT_SUPPORTED=yes
555
MII_NOT_SUPPORTED=yes
555
IPV6INIT=no
556
IPV6INIT=no
556
IPV6TO4INIT=no
557
IPV6TO4INIT=no
557
ACCOUNTING=no
558
ACCOUNTING=no
558
USERCTL=no
559
USERCTL=no
559
MTU=$MTU
560
MTU=$MTU
560
EOF
561
EOF
561
	fi
562
	fi
562
# Config INTIF (consultation LAN) in normal mode
563
# Config INTIF (consultation LAN) in normal mode
563
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
564
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
564
DEVICE=$INTIF
565
DEVICE=$INTIF
565
BOOTPROTO=static
566
BOOTPROTO=static
566
ONBOOT=yes
567
ONBOOT=yes
567
NOZEROCONF=yes
568
NOZEROCONF=yes
568
MII_NOT_SUPPORTED=yes
569
MII_NOT_SUPPORTED=yes
569
IPV6INIT=no
570
IPV6INIT=no
570
IPV6TO4INIT=no
571
IPV6TO4INIT=no
571
ACCOUNTING=no
572
ACCOUNTING=no
572
USERCTL=no
573
USERCTL=no
573
EOF
574
EOF
574
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
575
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
575
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
576
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
576
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
577
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
577
DEVICE=$INTIF
578
DEVICE=$INTIF
578
BOOTPROTO=static
579
BOOTPROTO=static
579
IPADDR=$PRIVATE_IP
580
IPADDR=$PRIVATE_IP
580
NETMASK=$PRIVATE_NETMASK
581
NETMASK=$PRIVATE_NETMASK
581
ONBOOT=yes
582
ONBOOT=yes
582
METRIC=10
583
METRIC=10
583
NOZEROCONF=yes
584
NOZEROCONF=yes
584
MII_NOT_SUPPORTED=yes
585
MII_NOT_SUPPORTED=yes
585
IPV6INIT=no
586
IPV6INIT=no
586
IPV6TO4INIT=no
587
IPV6TO4INIT=no
587
ACCOUNTING=no
588
ACCOUNTING=no
588
USERCTL=no
589
USERCTL=no
589
EOF
590
EOF
590
# Mise à l'heure du serveur
591
# Mise à l'heure du serveur
591
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
592
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
592
	cat <<EOF > /etc/ntp/step-tickers
593
	cat <<EOF > /etc/ntp/step-tickers
593
0.fr.pool.ntp.org	# adapt to your country
594
0.fr.pool.ntp.org	# adapt to your country
594
1.fr.pool.ntp.org
595
1.fr.pool.ntp.org
595
2.fr.pool.ntp.org
596
2.fr.pool.ntp.org
596
EOF
597
EOF
597
# Configuration du serveur de temps (sur lui même)
598
# Configuration du serveur de temps (sur lui même)
598
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
599
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
599
	cat <<EOF > /etc/ntp.conf
600
	cat <<EOF > /etc/ntp.conf
600
server 0.fr.pool.ntp.org	# adapt to your country
601
server 0.fr.pool.ntp.org	# adapt to your country
601
server 1.fr.pool.ntp.org
602
server 1.fr.pool.ntp.org
602
server 2.fr.pool.ntp.org
603
server 2.fr.pool.ntp.org
603
server 127.127.1.0   		# local clock si NTP internet indisponible ...
604
server 127.127.1.0   		# local clock si NTP internet indisponible ...
604
fudge 127.127.1.0 stratum 10
605
fudge 127.127.1.0 stratum 10
605
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
606
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
606
restrict 127.0.0.1
607
restrict 127.0.0.1
607
driftfile /var/lib/ntp/drift
608
driftfile /var/lib/ntp/drift
608
logfile /var/log/ntp.log
609
logfile /var/log/ntp.log
609
disable monitor
610
disable monitor
610
EOF
611
EOF
611
 
612
 
612
	chown -R ntp:ntp /var/lib/ntp
613
	chown -R ntp:ntp /var/lib/ntp
613
# Renseignement des fichiers hosts.allow et hosts.deny
614
# Renseignement des fichiers hosts.allow et hosts.deny
614
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
615
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
615
	cat <<EOF > /etc/hosts.allow
616
	cat <<EOF > /etc/hosts.allow
616
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
617
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
617
sshd: ALL
618
sshd: ALL
618
ntpd: $PRIVATE_NETWORK_SHORT
619
ntpd: $PRIVATE_NETWORK_SHORT
619
EOF
620
EOF
620
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
621
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
621
	cat <<EOF > /etc/hosts.deny
622
	cat <<EOF > /etc/hosts.deny
622
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
623
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
623
EOF
624
EOF
624
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
625
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
625
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
626
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
626
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
627
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
627
# load conntrack ftp module
628
# load conntrack ftp module
628
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
629
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
629
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
630
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
630
# load ipt_NETFLOW module
631
# load ipt_NETFLOW module
631
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
632
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
632
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
633
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
633
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
634
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
634
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
635
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
635
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
636
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
636
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
637
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
637
# 
638
# 
638
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
639
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
639
} # End of network ()
640
} # End of network ()
640
 
641
 
641
##################################################################
642
##################################################################
642
##			Function "ACC"				##
643
##			Function "ACC"				##
643
## - installation du centre de gestion (ALCASAR Control Center)	##
644
## - installation du centre de gestion (ALCASAR Control Center)	##
644
## - configuration du serveur web (Apache)			##
645
## - configuration du serveur web (Apache)			##
645
## - définition du 1er comptes de gestion 			##
646
## - définition du 1er comptes de gestion 			##
646
## - sécurisation des accès					##
647
## - sécurisation des accès					##
647
##################################################################
648
##################################################################
648
ACC ()
649
ACC ()
649
{
650
{
650
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
651
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
651
	mkdir $DIR_WEB
652
	mkdir $DIR_WEB
652
# Copie et configuration des fichiers du centre de gestion
653
# Copie et configuration des fichiers du centre de gestion
653
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
654
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
654
	echo "$VERSION" > $DIR_WEB/VERSION
655
	echo "$VERSION" > $DIR_WEB/VERSION
655
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
656
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
656
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
657
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
657
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
658
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
658
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
659
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
659
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
660
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
660
	chown -R apache:apache $DIR_WEB/*
661
	chown -R apache:apache $DIR_WEB/*
661
# create the backup structure :
662
# create the backup structure :
662
# - base = users database
663
# - base = users database
663
# - archive = tarball of "base + http firewall + netflow"
664
# - archive = tarball of "base + http firewall + netflow"
664
# - security = watchdog disconnection)
665
# - security = watchdog disconnection)
665
	for i in base archive security;
666
	for i in base archive security;
666
	do
667
	do
667
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
668
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
668
	done
669
	done
669
	chown -R root:apache $DIR_SAVE
670
	chown -R root:apache $DIR_SAVE
670
# Configuration et sécurisation php
671
# Configuration et sécurisation php
671
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
672
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
672
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
673
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
673
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
674
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
674
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
675
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
675
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
676
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
676
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
677
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
677
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
678
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
678
# Configuration et sécurisation Apache
679
# Configuration et sécurisation Apache
679
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
680
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
680
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
681
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
681
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
682
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
682
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
683
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
683
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
684
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
684
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
685
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
685
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
686
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
686
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
687
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
687
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
688
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
688
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
689
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
689
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
690
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
690
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
691
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
691
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
692
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
692
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
693
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
693
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
694
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
694
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
695
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
695
# Error page management
696
# Error page management
696
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
697
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
697
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
698
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
698
Alias /error/ "/var/www/html/"
699
Alias /error/ "/var/www/html/"
699
<Directory "/usr/share/httpd/error">
700
<Directory "/usr/share/httpd/error">
700
    AllowOverride None
701
    AllowOverride None
701
    Options IncludesNoExec
702
    Options IncludesNoExec
702
    AddOutputFilter Includes html
703
    AddOutputFilter Includes html
703
    AddHandler type-map var
704
    AddHandler type-map var
704
    Require all granted
705
    Require all granted
705
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
706
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
706
    ForceLanguagePriority Prefer Fallback
707
    ForceLanguagePriority Prefer Fallback
707
</Directory>
708
</Directory>
708
ErrorDocument 400 /error/error.php?error=400
709
ErrorDocument 400 /error/error.php?error=400
709
ErrorDocument 401 /error/error.php?error=401
710
ErrorDocument 401 /error/error.php?error=401
710
ErrorDocument 403 /error/error.php?error=403
711
ErrorDocument 403 /error/error.php?error=403
711
ErrorDocument 404 /error/error.php?error=404
712
ErrorDocument 404 /error/error.php?error=404
712
ErrorDocument 405 /error/error.php?error=405
713
ErrorDocument 405 /error/error.php?error=405
713
ErrorDocument 408 /error/error.php?error=408
714
ErrorDocument 408 /error/error.php?error=408
714
ErrorDocument 410 /error/error.php?error=410
715
ErrorDocument 410 /error/error.php?error=410
715
ErrorDocument 411 /error/error.php?error=411
716
ErrorDocument 411 /error/error.php?error=411
716
ErrorDocument 412 /error/error.php?error=412
717
ErrorDocument 412 /error/error.php?error=412
717
ErrorDocument 413 /error/error.php?error=413
718
ErrorDocument 413 /error/error.php?error=413
718
ErrorDocument 414 /error/error.php?error=414
719
ErrorDocument 414 /error/error.php?error=414
719
ErrorDocument 415 /error/error.php?error=415
720
ErrorDocument 415 /error/error.php?error=415
720
ErrorDocument 500 /error/error.php?error=500
721
ErrorDocument 500 /error/error.php?error=500
721
ErrorDocument 501 /error/error.php?error=501
722
ErrorDocument 501 /error/error.php?error=501
722
ErrorDocument 502 /error/error.php?error=502
723
ErrorDocument 502 /error/error.php?error=502
723
ErrorDocument 503 /error/error.php?error=503
724
ErrorDocument 503 /error/error.php?error=503
724
ErrorDocument 506 /error/error.php?error=506
725
ErrorDocument 506 /error/error.php?error=506
725
EOF
726
EOF
726
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
727
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
727
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
728
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
728
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
729
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
729
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
730
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
730
</body>
731
</body>
731
</html>
732
</html>
732
EOF
733
EOF
733
# Définition du premier compte lié au profil 'admin'
734
# Définition du premier compte lié au profil 'admin'
734
	header_install
735
	header_install
735
	if [ "$mode" = "install" ]
736
	if [ "$mode" = "install" ]
736
	then
737
	then
737
		admin_portal=!
738
		admin_portal=!
738
		PTN='^[a-zA-Z0-9-]*$'
739
		PTN='^[a-zA-Z0-9-]*$'
739
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
740
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
740
                	do
741
                	do
741
			header_install
742
			header_install
742
			if [ $Lang == "fr" ]
743
			if [ $Lang == "fr" ]
743
			then 
744
			then 
744
				echo ""
745
				echo ""
745
				echo "Définissez un premier compte d'administration du portail :"
746
				echo "Définissez un premier compte d'administration du portail :"
746
				echo
747
				echo
747
				echo -n "Nom : "
748
				echo -n "Nom : "
748
			else
749
			else
749
				echo ""
750
				echo ""
750
				echo "Define the first account allow to administrate the portal :"
751
				echo "Define the first account allow to administrate the portal :"
751
				echo
752
				echo
752
				echo -n "Account : "
753
				echo -n "Account : "
753
			fi
754
			fi
754
			read admin_portal
755
			read admin_portal
755
			if [ "$admin_portal" == "" ]
756
			if [ "$admin_portal" == "" ]
756
				then
757
				then
757
				admin_portal=!
758
				admin_portal=!
758
			fi
759
			fi
759
			done
760
			done
760
# Creation of keys file for the admin account ("admin")
761
# Creation of keys file for the admin account ("admin")
761
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
762
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
762
		mkdir -p $DIR_DEST_ETC/digest
763
		mkdir -p $DIR_DEST_ETC/digest
763
		chmod 755 $DIR_DEST_ETC/digest
764
		chmod 755 $DIR_DEST_ETC/digest
764
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
765
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
765
			do
766
			do
766
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
767
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
767
			done
768
			done
768
		$DIR_DEST_SBIN/alcasar-profil.sh --list
769
		$DIR_DEST_SBIN/alcasar-profil.sh --list
769
	fi
770
	fi
770
# synchronisation horaire
771
# synchronisation horaire
771
	ntpd -q -g &
772
	ntpd -q -g &
772
# Sécurisation du centre
773
# Sécurisation du centre
773
	rm -f /etc/httpd/conf/webapps.d/alcasar*
774
	rm -f /etc/httpd/conf/webapps.d/alcasar*
774
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
775
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
775
<Directory $DIR_ACC>
776
<Directory $DIR_ACC>
776
	SSLRequireSSL
777
	SSLRequireSSL
777
	AllowOverride None
778
	AllowOverride None
778
	Order deny,allow
779
	Order deny,allow
779
	Deny from all
780
	Deny from all
780
	Allow from 127.0.0.1
781
	Allow from 127.0.0.1
781
	Allow from $PRIVATE_NETWORK_MASK
782
	Allow from $PRIVATE_NETWORK_MASK
782
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
783
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
783
	require valid-user
784
	require valid-user
784
	AuthType digest
785
	AuthType digest
785
	AuthName $HOSTNAME.$DOMAIN
786
	AuthName $HOSTNAME.$DOMAIN
786
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
787
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
787
	AuthUserFile $DIR_DEST_ETC/digest/key_all
788
	AuthUserFile $DIR_DEST_ETC/digest/key_all
788
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
789
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
789
</Directory>
790
</Directory>
790
<Directory $DIR_ACC/admin>
791
<Directory $DIR_ACC/admin>
791
	SSLRequireSSL
792
	SSLRequireSSL
792
	AllowOverride None
793
	AllowOverride None
793
	Order deny,allow
794
	Order deny,allow
794
	Deny from all
795
	Deny from all
795
	Allow from 127.0.0.1
796
	Allow from 127.0.0.1
796
	Allow from $PRIVATE_NETWORK_MASK
797
	Allow from $PRIVATE_NETWORK_MASK
797
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
798
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
798
	require valid-user
799
	require valid-user
799
	AuthType digest
800
	AuthType digest
800
	AuthName $HOSTNAME.$DOMAIN
801
	AuthName $HOSTNAME.$DOMAIN
801
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
802
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
802
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
803
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
803
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
804
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
804
</Directory>
805
</Directory>
805
<Directory $DIR_ACC/manager>
806
<Directory $DIR_ACC/manager>
806
	SSLRequireSSL
807
	SSLRequireSSL
807
	AllowOverride None
808
	AllowOverride None
808
	Order deny,allow
809
	Order deny,allow
809
	Deny from all
810
	Deny from all
810
	Allow from 127.0.0.1
811
	Allow from 127.0.0.1
811
	Allow from $PRIVATE_NETWORK_MASK
812
	Allow from $PRIVATE_NETWORK_MASK
812
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
813
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
813
	require valid-user
814
	require valid-user
814
	AuthType digest
815
	AuthType digest
815
	AuthName $HOSTNAME.$DOMAIN
816
	AuthName $HOSTNAME.$DOMAIN
816
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
817
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
817
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
818
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
818
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
819
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
819
</Directory>
820
</Directory>
820
<Directory $DIR_ACC/backup>
821
<Directory $DIR_ACC/backup>
821
	SSLRequireSSL
822
	SSLRequireSSL
822
	AllowOverride None
823
	AllowOverride None
823
	Order deny,allow
824
	Order deny,allow
824
	Deny from all
825
	Deny from all
825
	Allow from 127.0.0.1
826
	Allow from 127.0.0.1
826
	Allow from $PRIVATE_NETWORK_MASK
827
	Allow from $PRIVATE_NETWORK_MASK
827
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
828
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
828
	require valid-user
829
	require valid-user
829
	AuthType digest
830
	AuthType digest
830
	AuthName $HOSTNAME.$DOMAIN
831
	AuthName $HOSTNAME.$DOMAIN
831
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
832
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
832
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
833
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
833
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
834
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
834
</Directory>
835
</Directory>
835
Alias /save/ "$DIR_SAVE/"
836
Alias /save/ "$DIR_SAVE/"
836
<Directory $DIR_SAVE>
837
<Directory $DIR_SAVE>
837
	SSLRequireSSL
838
	SSLRequireSSL
838
	Options Indexes
839
	Options Indexes
839
	Order deny,allow
840
	Order deny,allow
840
	Deny from all
841
	Deny from all
841
	Allow from 127.0.0.1
842
	Allow from 127.0.0.1
842
	Allow from $PRIVATE_NETWORK_MASK
843
	Allow from $PRIVATE_NETWORK_MASK
843
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
844
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
844
	require valid-user
845
	require valid-user
845
	AuthType digest
846
	AuthType digest
846
	AuthName $HOSTNAME.$DOMAIN
847
	AuthName $HOSTNAME.$DOMAIN
847
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
848
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
848
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
849
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
849
</Directory>
850
</Directory>
850
EOF
851
EOF
851
# Launch after coova
852
# Launch after coova
852
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
853
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
853
} # End of ACC ()
854
} # End of ACC ()
854
 
855
 
855
##########################################################################################
856
##########################################################################################
856
##				Fonction "CA"						##
857
##				Fonction "CA"						##
857
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
858
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
858
##########################################################################################
859
##########################################################################################
859
CA ()
860
CA ()
860
{
861
{
861
	$DIR_DEST_BIN/alcasar-CA.sh
862
	$DIR_DEST_BIN/alcasar-CA.sh
862
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
863
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
863
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
864
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
864
	cat <<EOF > $FIC_VIRTUAL_SSL
865
	cat <<EOF > $FIC_VIRTUAL_SSL
865
# default SSL virtual host, used for all HTTPS requests that do not
866
# default SSL virtual host, used for all HTTPS requests that do not
866
# match a ServerName or ServerAlias in any <VirtualHost> block.
867
# match a ServerName or ServerAlias in any <VirtualHost> block.
867
 
868
 
868
<VirtualHost _default_:443>
869
<VirtualHost _default_:443>
869
# general configuration
870
# general configuration
870
    ServerAdmin root@localhost
871
    ServerAdmin root@localhost
871
    ServerName localhost
872
    ServerName localhost
872
 
873
 
873
# SSL configuration
874
# SSL configuration
874
    SSLEngine on
875
    SSLEngine on
875
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
876
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
876
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
877
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
877
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
878
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
878
    CustomLog logs/ssl_request_log \
879
    CustomLog logs/ssl_request_log \
879
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
880
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
880
    ErrorLog logs/ssl_error_log
881
    ErrorLog logs/ssl_error_log
881
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
882
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
882
</VirtualHost>
883
</VirtualHost>
883
EOF
884
EOF
884
 
885
 
885
	chown -R root:apache /etc/pki
886
	chown -R root:apache /etc/pki
886
	chmod -R 750 /etc/pki
887
	chmod -R 750 /etc/pki
887
} # End of CA ()
888
} # End of CA ()
888
 
889
 
889
##########################################################################################
890
##########################################################################################
890
##			Fonction "init_db"						##
891
##			Fonction "init_db"						##
891
## - Initialisation de la base Mysql							##
892
## - Initialisation de la base Mysql							##
892
## - Affectation du mot de passe de l'administrateur (root)				##
893
## - Affectation du mot de passe de l'administrateur (root)				##
893
## - Suppression des bases et des utilisateurs superflus				##
894
## - Suppression des bases et des utilisateurs superflus				##
894
## - Création de la base 'radius'							##
895
## - Création de la base 'radius'							##
895
## - Installation du schéma de cette base						##
896
## - Installation du schéma de cette base						##
896
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
897
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
897
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
898
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
898
##########################################################################################
899
##########################################################################################
899
init_db ()
900
init_db ()
900
{
901
{
901
	rm -rf /var/lib/mysql # to be sure that there is no former installation
902
	rm -rf /var/lib/mysql # to be sure that there is no former installation
902
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
903
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
903
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
904
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
904
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
905
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
905
	/usr/bin/systemctl start mysqld.service
906
	/usr/bin/systemctl start mysqld.service
906
	sleep 4
907
	sleep 4
907
	mysqladmin -u root password $mysqlpwd
908
	mysqladmin -u root password $mysqlpwd
908
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
909
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
909
# Secure the server
910
# Secure the server
910
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
911
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
911
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
912
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
912
# Create 'radius' database
913
# Create 'radius' database
913
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
914
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
914
# Add an empty radius database structure
915
# Add an empty radius database structure
915
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
916
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
916
# modify the start script in order to close accounting connexion when the system is comming down or up
917
# modify the start script in order to close accounting connexion when the system is comming down or up
917
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
918
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
918
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
919
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
919
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
920
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
920
	/usr/bin/systemctl daemon-reload
921
	/usr/bin/systemctl daemon-reload
921
} # End of init_db ()
922
} # End of init_db ()
922
 
923
 
923
##########################################################################
924
##########################################################################
924
##			Fonction "radius"				##
925
##			Fonction "radius"				##
925
## - Paramètrage des fichiers de configuration FreeRadius		##
926
## - Paramètrage des fichiers de configuration FreeRadius		##
926
## - Affectation du secret partagé entre coova-chilli et freeradius	##
927
## - Affectation du secret partagé entre coova-chilli et freeradius	##
927
## - Modification de fichier de conf pour l'accès à Mysql		##
928
## - Modification de fichier de conf pour l'accès à Mysql		##
928
##########################################################################
929
##########################################################################
929
radius ()
930
radius ()
930
{
931
{
931
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
932
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
932
	chown -R radius:radius /etc/raddb
933
	chown -R radius:radius /etc/raddb
933
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
934
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
934
# Set radius.conf parameters
935
# Set radius.conf parameters
935
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
936
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
936
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
937
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
937
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
938
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
938
# remove the proxy function
939
# remove the proxy function
939
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
940
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
940
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
941
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
941
# remove EAP module
942
# remove EAP module
942
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
943
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
943
# listen on loopback (should be modified later if EAP enabled)
944
# listen on loopback (should be modified later if EAP enabled)
944
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
945
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
945
# enable the  SQL module (and SQL counter)
946
# enable the  SQL module (and SQL counter)
946
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
947
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
947
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
948
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
948
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
949
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
949
# only include modules for ALCASAR needs
950
# only include modules for ALCASAR needs
950
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
951
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
951
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
952
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
952
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
953
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
953
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
954
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
954
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
955
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
955
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
956
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
956
# remvove virtual server and copy our conf file
957
# remvove virtual server and copy our conf file
957
	rm -f /etc/raddb/sites-enabled/*
958
	rm -f /etc/raddb/sites-enabled/*
958
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
959
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
959
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
960
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
960
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
961
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
961
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
962
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
962
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
963
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
963
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
964
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
964
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
965
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
965
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
966
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
966
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
967
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
967
	cat << EOF > /etc/raddb/clients.conf
968
	cat << EOF > /etc/raddb/clients.conf
968
client 127.0.0.1 {
969
client 127.0.0.1 {
969
	secret = $secretradius
970
	secret = $secretradius
970
	shortname = localhost
971
	shortname = localhost
971
}
972
}
972
EOF
973
EOF
973
# sql.conf modification
974
# sql.conf modification
974
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
975
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
975
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
976
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
976
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
977
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
977
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
978
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
978
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
979
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
979
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
980
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
980
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
981
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
981
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
982
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
982
# counter.conf modification (change the Max-All-Session-Time counter)
983
# counter.conf modification (change the Max-All-Session-Time counter)
983
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
984
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
984
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
985
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
985
	chown -R radius:radius /etc/raddb/sql/mysql/*
986
	chown -R radius:radius /etc/raddb/sql/mysql/*
986
# make certain that mysql is up before radius start
987
# make certain that mysql is up before radius start
987
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
988
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
988
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
989
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
989
	/usr/bin/systemctl daemon-reload
990
	/usr/bin/systemctl daemon-reload
990
} # End radius ()
991
} # End radius ()
991
 
992
 
992
##########################################################################
993
##########################################################################
993
##			Function "radius_web"				##
994
##			Function "radius_web"				##
994
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
995
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
995
## - Création du lien vers la page de changement de mot de passe        ##
996
## - Création du lien vers la page de changement de mot de passe        ##
996
##########################################################################
997
##########################################################################
997
radius_web ()
998
radius_web ()
998
{
999
{
999
# copie de l'interface d'origine dans la structure Alcasar
1000
# copie de l'interface d'origine dans la structure Alcasar
1000
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
1001
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
1001
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
1002
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
1002
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
1003
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
1003
# copie des fichiers modifiés
1004
# copie des fichiers modifiés
1004
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
1005
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
1005
	chown -R apache:apache $DIR_ACC/manager/
1006
	chown -R apache:apache $DIR_ACC/manager/
1006
# Modification des fichiers de configuration
1007
# Modification des fichiers de configuration
1007
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
1008
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
1008
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
1009
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
1009
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
1010
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
1010
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
1011
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
1011
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
1012
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
1012
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
1013
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
1013
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
1014
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
1014
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
1015
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
1015
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
1016
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
1016
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
1017
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
1017
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
1018
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
1018
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
1019
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
1019
	cat <<EOF > /etc/freeradius-web/naslist.conf
1020
	cat <<EOF > /etc/freeradius-web/naslist.conf
1020
nas1_name: alcasar-$ORGANISME
1021
nas1_name: alcasar-$ORGANISME
1021
nas1_model: Portail captif
1022
nas1_model: Portail captif
1022
nas1_ip: $PRIVATE_IP
1023
nas1_ip: $PRIVATE_IP
1023
nas1_port_num: 0
1024
nas1_port_num: 0
1024
nas1_community: public
1025
nas1_community: public
1025
EOF
1026
EOF
1026
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1027
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1027
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1028
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1028
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1029
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1029
# Ajout du mappage des attributs chillispot
1030
# Ajout du mappage des attributs chillispot
1030
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1031
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1031
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1032
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1032
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1033
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1033
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1034
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1034
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1035
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1035
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1036
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1036
	chown -R apache:apache /etc/freeradius-web
1037
	chown -R apache:apache /etc/freeradius-web
1037
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1038
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1038
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1039
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1039
<Directory $DIR_WEB/pass>
1040
<Directory $DIR_WEB/pass>
1040
	SSLRequireSSL
1041
	SSLRequireSSL
1041
	AllowOverride None
1042
	AllowOverride None
1042
	Order deny,allow
1043
	Order deny,allow
1043
	Deny from all
1044
	Deny from all
1044
	Allow from 127.0.0.1
1045
	Allow from 127.0.0.1
1045
	Allow from $PRIVATE_NETWORK_MASK
1046
	Allow from $PRIVATE_NETWORK_MASK
1046
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1047
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1047
</Directory>
1048
</Directory>
1048
EOF
1049
EOF
1049
} # End of radius_web ()
1050
} # End of radius_web ()
1050
 
1051
 
1051
##################################################################################
1052
##################################################################################
1052
##			Fonction "chilli"					##
1053
##			Fonction "chilli"					##
1053
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1054
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1054
## - Paramètrage de la page d'authentification (intercept.php)			##
1055
## - Paramètrage de la page d'authentification (intercept.php)			##
1055
##################################################################################
1056
##################################################################################
1056
chilli ()
1057
chilli ()
1057
{
1058
{
1058
# chilli unit for systemd
1059
# chilli unit for systemd
1059
cat << EOF > /lib/systemd/system/chilli.service
1060
cat << EOF > /lib/systemd/system/chilli.service
1060
#  This file is part of systemd.
1061
#  This file is part of systemd.
1061
#
1062
#
1062
#  systemd is free software; you can redistribute it and/or modify it
1063
#  systemd is free software; you can redistribute it and/or modify it
1063
#  under the terms of the GNU General Public License as published by
1064
#  under the terms of the GNU General Public License as published by
1064
#  the Free Software Foundation; either version 2 of the License, or
1065
#  the Free Software Foundation; either version 2 of the License, or
1065
#  (at your option) any later version.
1066
#  (at your option) any later version.
1066
[Unit]
1067
[Unit]
1067
Description=chilli is a captive portal daemon
1068
Description=chilli is a captive portal daemon
1068
After=network.target
1069
After=network.target
1069
 
1070
 
1070
[Service]
1071
[Service]
1071
Type=forking
1072
Type=forking
1072
ExecStart=/usr/libexec/chilli start
1073
ExecStart=/usr/libexec/chilli start
1073
ExecStop=/usr/libexec/chilli stop
1074
ExecStop=/usr/libexec/chilli stop
1074
ExecReload=/usr/libexec/chilli reload
1075
ExecReload=/usr/libexec/chilli reload
1075
PIDFile=/var/run/chilli.pid
1076
PIDFile=/var/run/chilli.pid
1076
 
1077
 
1077
[Install]
1078
[Install]
1078
WantedBy=multi-user.target
1079
WantedBy=multi-user.target
1079
EOF
1080
EOF
1080
# init file creation
1081
# init file creation
1081
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1082
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1082
	cat <<EOF > /usr/libexec/chilli
1083
	cat <<EOF > /usr/libexec/chilli
1083
#!/bin/sh
1084
#!/bin/sh
1084
#
1085
#
1085
# chilli CoovaChilli init
1086
# chilli CoovaChilli init
1086
#
1087
#
1087
# chkconfig: 2345 65 35
1088
# chkconfig: 2345 65 35
1088
# description: CoovaChilli
1089
# description: CoovaChilli
1089
### BEGIN INIT INFO
1090
### BEGIN INIT INFO
1090
# Provides:       chilli
1091
# Provides:       chilli
1091
# Required-Start: network 
1092
# Required-Start: network 
1092
# Should-Start: 
1093
# Should-Start: 
1093
# Required-Stop:  network
1094
# Required-Stop:  network
1094
# Should-Stop: 
1095
# Should-Stop: 
1095
# Default-Start:  2 3 5
1096
# Default-Start:  2 3 5
1096
# Default-Stop:
1097
# Default-Stop:
1097
# Description:    CoovaChilli access controller
1098
# Description:    CoovaChilli access controller
1098
### END INIT INFO
1099
### END INIT INFO
1099
 
1100
 
1100
[ -f /usr/sbin/chilli ] || exit 0
1101
[ -f /usr/sbin/chilli ] || exit 0
1101
. /etc/init.d/functions
1102
. /etc/init.d/functions
1102
CONFIG=/etc/chilli.conf
1103
CONFIG=/etc/chilli.conf
1103
pidfile=/var/run/chilli.pid
1104
pidfile=/var/run/chilli.pid
1104
[ -f \$CONFIG ] || {
1105
[ -f \$CONFIG ] || {
1105
    echo "\$CONFIG Not found"
1106
    echo "\$CONFIG Not found"
1106
    exit 0
1107
    exit 0
1107
}
1108
}
1108
RETVAL=0
1109
RETVAL=0
1109
prog="chilli"
1110
prog="chilli"
1110
case \$1 in
1111
case \$1 in
1111
    start)
1112
    start)
1112
	if [ -f \$pidfile ] ; then 
1113
	if [ -f \$pidfile ] ; then 
1113
		gprintf "chilli is already running"
1114
		gprintf "chilli is already running"
1114
	else
1115
	else
1115
        	gprintf "Starting \$prog: "
1116
        	gprintf "Starting \$prog: "
1116
		rm -f /var/run/chilli* # cleaning
1117
		rm -f /var/run/chilli* # cleaning
1117
        	/sbin/modprobe tun >/dev/null 2>&1
1118
        	/sbin/modprobe tun >/dev/null 2>&1
1118
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1119
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1119
		[ -e /dev/net/tun ] || {
1120
		[ -e /dev/net/tun ] || {
1120
	    	(cd /dev; 
1121
	    	(cd /dev; 
1121
			mkdir net; 
1122
			mkdir net; 
1122
			cd net; 
1123
			cd net; 
1123
			mknod tun c 10 200)
1124
			mknod tun c 10 200)
1124
		}
1125
		}
1125
		ifconfig $INTIF 0.0.0.0
1126
		ifconfig $INTIF 0.0.0.0
1126
		/usr/sbin/ethtool -K $INTIF gro off
1127
		/usr/sbin/ethtool -K $INTIF gro off
1127
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1128
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1128
        	RETVAL=$?
1129
        	RETVAL=$?
1129
	fi
1130
	fi
1130
	;;
1131
	;;
1131
 
1132
 
1132
    reload)
1133
    reload)
1133
	killall -HUP chilli
1134
	killall -HUP chilli
1134
	;;
1135
	;;
1135
 
1136
 
1136
    restart)
1137
    restart)
1137
	\$0 stop
1138
	\$0 stop
1138
        sleep 2
1139
        sleep 2
1139
	\$0 start
1140
	\$0 start
1140
	;;
1141
	;;
1141
    
1142
    
1142
    status)
1143
    status)
1143
        status chilli
1144
        status chilli
1144
        RETVAL=0
1145
        RETVAL=0
1145
        ;;
1146
        ;;
1146
 
1147
 
1147
    stop)
1148
    stop)
1148
	if [ -f \$pidfile ] ; then  
1149
	if [ -f \$pidfile ] ; then  
1149
        	gprintf "Shutting down \$prog: "
1150
        	gprintf "Shutting down \$prog: "
1150
		killproc /usr/sbin/chilli
1151
		killproc /usr/sbin/chilli
1151
		RETVAL=\$?
1152
		RETVAL=\$?
1152
		[ \$RETVAL = 0 ] && rm -f $pidfile
1153
		[ \$RETVAL = 0 ] && rm -f $pidfile
1153
	else	
1154
	else	
1154
        	gprintf "chilli is not running"
1155
        	gprintf "chilli is not running"
1155
	fi
1156
	fi
1156
	;;
1157
	;;
1157
    
1158
    
1158
    *)
1159
    *)
1159
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1160
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1160
        exit 1
1161
        exit 1
1161
esac
1162
esac
1162
echo
1163
echo
1163
EOF
1164
EOF
1164
chmod a+x /usr/libexec/chilli
1165
chmod a+x /usr/libexec/chilli
1165
# conf file creation
1166
# conf file creation
1166
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1167
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1167
	cat <<EOF > /etc/chilli.conf
1168
	cat <<EOF > /etc/chilli.conf
1168
# coova config for ALCASAR
1169
# coova config for ALCASAR
1169
cmdsocket	/var/run/chilli.sock
1170
cmdsocket	/var/run/chilli.sock
1170
unixipc		chilli.$INTIF.ipc
1171
unixipc		chilli.$INTIF.ipc
1171
pidfile		/var/run/chilli.pid
1172
pidfile		/var/run/chilli.pid
1172
net		$PRIVATE_NETWORK_MASK
1173
net		$PRIVATE_NETWORK_MASK
1173
dhcpif		$INTIF
1174
dhcpif		$INTIF
1174
ethers		$DIR_DEST_ETC/alcasar-ethers
1175
ethers		$DIR_DEST_ETC/alcasar-ethers
1175
#nodynip
1176
#nodynip
1176
#statip
1177
#statip
1177
dynip		$PRIVATE_NETWORK_MASK
1178
dynip		$PRIVATE_NETWORK_MASK
1178
domain		$DOMAIN
1179
domain		$DOMAIN
1179
dns1		$PRIVATE_IP
1180
dns1		$PRIVATE_IP
1180
dns2		$PRIVATE_IP
1181
dns2		$PRIVATE_IP
1181
uamlisten	$PRIVATE_IP
1182
uamlisten	$PRIVATE_IP
1182
uamport		3990
1183
uamport		3990
1183
macauth
1184
macauth
1184
macpasswd	password
1185
macpasswd	password
1185
locationname	$HOSTNAME.$DOMAIN
1186
locationname	$HOSTNAME.$DOMAIN
1186
radiusserver1	127.0.0.1
1187
radiusserver1	127.0.0.1
1187
radiusserver2	127.0.0.1
1188
radiusserver2	127.0.0.1
1188
radiussecret	$secretradius
1189
radiussecret	$secretradius
1189
radiusauthport	1812
1190
radiusauthport	1812
1190
radiusacctport	1813
1191
radiusacctport	1813
1191
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1192
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1192
radiusnasid	$HOSTNAME.$DOMAIN
1193
radiusnasid	$HOSTNAME.$DOMAIN
1193
uamsecret	$secretuam
1194
uamsecret	$secretuam
1194
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1195
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1195
coaport		3799
1196
coaport		3799
1196
conup		$DIR_DEST_BIN/alcasar-conup.sh
1197
conup		$DIR_DEST_BIN/alcasar-conup.sh
1197
condown		$DIR_DEST_BIN/alcasar-condown.sh
1198
condown		$DIR_DEST_BIN/alcasar-condown.sh
1198
include		$DIR_DEST_ETC/alcasar-uamallowed
1199
include		$DIR_DEST_ETC/alcasar-uamallowed
1199
include		$DIR_DEST_ETC/alcasar-uamdomain
1200
include		$DIR_DEST_ETC/alcasar-uamdomain
1200
#dhcpgateway	none
1201
#dhcpgateway		none
1201
#dhcprelayagent	none
1202
#dhcprelayagent		none
1202
#dhcpgatewayport	none
1203
#dhcpgatewayport	none
1203
EOF
1204
EOF
1204
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1205
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1205
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1206
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1206
# create files for trusted domains and urls
1207
# create files for trusted domains and urls
1207
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1208
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1208
	chown root:apache $DIR_DEST_ETC/alcasar-*
1209
	chown root:apache $DIR_DEST_ETC/alcasar-*
1209
	chmod 660 $DIR_DEST_ETC/alcasar-*
1210
	chmod 660 $DIR_DEST_ETC/alcasar-*
1210
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1211
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1211
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1212
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1212
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1213
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1213
# user 'chilli' creation (in order to run conup/off and up/down scripts
1214
# user 'chilli' creation (in order to run conup/off and up/down scripts
1214
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1215
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1215
	if [ "$chilli_exist" == "1" ]
1216
	if [ "$chilli_exist" == "1" ]
1216
	then
1217
	then
1217
	      userdel -r chilli 2>/dev/null
1218
	      userdel -r chilli 2>/dev/null
1218
	fi
1219
	fi
1219
	groupadd -f chilli
1220
	groupadd -f chilli
1220
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1221
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1221
}  # End of chilli ()
1222
}  # End of chilli ()
1222
 
1223
 
1223
##################################################################
1224
##################################################################
1224
##		Fonction "dansguardian"				##
1225
##		Fonction "dansguardian"				##
1225
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1226
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1226
##################################################################
1227
##################################################################
1227
dansguardian ()
1228
dansguardian ()
1228
{
1229
{
1229
	mkdir /var/dansguardian
1230
	mkdir /var/dansguardian
1230
	chown dansguardian /var/dansguardian
1231
	chown dansguardian /var/dansguardian
1231
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1232
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1232
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1233
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1233
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1234
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1234
# By default the filter is off 
1235
# By default the filter is off 
1235
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1236
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1236
# French deny HTML page
1237
# French deny HTML page
1237
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1238
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1238
# Listen only on LAN side
1239
# Listen only on LAN side
1239
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1240
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1240
# DG send its flow to HAVP
1241
# DG send its flow to HAVP
1241
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1242
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1242
# replace the default deny HTML page
1243
# replace the default deny HTML page
1243
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1244
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1244
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1245
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1245
# Don't log
1246
# Don't log
1246
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1247
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1247
# Run 10 daemons (20 in largest server)
1248
# Run 10 daemons (20 in largest server)
1248
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1249
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1249
# on désactive par défaut le controle de contenu des pages html
1250
# on désactive par défaut le controle de contenu des pages html
1250
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1251
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1251
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1252
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1252
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1253
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1253
# on désactive par défaut le contrôle d'URL par expressions régulières
1254
# on désactive par défaut le contrôle d'URL par expressions régulières
1254
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1255
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1255
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1256
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1256
# on désactive par défaut le contrôle de téléchargement de fichiers
1257
# on désactive par défaut le contrôle de téléchargement de fichiers
1257
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1258
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1258
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1259
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1259
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1260
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1260
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1261
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1261
	touch $DIR_DG/lists/bannedextensionlist
1262
	touch $DIR_DG/lists/bannedextensionlist
1262
	touch $DIR_DG/lists/bannedmimetypelist
1263
	touch $DIR_DG/lists/bannedmimetypelist
1263
# 'Safesearch' regex actualisation
1264
# 'Safesearch' regex actualisation
1264
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1265
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1265
# empty LAN IP list that won't be WEB filtered
1266
# empty LAN IP list that won't be WEB filtered
1266
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1267
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1267
	touch $DIR_DG/lists/exceptioniplist
1268
	touch $DIR_DG/lists/exceptioniplist
1268
# Keep a copy of URL & domain filter configuration files
1269
# Keep a copy of URL & domain filter configuration files
1269
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1270
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1270
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1271
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1271
} # End of dansguardian ()
1272
} # End of dansguardian ()
1272
 
1273
 
1273
##################################################################
1274
##################################################################
1274
##			Fonction "antivirus"			##
1275
##			Fonction "antivirus"			##
1275
## - configuration of havp, libclamav and freshclam		##
1276
## - configuration of havp, libclamav and freshclam		##
1276
##################################################################
1277
##################################################################
1277
antivirus ()		
1278
antivirus ()		
1278
{
1279
{
1279
# create 'havp' user
1280
# create 'havp' user
1280
	havp_exist=`grep havp /etc/passwd|wc -l`
1281
	havp_exist=`grep havp /etc/passwd|wc -l`
1281
	if [ "$havp_exist" == "1" ]
1282
	if [ "$havp_exist" == "1" ]
1282
	then
1283
	then
1283
	      userdel -r havp 2>/dev/null
1284
	      userdel -r havp 2>/dev/null
1284
	      groupdel havp 2>/dev/null
1285
	      groupdel havp 2>/dev/null
1285
	fi
1286
	fi
1286
	groupadd -f havp
1287
	groupadd -f havp
1287
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1288
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1288
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1289
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1289
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1290
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1290
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1291
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1291
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1292
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1292
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1293
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1293
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1294
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1294
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1295
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1295
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1296
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1296
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1297
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1297
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1298
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1298
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1299
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1299
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1300
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1300
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1301
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1301
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1302
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1302
# skip checking of youtube flow (too heavy load / risk too low)
1303
# skip checking of youtube flow (too heavy load / risk too low)
1303
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1304
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1304
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1305
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1305
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1306
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1306
# adapt init script and systemd unit
1307
# adapt init script and systemd unit
1307
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1308
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1308
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1309
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1309
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1310
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1310
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1311
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1311
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1312
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1312
# replace of the intercept page (template)
1313
# replace of the intercept page (template)
1313
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1314
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1314
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1315
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1315
# update virus database every 4 hours (24h/6)
1316
# update virus database every 4 hours (24h/6)
1316
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1317
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1317
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1318
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1318
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1319
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1319
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1320
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1320
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1321
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1321
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1322
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1322
# update now
1323
# update now
1323
	/usr/bin/freshclam --no-warnings
1324
	/usr/bin/freshclam --no-warnings
1324
} # End of antivirus ()
1325
} # End of antivirus ()
1325
 
1326
 
1326
##########################################################################
1327
##########################################################################
1327
##			Fonction "tinyproxy"				##
1328
##			Fonction "tinyproxy"				##
1328
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1329
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1329
##########################################################################
1330
##########################################################################
1330
tinyproxy ()		
1331
tinyproxy ()		
1331
{
1332
{
1332
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1333
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1333
	if [ "$tinyproxy_exist" == "1" ]
1334
	if [ "$tinyproxy_exist" == "1" ]
1334
	then
1335
	then
1335
	      userdel -r tinyproxy 2>/dev/null
1336
	      userdel -r tinyproxy 2>/dev/null
1336
	      groupdel tinyproxy 2>/dev/null
1337
	      groupdel tinyproxy 2>/dev/null
1337
	fi
1338
	fi
1338
	groupadd -f tinyproxy
1339
	groupadd -f tinyproxy
1339
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1340
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1340
	mkdir -p var/run/tinyproxy /var/log/tinyproxy
1341
	mkdir -p var/run/tinyproxy /var/log/tinyproxy
1341
	chown -R tinyproxy.tinyproxy /run/tinyproxy /var/log/tinyproxy
1342
	chown -R tinyproxy.tinyproxy /run/tinyproxy /var/log/tinyproxy
1342
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1343
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1343
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1344
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1344
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1345
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1345
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1346
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1346
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1347
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1347
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1348
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1348
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1349
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1349
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1350
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1350
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1351
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1351
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1352
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1352
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1353
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1353
# Create the systemd unit
1354
# Create the systemd unit
1354
cat << EOF > /lib/systemd/system/tinyproxy.service
1355
cat << EOF > /lib/systemd/system/tinyproxy.service
1355
#  This file is part of systemd.
1356
#  This file is part of systemd.
1356
#
1357
#
1357
#  systemd is free software; you can redistribute it and/or modify it
1358
#  systemd is free software; you can redistribute it and/or modify it
1358
#  under the terms of the GNU General Public License as published by
1359
#  under the terms of the GNU General Public License as published by
1359
#  the Free Software Foundation; either version 2 of the License, or
1360
#  the Free Software Foundation; either version 2 of the License, or
1360
#  (at your option) any later version.
1361
#  (at your option) any later version.
1361
 
1362
 
1362
# This unit launches tinyproxy (a very light proxy).
1363
# This unit launches tinyproxy (a very light proxy).
1363
# The "sleep 2" is needed because the pid file isn't ready for systemd
1364
# The "sleep 2" is needed because the pid file isn't ready for systemd
1364
[Unit]
1365
[Unit]
1365
Description=Tinyproxy Web Proxy Server
1366
Description=Tinyproxy Web Proxy Server
1366
After=network.target iptables.service
1367
After=network.target iptables.service
1367
 
1368
 
1368
[Service]
1369
[Service]
1369
Type=forking
1370
Type=forking
1370
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1371
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1371
ExecStartPre=/bin/sleep 2
1372
ExecStartPre=/bin/sleep 2
1372
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1373
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1373
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1374
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1374
 
1375
 
1375
[Install]
1376
[Install]
1376
WantedBy=multi-user.target
1377
WantedBy=multi-user.target
1377
EOF
1378
EOF
1378
 
1379
 
1379
} # end of tinyproxy
1380
} # end of tinyproxy
1380
##################################################################################
1381
##################################################################################
1381
##			function "ulogd"					##
1382
##			function "ulogd"					##
1382
## - Ulog config for multi-log files 						##
1383
## - Ulog config for multi-log files 						##
1383
##################################################################################
1384
##################################################################################
1384
ulogd ()
1385
ulogd ()
1385
{
1386
{
1386
# Three instances of ulogd (three different logfiles)
1387
# Three instances of ulogd (three different logfiles)
1387
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1388
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1388
	nl=1
1389
	nl=1
1389
	for log_type in traceability ssh ext-access
1390
	for log_type in traceability ssh ext-access
1390
	do
1391
	do
1391
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1392
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1392
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1393
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1393
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1394
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1394
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf
1395
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf
1395
		if [ "$ARCH" == "i586" ]; then $SED "s/lib64/lib/g" /etc/ulogd-$log_type.conf; fi
1396
		if [ "$ARCH" == "i586" ]; then $SED "s/lib64/lib/g" /etc/ulogd-$log_type.conf; fi
1396
		cat << EOF >> /etc/ulogd-$log_type.conf
1397
		cat << EOF >> /etc/ulogd-$log_type.conf
1397
[emu1]
1398
[emu1]
1398
file="/var/log/firewall/$log_type.log"
1399
file="/var/log/firewall/$log_type.log"
1399
sync=1
1400
sync=1
1400
EOF
1401
EOF
1401
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1402
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1402
		nl=`expr $nl + 1`
1403
		nl=`expr $nl + 1`
1403
	done
1404
	done
1404
	chown -R root:apache /var/log/firewall
1405
	chown -R root:apache /var/log/firewall
1405
	chmod 750 /var/log/firewall
1406
	chmod 750 /var/log/firewall
1406
	chmod 640 /var/log/firewall/*
1407
	chmod 640 /var/log/firewall/*
1407
}  # End of ulogd ()
1408
}  # End of ulogd ()
1408
 
1409
 
1409
 
1410
 
1410
##########################################################
1411
##########################################################
1411
##              Function "nfsen"			##
1412
##              Function "nfsen"			##
1412
## - install the nfsen grapher				##
1413
## - install the nfsen grapher				##
1413
## - install the two plugins porttracker & surfmap	##
1414
## - install the two plugins porttracker & surfmap	##
1414
##########################################################
1415
##########################################################
1415
nfsen()
1416
nfsen()
1416
{
1417
{
1417
	tar xzf ./conf/nfsen/nfsen-1.3.7.tar.gz -C /tmp/
1418
	tar xzf ./conf/nfsen/nfsen-1.3.7.tar.gz -C /tmp/
1418
# Add PortTracker plugin
1419
# Add PortTracker plugin
1419
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1420
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1420
	do
1421
	do
1421
	[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1422
	[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1422
	done
1423
	done
1423
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.7/contrib/PortTracker/PortTracker.pm
1424
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.7/contrib/PortTracker/PortTracker.pm
1424
# use of our conf file and init unit
1425
# use of our conf file and init unit
1425
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.7/etc/
1426
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.7/etc/
1426
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1427
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1427
	DirTmp=$(pwd)
1428
	DirTmp=$(pwd)
1428
	cd /tmp/nfsen-1.3.7/
1429
	cd /tmp/nfsen-1.3.7/
1429
	/usr/bin/perl install.pl etc/nfsen.conf
1430
	/usr/bin/perl install.pl etc/nfsen.conf
1430
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1431
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1431
# Create RRD DB for porttracker (only in it still doesn't exist)
1432
# Create RRD DB for porttracker (only in it still doesn't exist)
1432
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1433
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1433
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1434
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1434
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1435
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1435
	chmod -R 770 /var/log/netflow/porttracker
1436
	chmod -R 770 /var/log/netflow/porttracker
1436
# nfsen unit for systemd
1437
# nfsen unit for systemd
1437
cat << EOF > /lib/systemd/system/nfsen.service
1438
cat << EOF > /lib/systemd/system/nfsen.service
1438
#  This file is part of systemd.
1439
#  This file is part of systemd.
1439
#
1440
#
1440
#  systemd is free software; you can redistribute it and/or modify it
1441
#  systemd is free software; you can redistribute it and/or modify it
1441
#  under the terms of the GNU General Public License as published by
1442
#  under the terms of the GNU General Public License as published by
1442
#  the Free Software Foundation; either version 2 of the License, or
1443
#  the Free Software Foundation; either version 2 of the License, or
1443
#  (at your option) any later version.
1444
#  (at your option) any later version.
1444
 
1445
 
1445
# This unit launches nfsen (a Netflow grapher).
1446
# This unit launches nfsen (a Netflow grapher).
1446
[Unit]
1447
[Unit]
1447
Description= NfSen init script
1448
Description= NfSen init script
1448
After=network.target iptables.service
1449
After=network.target iptables.service
1449
 
1450
 
1450
[Service]
1451
[Service]
1451
Type=oneshot
1452
Type=oneshot
1452
RemainAfterExit=yes
1453
RemainAfterExit=yes
1453
PIDFile=/var/run/nfsen/nfsen.pid
1454
PIDFile=/var/run/nfsen/nfsen.pid
1454
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1455
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1455
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1456
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1456
ExecStart=/usr/bin/nfsen start 
1457
ExecStart=/usr/bin/nfsen start 
1457
ExecStop=/usr/bin/nfsen stop
1458
ExecStop=/usr/bin/nfsen stop
1458
ExecReload=/usr/bin/nfsen restart
1459
ExecReload=/usr/bin/nfsen restart
1459
TimeoutSec=0
1460
TimeoutSec=0
1460
 
1461
 
1461
[Install]
1462
[Install]
1462
WantedBy=multi-user.target
1463
WantedBy=multi-user.target
1463
EOF
1464
EOF
1464
# Add the listen port to collect netflow packet (nfcapd)
1465
# Add the listen port to collect netflow packet (nfcapd)
1465
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1466
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1466
# expire delay for the profile "live"
1467
# expire delay for the profile "live"
1467
	/usr/bin/systemctl start nfsen
1468
	/usr/bin/systemctl start nfsen
1468
	/bin/nfsen -m live -e 62d 2>/dev/null
1469
	/bin/nfsen -m live -e 62d 2>/dev/null
1469
# add SURFmap plugin
1470
# add SURFmap plugin
1470
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1471
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1471
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1472
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1472
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1473
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1473
	cd /tmp/
1474
	cd /tmp/
1474
	/usr/bin/sh SURFmap/install.sh
1475
	/usr/bin/sh SURFmap/install.sh
1475
chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1476
chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1476
# clear the installation
1477
# clear the installation
1477
	cd $DirTmp
1478
	cd $DirTmp
1478
	rm -rf /tmp/nfsen*
1479
	rm -rf /tmp/nfsen*
1479
	rm -rf /tmp/SURFmap*
1480
	rm -rf /tmp/SURFmap*
1480
} # End of nfsen ()
1481
} # End of nfsen ()
1481
 
1482
 
1482
##################################################
1483
##################################################
1483
##		Function "vnstat"		##
1484
##		Function "vnstat"		##
1484
## Initialization of Vnstat and vnstat phpFE    ##
1485
## Initialization of Vnstat and vnstat phpFE    ##
1485
##################################################
1486
##################################################
1486
vnstat ()
1487
vnstat ()
1487
{
1488
{
1488
	 [ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1489
	 [ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1489
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1490
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1490
	 [ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1491
	 [ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1491
	 $SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?g" $DIR_ACC/manager/stats/config.php
1492
	 $SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?g" $DIR_ACC/manager/stats/config.php
1492
	 $SED "s?\$iface_title.*?\$iface_title['$EXTIF'] = 'Internet outbound';?g" $DIR_ACC/manager/stats/config.php
1493
	 $SED "s?\$iface_title.*?\$iface_title['$EXTIF'] = 'Internet outbound';?g" $DIR_ACC/manager/stats/config.php
1493
	/usr/bin/vnstat -u -i $EXTIF
1494
	/usr/bin/vnstat -u -i $EXTIF
1494
} # End of vnstat	
1495
} # End of vnstat	
1495
##################################################
1496
##################################################
1496
##		Function "dnsmasq"		##
1497
##		Function "dnsmasq"		##
1497
##################################################
1498
##################################################
1498
dnsmasq ()
1499
dnsmasq ()
1499
{
1500
{
1500
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1501
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1501
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1502
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1502
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1503
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1503
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1504
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1504
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1505
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1505
	cat << EOF > /etc/dnsmasq.conf 
1506
	cat << EOF > /etc/dnsmasq.conf 
1506
# Configuration file for "dnsmasq in forward mode"
1507
# Configuration file for "dnsmasq in forward mode"
1507
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1508
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1508
listen-address=$PRIVATE_IP
1509
listen-address=$PRIVATE_IP
1509
pid-file=/var/run/dnsmasq.pid
1510
pid-file=/var/run/dnsmasq.pid
1510
listen-address=127.0.0.1
1511
listen-address=127.0.0.1
1511
no-dhcp-interface=$INTIF
1512
no-dhcp-interface=$INTIF
1512
no-dhcp-interface=tun0
1513
no-dhcp-interface=tun0
1513
no-dhcp-interface=lo
1514
no-dhcp-interface=lo
1514
bind-interfaces
1515
bind-interfaces
1515
cache-size=256
1516
cache-size=256
1516
domain=$DOMAIN
1517
domain=$DOMAIN
1517
domain-needed
1518
domain-needed
1518
expand-hosts
1519
expand-hosts
1519
bogus-priv
1520
bogus-priv
1520
filterwin2k
1521
filterwin2k
1521
server=$DNS1
1522
server=$DNS1
1522
server=$DNS2
1523
server=$DNS2
1523
# DHCP service is configured. It will be enabled in "bypass" mode
1524
# DHCP service is configured. It will be enabled in "bypass" mode
1524
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1525
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1525
#dhcp-option=option:router,$PRIVATE_IP
1526
#dhcp-option=option:router,$PRIVATE_IP
1526
#dhcp-option=option:ntp-server,$PRIVATE_IP
1527
#dhcp-option=option:ntp-server,$PRIVATE_IP
1527
 
1528
 
1528
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1529
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1529
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1530
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1530
EOF
1531
EOF
1531
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1532
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1532
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1533
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1533
# Configuration file for "dnsmasq with blacklist"
1534
# Configuration file for "dnsmasq with blacklist"
1534
# Add Toulouse blacklist domains
1535
# Add Toulouse blacklist domains
1535
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1536
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1536
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1537
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1537
pid-file=/var/run/dnsmasq-blacklist.pid
1538
pid-file=/var/run/dnsmasq-blacklist.pid
1538
listen-address=$PRIVATE_IP
1539
listen-address=$PRIVATE_IP
1539
port=54
1540
port=54
1540
no-dhcp-interface=$INTIF
1541
no-dhcp-interface=$INTIF
1541
no-dhcp-interface=tun0
1542
no-dhcp-interface=tun0
1542
no-dhcp-interface=lo
1543
no-dhcp-interface=lo
1543
bind-interfaces
1544
bind-interfaces
1544
cache-size=256
1545
cache-size=256
1545
domain=$DOMAIN
1546
domain=$DOMAIN
1546
domain-needed
1547
domain-needed
1547
expand-hosts
1548
expand-hosts
1548
bogus-priv
1549
bogus-priv
1549
filterwin2k
1550
filterwin2k
1550
server=$DNS1
1551
server=$DNS1
1551
server=$DNS2
1552
server=$DNS2
1552
EOF
1553
EOF
1553
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1554
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1554
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1555
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1555
# Configuration file for "dnsmasq with whitelist"
1556
# Configuration file for "dnsmasq with whitelist"
1556
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1557
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1557
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1558
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1558
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1559
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1559
pid-file=/var/run/dnsmasq-whitelist.pid
1560
pid-file=/var/run/dnsmasq-whitelist.pid
1560
listen-address=$PRIVATE_IP
1561
listen-address=$PRIVATE_IP
1561
port=55
1562
port=55
1562
no-dhcp-interface=$INTIF
1563
no-dhcp-interface=$INTIF
1563
no-dhcp-interface=tun0
1564
no-dhcp-interface=tun0
1564
no-dhcp-interface=lo
1565
no-dhcp-interface=lo
1565
bind-interfaces
1566
bind-interfaces
1566
cache-size=256
1567
cache-size=256
1567
domain=$DOMAIN
1568
domain=$DOMAIN
1568
domain-needed
1569
domain-needed
1569
expand-hosts
1570
expand-hosts
1570
bogus-priv
1571
bogus-priv
1571
filterwin2k
1572
filterwin2k
1572
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1573
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1573
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1574
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1574
EOF
1575
EOF
1575
# 4th dnsmasq listen on udp 56 ("blackhole")
1576
# 4th dnsmasq listen on udp 56 ("blackhole")
1576
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1577
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1577
# Configuration file for "dnsmasq as a blackhole"
1578
# Configuration file for "dnsmasq as a blackhole"
1578
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1579
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1579
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1580
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1580
pid-file=/var/run/dnsmasq-blackhole.pid
1581
pid-file=/var/run/dnsmasq-blackhole.pid
1581
listen-address=$PRIVATE_IP
1582
listen-address=$PRIVATE_IP
1582
port=56
1583
port=56
1583
no-dhcp-interface=$INTIF
1584
no-dhcp-interface=$INTIF
1584
no-dhcp-interface=tun0
1585
no-dhcp-interface=tun0
1585
no-dhcp-interface=lo
1586
no-dhcp-interface=lo
1586
bind-interfaces
1587
bind-interfaces
1587
cache-size=256
1588
cache-size=256
1588
domain=$DOMAIN
1589
domain=$DOMAIN
1589
domain-needed
1590
domain-needed
1590
expand-hosts
1591
expand-hosts
1591
bogus-priv
1592
bogus-priv
1592
filterwin2k
1593
filterwin2k
1593
EOF
1594
EOF
1594
 
1595
 
1595
# the main instance should start after network and chilli (which create tun0)
1596
# the main instance should start after network and chilli (which create tun0)
1596
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1597
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1597
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1598
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1598
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1599
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1599
	for list in blacklist whitelist blackhole
1600
	for list in blacklist whitelist blackhole
1600
	do
1601
	do
1601
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1602
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1602
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1603
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1603
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1604
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1604
	done
1605
	done
1605
} # End dnsmasq
1606
} # End dnsmasq
1606
 
1607
 
1607
##########################################################
1608
##########################################################
1608
##		Fonction "BL"				##
1609
##		Fonction "BL"				##
1609
##########################################################
1610
##########################################################
1610
BL ()
1611
BL ()
1611
{
1612
{
1612
# copy and extract toulouse BL
1613
# copy and extract toulouse BL
1613
	rm -rf $DIR_DG/lists/blacklists
1614
	rm -rf $DIR_DG/lists/blacklists
1614
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1615
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1615
# creation of the OSSI BL and WL categories (domain name and url)
1616
# creation of the OSSI BL and WL categories (domain name and url)
1616
	mkdir $DIR_DG/lists/blacklists/ossi
1617
	mkdir $DIR_DG/lists/blacklists/ossi
1617
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1618
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1618
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1619
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1619
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1620
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1620
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1621
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1621
# creation of file for the rehabilited domains and urls
1622
# creation of file for the rehabilited domains and urls
1622
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1623
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1623
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1624
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1624
	touch $DIR_DG/lists/exceptionsitelist
1625
	touch $DIR_DG/lists/exceptionsitelist
1625
	touch $DIR_DG/lists/exceptionurllist
1626
	touch $DIR_DG/lists/exceptionurllist
1626
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1627
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1627
	cat <<EOF > $DIR_DG/lists/bannedurllist
1628
	cat <<EOF > $DIR_DG/lists/bannedurllist
1628
# Dansguardian filter config for ALCASAR
1629
# Dansguardian filter config for ALCASAR
1629
EOF
1630
EOF
1630
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1631
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1631
# Dansguardian domain filter config for ALCASAR
1632
# Dansguardian domain filter config for ALCASAR
1632
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1633
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1633
#**
1634
#**
1634
# block all SSL and CONNECT tunnels
1635
# block all SSL and CONNECT tunnels
1635
**s
1636
**s
1636
# block all SSL and CONNECT tunnels specified only as an IP
1637
# block all SSL and CONNECT tunnels specified only as an IP
1637
*ips
1638
*ips
1638
# block all sites specified only by an IP
1639
# block all sites specified only by an IP
1639
*ip
1640
*ip
1640
EOF
1641
EOF
1641
# Add Bing and Youtube to the safesearch url regext list (parental control)
1642
# Add Bing and Youtube to the safesearch url regext list (parental control)
1642
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1643
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1643
# Bing - add 'adlt=strict'
1644
# Bing - add 'adlt=strict'
1644
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1645
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1645
# Youtube - add 'edufilter=your_ID' 
1646
# Youtube - add 'edufilter=your_ID' 
1646
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1647
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1647
EOF
1648
EOF
1648
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1649
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1649
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1650
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1650
# adapt the BL to ALCASAR architecture. Enable the default categories
1651
# adapt the BL to ALCASAR architecture. Enable the default categories
1651
	if [ "$mode" != "update" ]; then
1652
	if [ "$mode" != "update" ]; then
1652
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1653
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1653
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1654
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1654
	fi
1655
	fi
1655
}
1656
}
1656
 
1657
 
1657
##########################################################
1658
##########################################################
1658
##		Fonction "cron"				##
1659
##		Fonction "cron"				##
1659
## - Mise en place des différents fichiers de cron	##
1660
## - Mise en place des différents fichiers de cron	##
1660
##########################################################
1661
##########################################################
1661
cron ()
1662
cron ()
1662
{
1663
{
1663
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1664
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1664
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1665
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1665
	cat <<EOF > /etc/crontab
1666
	cat <<EOF > /etc/crontab
1666
SHELL=/bin/bash
1667
SHELL=/bin/bash
1667
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1668
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1668
MAILTO=root
1669
MAILTO=root
1669
HOME=/
1670
HOME=/
1670
 
1671
 
1671
# run-parts
1672
# run-parts
1672
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1673
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1673
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1674
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1674
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1675
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1675
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1676
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1676
EOF
1677
EOF
1677
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1678
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1678
	cat <<EOF >> /etc/anacrontab
1679
	cat <<EOF >> /etc/anacrontab
1679
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1680
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1680
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1681
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1681
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1682
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1682
EOF
1683
EOF
1683
 
1684
 
1684
	cat <<EOF > /etc/cron.d/alcasar-mysql
1685
	cat <<EOF > /etc/cron.d/alcasar-mysql
1685
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1686
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1686
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1687
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1687
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1688
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1688
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1689
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1689
EOF
1690
EOF
1690
	cat <<EOF > /etc/cron.d/alcasar-archive
1691
	cat <<EOF > /etc/cron.d/alcasar-archive
1691
# Archive des logs et de la base de données (tous les lundi à 5h35)
1692
# Archive des logs et de la base de données (tous les lundi à 5h35)
1692
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1693
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1693
EOF
1694
EOF
1694
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1695
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1695
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1696
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1696
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1697
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1697
EOF
1698
EOF
1698
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1699
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1699
# mise à jour automatique de la distribution tous les jours 3h30
1700
# mise à jour automatique de la distribution tous les jours 3h30
1700
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1701
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1701
EOF
1702
EOF
1702
	#cat << EOF > /etc/cron.d/alcasar-netflow
1703
	#cat << EOF > /etc/cron.d/alcasar-netflow
1703
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1704
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1704
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1705
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1705
#EOF
1706
#EOF
1706
 
1707
 
1707
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1708
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1708
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1709
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1709
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1710
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1710
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1711
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1711
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1712
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1712
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1713
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1713
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1714
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1714
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1715
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1715
	rm -f /etc/cron.daily/freeradius-web
1716
	rm -f /etc/cron.daily/freeradius-web
1716
	rm -f /etc/cron.monthly/freeradius-web
1717
	rm -f /etc/cron.monthly/freeradius-web
1717
	cat << EOF > /etc/cron.d/freeradius-web
1718
	cat << EOF > /etc/cron.d/freeradius-web
1718
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1719
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1719
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1720
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1720
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1721
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1721
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1722
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1722
EOF
1723
EOF
1723
	cat << EOF > /etc/cron.d/alcasar-watchdog
1724
	cat << EOF > /etc/cron.d/alcasar-watchdog
1724
# activation du "chien de garde" (watchdog) toutes les 3'
1725
# activation du "chien de garde" (watchdog) toutes les 3'
1725
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1726
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1726
EOF
1727
EOF
1727
# activation du "chien de garde des services" (watchdog) toutes les 18'
1728
# activation du "chien de garde des services" (watchdog) toutes les 18'
1728
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1729
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1729
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1730
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1730
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1731
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1731
EOF
1732
EOF
1732
# suppression des crons usagers
1733
# suppression des crons usagers
1733
	rm -f /var/spool/cron/*
1734
	rm -f /var/spool/cron/*
1734
} # End cron
1735
} # End cron
1735
 
1736
 
1736
##################################################################
1737
##################################################################
1737
## 			Fonction "Fail2Ban"			##
1738
## 			Fonction "Fail2Ban"			##
1738
##- Modification de la configuration de fail2ban		##
1739
##- Modification de la configuration de fail2ban		##
1739
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1740
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1740
##################################################################
1741
##################################################################
1741
fail2ban()
1742
fail2ban()
1742
{
1743
{
1743
	$DIR_CONF/fail2ban.sh
1744
	$DIR_CONF/fail2ban.sh
1744
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1745
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1745
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1746
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1746
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1747
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1747
	chmod 644 /var/log/fail2ban.log
1748
	chmod 644 /var/log/fail2ban.log
1748
	chmod 644 /var/Save/security/watchdog.log
1749
	chmod 644 /var/Save/security/watchdog.log
1749
	/usr/bin/touch /var/log/auth.log
1750
	/usr/bin/touch /var/log/auth.log
1750
# fail2ban unit
1751
# fail2ban unit
1751
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1752
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1752
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1753
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1753
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1754
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1754
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1755
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1755
} #Fin de fail2ban_install()
1756
} #Fin de fail2ban_install()
1756
 
1757
 
1757
##################################################################
1758
##################################################################
1758
## 			Fonction "gammu_smsd"			##
1759
## 			Fonction "gammu_smsd"			##
1759
## - Creation de la base de donnée Gammu			##
1760
## - Creation de la base de donnée Gammu			##
1760
## - Creation du fichier de config: gammu_smsd_conf		##
1761
## - Creation du fichier de config: gammu_smsd_conf		##
1761
##								##
1762
##								##
1762
##################################################################
1763
##################################################################
1763
gammu_smsd()
1764
gammu_smsd()
1764
{
1765
{
1765
# Create 'gammu' databse
1766
# Create 'gammu' databse
1766
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1767
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1767
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1768
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1768
# Add a gammu database structure
1769
# Add a gammu database structure
1769
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1770
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1770
 
1771
 
1771
# config file for the daemon
1772
# config file for the daemon
1772
cat << EOF > /etc/gammu_smsd_conf
1773
cat << EOF > /etc/gammu_smsd_conf
1773
[gammu]
1774
[gammu]
1774
port = /dev/ttyUSB0
1775
port = /dev/ttyUSB0
1775
connection = at115200
1776
connection = at115200
1776
 
1777
 
1777
;########################################################
1778
;########################################################
1778
 
1779
 
1779
[smsd]
1780
[smsd]
1780
 
1781
 
1781
PIN = 1234
1782
PIN = 1234
1782
 
1783
 
1783
logfile = /var/log/gammu-smsd/gammu-smsd.log
1784
logfile = /var/log/gammu-smsd/gammu-smsd.log
1784
logformat = textall
1785
logformat = textall
1785
debuglevel = 0
1786
debuglevel = 0
1786
 
1787
 
1787
service = sql
1788
service = sql
1788
driver = native_mysql
1789
driver = native_mysql
1789
user = $DB_USER
1790
user = $DB_USER
1790
password = $radiuspwd
1791
password = $radiuspwd
1791
pc = localhost
1792
pc = localhost
1792
database = $DB_GAMMU
1793
database = $DB_GAMMU
1793
 
1794
 
1794
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1795
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1795
 
1796
 
1796
StatusFrequency = 30
1797
StatusFrequency = 30
1797
;LoopSleep = 2
1798
;LoopSleep = 2
1798
 
1799
 
1799
;ResetFrequency = 300
1800
;ResetFrequency = 300
1800
;HardResetFrequency = 120
1801
;HardResetFrequency = 120
1801
 
1802
 
1802
CheckSecurity = 1 
1803
CheckSecurity = 1 
1803
CheckSignal = 1
1804
CheckSignal = 1
1804
CheckBattery = 0
1805
CheckBattery = 0
1805
EOF
1806
EOF
1806
 
1807
 
1807
chmod 755 /etc/gammu_smsd_conf
1808
chmod 755 /etc/gammu_smsd_conf
1808
 
1809
 
1809
#Creation dossier de log Gammu-smsd
1810
#Creation dossier de log Gammu-smsd
1810
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1811
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1811
chmod 755 /var/log/gammu-smsd
1812
chmod 755 /var/log/gammu-smsd
1812
 
1813
 
1813
#Edition du script sql gammu <-> radius
1814
#Edition du script sql gammu <-> radius
1814
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1815
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1815
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1816
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1816
 
1817
 
1817
#Création de la règle udev pour les Huawei // idVendor: 12d1
1818
#Création de la règle udev pour les Huawei // idVendor: 12d1
1818
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1819
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1819
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1820
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1820
EOF
1821
EOF
1821
 
1822
 
1822
} # END gammu_smsd()
1823
} # END gammu_smsd()
1823
 
1824
 
1824
##################################################################
1825
##################################################################
1825
##			Fonction "post_install"			##
1826
##			Fonction "post_install"			##
1826
## - Modification des bannières (locales et ssh) et des prompts ##
1827
## - Modification des bannières (locales et ssh) et des prompts ##
1827
## - Installation de la structure de chiffrement pour root	##
1828
## - Installation de la structure de chiffrement pour root	##
1828
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1829
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1829
## - Mise en place du la rotation des logs			##
1830
## - Mise en place du la rotation des logs			##
1830
## - Configuration dans le cas d'une mise à jour		##
1831
## - Configuration dans le cas d'une mise à jour		##
1831
##################################################################
1832
##################################################################
1832
post_install()
1833
post_install()
1833
{
1834
{
1834
# création de la bannière locale
1835
# création de la bannière locale
1835
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1836
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1836
	cp -f $DIR_CONF/banner /etc/mageia-release
1837
	cp -f $DIR_CONF/banner /etc/mageia-release
1837
	echo " V$VERSION" >> /etc/mageia-release
1838
	echo " V$VERSION" >> /etc/mageia-release
1838
# création de la bannière SSH
1839
# création de la bannière SSH
1839
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1840
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1840
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1841
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1841
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1842
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1842
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1843
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1843
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1844
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1844
# postfix banner anonymisation
1845
# postfix banner anonymisation
1845
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1846
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1846
# sshd écoute côté LAN et WAN
1847
# sshd écoute côté LAN et WAN
1847
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1848
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1848
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1849
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1849
	echo "SSH=off" >> $CONF_FILE
1850
	echo "SSH=off" >> $CONF_FILE
1850
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1851
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1851
	echo "QOS=off" >> $CONF_FILE
1852
	echo "QOS=off" >> $CONF_FILE
1852
	echo "LDAP=off" >> $CONF_FILE
1853
	echo "LDAP=off" >> $CONF_FILE
1853
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1854
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1854
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1855
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1855
	echo "MULTIWAN=off" >> $CONF_FILE
1856
	echo "MULTIWAN=off" >> $CONF_FILE
1856
	echo "FAILOVER=30" >> $CONF_FILE
1857
	echo "FAILOVER=30" >> $CONF_FILE
1857
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1858
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1858
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1859
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1859
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1860
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1860
# Coloration des prompts
1861
# Coloration des prompts
1861
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1862
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1862
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1863
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1863
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1864
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1864
# Droits d'exécution pour utilisateur apache et sysadmin
1865
# Droits d'exécution pour utilisateur apache et sysadmin
1865
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1866
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1866
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1867
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1867
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1868
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1868
# Modify some logrotate files (gammu, ulogd)
1869
# Modify some logrotate files (gammu, ulogd)
1869
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1870
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1870
	chmod 644 /etc/logrotate.d/*
1871
	chmod 644 /etc/logrotate.d/*
1871
# rectification sur versions précédentes de la compression des logs
1872
# rectification sur versions précédentes de la compression des logs
1872
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1873
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1873
# actualisation des fichiers logs compressés
1874
# actualisation des fichiers logs compressés
1874
	for dir in firewall dansguardian httpd
1875
	for dir in firewall dansguardian httpd
1875
	do
1876
	do
1876
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1877
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1877
	done
1878
	done
1878
# create the alcasar-load_balancing unit
1879
# create the alcasar-load_balancing unit
1879
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1880
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1880
#  This file is part of systemd.
1881
#  This file is part of systemd.
1881
#
1882
#
1882
#  systemd is free software; you can redistribute it and/or modify it
1883
#  systemd is free software; you can redistribute it and/or modify it
1883
#  under the terms of the GNU General Public License as published by
1884
#  under the terms of the GNU General Public License as published by
1884
#  the Free Software Foundation; either version 2 of the License, or
1885
#  the Free Software Foundation; either version 2 of the License, or
1885
#  (at your option) any later version.
1886
#  (at your option) any later version.
1886
 
1887
 
1887
# This unit lauches alcasar-load-balancing.sh script.
1888
# This unit lauches alcasar-load-balancing.sh script.
1888
[Unit]
1889
[Unit]
1889
Description=alcasar-load_balancing.sh execution
1890
Description=alcasar-load_balancing.sh execution
1890
After=network.target iptables.service
1891
After=network.target iptables.service
1891
 
1892
 
1892
[Service]
1893
[Service]
1893
Type=oneshot
1894
Type=oneshot
1894
RemainAfterExit=yes
1895
RemainAfterExit=yes
1895
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1896
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1896
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1897
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1897
TimeoutSec=0
1898
TimeoutSec=0
1898
SysVStartPriority=99
1899
SysVStartPriority=99
1899
 
1900
 
1900
[Install]
1901
[Install]
1901
WantedBy=multi-user.target
1902
WantedBy=multi-user.target
1902
EOF
1903
EOF
1903
# processes launched at boot time (Systemctl)
1904
# processes launched at boot time (Systemctl)
1904
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1905
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1905
	do
1906
	do
1906
		/usr/bin/systemctl -q enable $i.service
1907
		/usr/bin/systemctl -q enable $i.service
1907
	done
1908
	done
1908
	
1909
	
1909
# disable processes at boot time (Systemctl)
1910
# disable processes at boot time (Systemctl)
1910
	for i in ulogd
1911
	for i in ulogd
1911
	do
1912
	do
1912
		/usr/bin/systemctl -q disable $i.service
1913
		/usr/bin/systemctl -q disable $i.service
1913
	done
1914
	done
1914
	
1915
	
1915
# Apply French Security Agency (ANSSI) rules
1916
# Apply French Security Agency (ANSSI) rules
1916
# ignore ICMP broadcast (smurf attack)
1917
# ignore ICMP broadcast (smurf attack)
1917
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1918
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1918
# ignore ICMP errors bogus
1919
# ignore ICMP errors bogus
1919
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1920
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1920
# remove ICMP redirects responces
1921
# remove ICMP redirects responces
1921
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1922
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1922
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1923
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1923
# enable SYN Cookies (Syn flood attacks)
1924
# enable SYN Cookies (Syn flood attacks)
1924
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1925
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1925
# enable kernel antispoofing
1926
# enable kernel antispoofing
1926
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1927
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1927
# ignore source routing
1928
# ignore source routing
1928
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1929
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1929
# set conntrack timer to 1h (3600s) instead of 5 weeks
1930
# set conntrack timer to 1h (3600s) instead of 5 weeks
1930
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1931
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1931
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1932
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1932
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1933
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1933
# remove Magic SysReq Keys
1934
# remove Magic SysReq Keys
1934
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1935
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1935
# switch to multi-users runlevel (instead of x11)
1936
# switch to multi-users runlevel (instead of x11)
1936
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1937
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1937
#	GRUB modifications (only one time)
1938
#	GRUB modifications (only one time)
1938
# limit wait time to 3s
1939
# limit wait time to 3s
1939
# create an alcasar entry instead of linux-nonfb
1940
# create an alcasar entry instead of linux-nonfb
1940
# change display to 1024*768 (vga791)
1941
# change display to 1024*768 (vga791)
1941
	grub_already_modified=`grep ALCASAR /boot/grub/menu.lst|wc -l`
1942
	grub_already_modified=`grep ALCASAR /boot/grub/menu.lst|wc -l`
1942
	if [ $grub_already_modified == 0 ]
1943
	if [ $grub_already_modified == 0 ]
1943
		then
1944
		then
1944
		$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1945
		$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1945
		$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1946
		$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1946
		$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1947
		$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1947
		$SED "/^kernel/s/$/ vga=791/" /boot/grub/menu.lst
1948
		$SED "/^kernel/s/$/ vga=791/" /boot/grub/menu.lst
1948
		$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1949
		$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1949
		$SED "/^gfxmenu/d" /boot/grub/menu.lst
1950
		$SED "/^gfxmenu/d" /boot/grub/menu.lst
1950
	fi
1951
	fi
1951
# Remove unused services and users
1952
# Remove unused services and users
1952
	for svc in sshd
1953
	for svc in sshd
1953
	do
1954
	do
1954
		/usr/bin/systemctl -q disable $svc.service
1955
		/usr/bin/systemctl -q disable $svc.service
1955
	done
1956
	done
1956
# Load and apply the previous conf file
1957
# Load and apply the previous conf file
1957
	if [ "$mode" = "update" ]
1958
	if [ "$mode" = "update" ]
1958
	then
1959
	then
1959
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1960
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1960
		$DIR_DEST_BIN/alcasar-conf.sh --load
1961
		$DIR_DEST_BIN/alcasar-conf.sh --load
1961
		PARENT_SCRIPT=`basename $0`
1962
		PARENT_SCRIPT=`basename $0`
1962
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1963
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1963
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1964
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1964
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1965
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1965
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1966
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1966
	fi
1967
	fi
1967
	rm -f /tmp/alcasar-conf*
1968
	rm -f /tmp/alcasar-conf*
1968
	chown -R root:apache $DIR_DEST_ETC/*
1969
	chown -R root:apache $DIR_DEST_ETC/*
1969
	chmod -R 660 $DIR_DEST_ETC/*
1970
	chmod -R 660 $DIR_DEST_ETC/*
1970
	chmod ug+x $DIR_DEST_ETC/digest
1971
	chmod ug+x $DIR_DEST_ETC/digest
1971
# Apply and save the firewall rules
1972
# Apply and save the firewall rules
1972
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1973
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1973
	sleep 2
1974
	sleep 2
1974
	cd $DIR_INSTALL
1975
	cd $DIR_INSTALL
1975
	echo ""
1976
	echo ""
1976
	echo "#############################################################################"
1977
	echo "#############################################################################"
1977
	if [ $Lang == "fr" ]
1978
	if [ $Lang == "fr" ]
1978
		then
1979
		then
1979
		echo "#                        Fin d'installation d'ALCASAR                       #"
1980
		echo "#                        Fin d'installation d'ALCASAR                       #"
1980
		echo "#                                                                           #"
1981
		echo "#                                                                           #"
1981
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1982
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1982
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1983
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1983
		echo "#                                                                           #"
1984
		echo "#                                                                           #"
1984
		echo "#############################################################################"
1985
		echo "#############################################################################"
1985
		echo
1986
		echo
1986
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1987
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1987
		echo
1988
		echo
1988
		echo "- Lisez attentivement la documentation d'exploitation"
1989
		echo "- Lisez attentivement la documentation d'exploitation"
1989
		echo
1990
		echo
1990
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1991
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1991
		echo
1992
		echo
1992
		echo "                   Appuyez sur 'Entrée' pour continuer"
1993
		echo "                   Appuyez sur 'Entrée' pour continuer"
1993
	else	
1994
	else	
1994
		echo "#                        Enf of ALCASAR install process                     #"
1995
		echo "#                        Enf of ALCASAR install process                     #"
1995
		echo "#                                                                           #"
1996
		echo "#                                                                           #"
1996
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1997
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1997
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1998
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1998
		echo "#                                                                           #"
1999
		echo "#                                                                           #"
1999
		echo "#############################################################################"
2000
		echo "#############################################################################"
2000
		echo
2001
		echo
2001
		echo "- The system will be rebooted in order to operate ALCASAR"
2002
		echo "- The system will be rebooted in order to operate ALCASAR"
2002
		echo
2003
		echo
2003
		echo "- Read the exploitation documentation"
2004
		echo "- Read the exploitation documentation"
2004
		echo
2005
		echo
2005
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
2006
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
2006
		echo
2007
		echo
2007
		echo "                   Hit 'Enter' to continue"
2008
		echo "                   Hit 'Enter' to continue"
2008
	fi
2009
	fi
2009
	sleep 2
2010
	sleep 2
2010
	if [ "$mode" != "update" ]
2011
	if [ "$mode" != "update" ]
2011
	then
2012
	then
2012
		read a
2013
		read a
2013
	fi
2014
	fi
2014
	clear
2015
	clear
2015
	reboot
2016
	reboot
2016
} # End post_install ()
2017
} # End post_install ()
2017
 
2018
 
2018
#################################
2019
#################################
2019
#  	Main Install loop  	#
2020
#  	Main Install loop  	#
2020
#################################
2021
#################################
2021
dir_exec=`dirname "$0"`
2022
dir_exec=`dirname "$0"`
2022
if [ $dir_exec != "." ]
2023
if [ $dir_exec != "." ]
2023
then
2024
then
2024
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2025
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2025
	echo "Launch this program from the ALCASAR archive directory"
2026
	echo "Launch this program from the ALCASAR archive directory"
2026
	exit 0
2027
	exit 0
2027
fi
2028
fi
2028
VERSION=`cat $DIR_INSTALL/VERSION`
2029
VERSION=`cat $DIR_INSTALL/VERSION`
2029
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2030
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2030
nb_args=$#
2031
nb_args=$#
2031
args=$1
2032
args=$1
2032
if [ $nb_args -eq 0 ]
2033
if [ $nb_args -eq 0 ]
2033
then
2034
then
2034
	nb_args=1
2035
	nb_args=1
2035
	args="-h"
2036
	args="-h"
2036
fi
2037
fi
2037
chmod -R u+x $DIR_SCRIPTS/*
2038
chmod -R u+x $DIR_SCRIPTS/*
2038
case $args in
2039
case $args in
2039
	-\? | -h* | --h*)
2040
	-\? | -h* | --h*)
2040
		echo "$usage"
2041
		echo "$usage"
2041
		exit 0
2042
		exit 0
2042
		;;
2043
		;;
2043
	-i | --install)
2044
	-i | --install)
2044
		header_install
2045
		header_install
2045
		license
2046
		license
2046
		header_install
2047
		header_install
2047
		testing
2048
		testing
2048
# RPMs install
2049
# RPMs install
2049
		$DIR_SCRIPTS/alcasar-urpmi.sh
2050
		$DIR_SCRIPTS/alcasar-urpmi.sh
2050
		if [ "$?" != "0" ]
2051
		if [ "$?" != "0" ]
2051
		then
2052
		then
2052
			exit 0
2053
			exit 0
2053
		fi
2054
		fi
2054
		if [ -e $CONF_FILE ]
2055
		if [ -e $CONF_FILE ]
2055
		then
2056
		then
2056
# Uninstall the running version
2057
# Uninstall the running version
2057
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2058
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2058
		fi
2059
		fi
2059
# Test if manual update	
2060
# Test if manual update	
2060
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2061
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2061
		then
2062
		then
2062
			header_install
2063
			header_install
2063
			if [ $Lang == "fr" ]
2064
			if [ $Lang == "fr" ]
2064
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2065
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2065
				else echo "The configuration file of an old version has been found";
2066
				else echo "The configuration file of an old version has been found";
2066
			fi
2067
			fi
2067
			response=0
2068
			response=0
2068
			PTN='^[oOnNyY]$'
2069
			PTN='^[oOnNyY]$'
2069
			until [[ $(expr $response : $PTN) -gt 0 ]]
2070
			until [[ $(expr $response : $PTN) -gt 0 ]]
2070
			do
2071
			do
2071
				if [ $Lang == "fr" ]
2072
				if [ $Lang == "fr" ]
2072
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2073
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2073
					else echo -n "Do you want to use it (Y/n)?";
2074
					else echo -n "Do you want to use it (Y/n)?";
2074
				 fi
2075
				 fi
2075
				read response
2076
				read response
2076
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2077
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2077
				then rm -f /tmp/alcasar-conf*
2078
				then rm -f /tmp/alcasar-conf*
2078
				fi
2079
				fi
2079
			done
2080
			done
2080
		fi
2081
		fi
2081
# Test if update
2082
# Test if update
2082
		if [ -e /tmp/alcasar-conf* ] 
2083
		if [ -e /tmp/alcasar-conf* ] 
2083
		then
2084
		then
2084
			if [ $Lang == "fr" ]
2085
			if [ $Lang == "fr" ]
2085
				then echo "#### Installation avec mise à jour ####";
2086
				then echo "#### Installation avec mise à jour ####";
2086
				else echo "#### Installation with update     ####";
2087
				else echo "#### Installation with update     ####";
2087
			fi
2088
			fi
2088
# Extract the central configuration file
2089
# Extract the central configuration file
2089
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2090
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2090
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2091
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2091
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2092
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2092
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2093
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2093
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2094
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2094
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2095
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2095
			mode="update"
2096
			mode="update"
2096
		fi
2097
		fi
2097
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd post_install
2098
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd post_install
2098
		do
2099
		do
2099
			$func
2100
			$func
2100
# echo "*** 'debug' : end of function $func ***"; read a
2101
# echo "*** 'debug' : end of function $func ***"; read a
2101
		done
2102
		done
2102
		;;
2103
		;;
2103
	-u | --uninstall)
2104
	-u | --uninstall)
2104
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2105
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2105
		then
2106
		then
2106
			if [ $Lang == "fr" ]
2107
			if [ $Lang == "fr" ]
2107
				then echo "ALCASAR n'est pas installé!";
2108
				then echo "ALCASAR n'est pas installé!";
2108
				else echo "ALCASAR isn't installed!";
2109
				else echo "ALCASAR isn't installed!";
2109
			fi
2110
			fi
2110
			exit 0
2111
			exit 0
2111
		fi
2112
		fi
2112
		response=0
2113
		response=0
2113
		PTN='^[oOnN]$'
2114
		PTN='^[oOnN]$'
2114
		until [[ $(expr $response : $PTN) -gt 0 ]]
2115
		until [[ $(expr $response : $PTN) -gt 0 ]]
2115
		do
2116
		do
2116
			if [ $Lang == "fr" ]
2117
			if [ $Lang == "fr" ]
2117
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2118
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2118
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2119
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2119
			fi
2120
			fi
2120
			read response
2121
			read response
2121
		done
2122
		done
2122
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2123
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2123
		then
2124
		then
2124
			$DIR_SCRIPTS/alcasar-conf.sh --create
2125
			$DIR_SCRIPTS/alcasar-conf.sh --create
2125
		else	
2126
		else	
2126
			rm -f /tmp/alcasar-conf*
2127
			rm -f /tmp/alcasar-conf*
2127
		fi
2128
		fi
2128
# Uninstall the running version
2129
# Uninstall the running version
2129
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2130
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2130
		;;
2131
		;;
2131
	*)
2132
	*)
2132
		echo "Argument inconnu :$1";
2133
		echo "Argument inconnu :$1";
2133
		echo "Unknown argument :$1";
2134
		echo "Unknown argument :$1";
2134
		echo "$usage"
2135
		echo "$usage"
2135
		exit 1
2136
		exit 1
2136
		;;
2137
		;;
2137
esac
2138
esac
2138
# end of script
2139
# end of script
2139
 
2140
 
2140
 
2141