Subversion Repositories ALCASAR

Rev

Rev 1631 | Rev 1672 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1631 Rev 1668
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 1631 2015-05-26 13:33:01Z richard $ 
2
#  $Id: alcasar.sh 1668 2015-07-19 22:17:07Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
23
 
23
 
24
# Options :
24
# Options :
25
#       -i or --install
25
#       -i or --install
26
#       -u or --uninstall
26
#       -u or --uninstall
27
 
27
 
28
# Functions :
28
# Functions :
29
#	testing			: connectivity tests, free space test and mageia version test
29
#	testing			: connectivity tests, free space test and mageia version test
30
#	init			: Installation of RPM and scripts
30
#	init			: Installation of RPM and scripts
31
#	network			: Network parameters
31
#	network			: Network parameters
32
#	ACC			: ALCASAR Control Center installation
32
#	ACC			: ALCASAR Control Center installation
33
#	CA			: Certification Authority initialization
33
#	CA			: Certification Authority initialization
34
#	init_db			: Initilization of radius database managed with MariaDB
34
#	init_db			: Initilization of radius database managed with MariaDB
35
#	radius			: FreeRadius initialisation
35
#	radius			: FreeRadius initialisation
36
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
36
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
37
#	chilli			: coovachilli initialisation (+authentication page)
37
#	chilli			: coovachilli initialisation (+authentication page)
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	antivirus		: HAVP + libclamav configuration
39
#	antivirus		: HAVP + libclamav configuration
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	vnstat			: little network stat daemon
44
#	vnstat			: little network stat daemon
45
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
46
#	cron			: Logs export + watchdog + connexion statistics
46
#	cron			: Logs export + watchdog + connexion statistics
47
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	fail2ban		: Fail2ban IDS installation and configuration
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
49
#	post_install		: Security, log rotation, etc.
49
#	post_install		: Security, log rotation, etc.
50
 
50
 
51
DATE=`date '+%d %B %Y - %Hh%M'`
51
DATE=`date '+%d %B %Y - %Hh%M'`
52
DATE_SHORT=`date '+%d/%m/%Y'`
52
DATE_SHORT=`date '+%d/%m/%Y'`
53
Lang=`echo $LANG|cut -c 1-2`
53
Lang=`echo $LANG|cut -c 1-2`
54
mode="install"
54
mode="install"
55
# ******* Files parameters - paramètres fichiers *********
55
# ******* Files parameters - paramètres fichiers *********
56
DIR_INSTALL=`pwd`				# current directory 
56
DIR_INSTALL=`pwd`				# current directory 
57
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
57
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
58
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
58
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
59
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
59
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
60
DIR_WEB="/var/www/html"				# directory of APACHE
60
DIR_WEB="/var/www/html"				# directory of APACHE
61
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
61
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
62
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
62
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
63
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
63
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
64
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
64
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
65
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
65
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
66
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
66
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
67
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
67
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
68
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
68
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
69
# ******* DBMS parameters - paramètres SGBD ********
69
# ******* DBMS parameters - paramètres SGBD ********
70
DB_RADIUS="radius"				# database name used by FreeRadius server
70
DB_RADIUS="radius"				# database name used by FreeRadius server
71
DB_USER="radius"				# user name allows to request the users database
71
DB_USER="radius"				# user name allows to request the users database
72
DB_GAMMU="gammu"				# database name used by Gammu-smsd
72
DB_GAMMU="gammu"				# database name used by Gammu-smsd
73
# ******* Network parameters - paramètres réseau *******
73
# ******* Network parameters - paramètres réseau *******
74
HOSTNAME="alcasar"				# default hostname
74
HOSTNAME="alcasar"				# default hostname
75
DOMAIN="localdomain"				# default local domain
75
DOMAIN="localdomain"				# default local domain
76
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
76
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
77
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
77
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
78
MTU="1500"
78
MTU="1500"
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
80
# ****** Paths - chemin des commandes *******
80
# ****** Paths - chemin des commandes *******
81
SED="/bin/sed -i"
81
SED="/bin/sed -i"
82
# ****************** End of global parameters *********************
82
# ****************** End of global parameters *********************
83
 
83
 
84
license ()
84
license ()
85
{
85
{
86
	if [ $Lang == "fr" ]
86
	if [ $Lang == "fr" ]
87
	then
87
	then
88
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
88
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
89
	else
89
	else
90
		cat $DIR_INSTALL/gpl-warning.txt | more
90
		cat $DIR_INSTALL/gpl-warning.txt | more
91
	fi
91
	fi
92
	response=0
92
	response=0
93
	PTN='^[oOyYnN]$'
93
	PTN='^[oOyYnN]$'
94
	until [[ $(expr $response : $PTN) -gt 0 ]]
94
	until [[ $(expr $response : $PTN) -gt 0 ]]
95
	do
95
	do
96
		if [ $Lang == "fr" ]
96
		if [ $Lang == "fr" ]
97
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
97
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
98
			else echo -n "Do you accept the terms of this license (Y/n)? : "
98
			else echo -n "Do you accept the terms of this license (Y/n)? : "
99
		fi
99
		fi
100
		read response
100
		read response
101
	done
101
	done
102
	if [ "$response" = "n" ] || [ "$response" = "N" ]
102
	if [ "$response" = "n" ] || [ "$response" = "N" ]
103
	then
103
	then
104
		exit 1
104
		exit 1
105
	fi
105
	fi
106
}
106
}
107
 
107
 
108
header_install ()
108
header_install ()
109
{
109
{
110
	clear
110
	clear
111
	echo "-----------------------------------------------------------------------------"
111
	echo "-----------------------------------------------------------------------------"
112
	echo "                     ALCASAR V$VERSION Installation"
112
	echo "                     ALCASAR V$VERSION Installation"
113
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
113
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
114
	echo "-----------------------------------------------------------------------------"
114
	echo "-----------------------------------------------------------------------------"
115
}
115
}
116
 
116
 
117
##################################################################
117
##################################################################
118
##			Function "testing"			##
118
##			Function "testing"			##
119
## - Test of Mageia version					##
119
## - Test of Mageia version					##
120
## - Test of ALCASAR version (if already installed)		##
120
## - Test of ALCASAR version (if already installed)		##
121
## - Test of free space on /var  (>10G)				##
121
## - Test of free space on /var  (>10G)				##
122
## - Test of Internet access					##
122
## - Test of Internet access					##
123
##################################################################
123
##################################################################
124
testing ()
124
testing ()
125
{
125
{
126
# Test of Mageia version
126
# Test of Mageia version
127
# extract the current Mageia version and hardware architecture (i586 ou X64)
127
# extract the current Mageia version and hardware architecture (i586 ou X64)
128
	fic=`cat /etc/product.id`
128
	fic=`cat /etc/product.id`
129
	unknown_os=0
129
	unknown_os=0
130
	old="$IFS"
130
	old="$IFS"
131
	IFS=","
131
	IFS=","
132
	set $fic
132
	set $fic
133
	for i in $*
133
	for i in $*
134
	do
134
	do
135
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
135
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
136
			then 
136
			then 
137
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
137
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
138
			unknown_os=`expr $unknown_os + 1`
138
			unknown_os=`expr $unknown_os + 1`
139
		fi
139
		fi
140
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
140
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
141
			then 
141
			then 
142
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
142
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
143
			unknown_os=`expr $unknown_os + 1`
143
			unknown_os=`expr $unknown_os + 1`
144
		fi
144
		fi
145
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
145
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
146
			then 
146
			then 
147
			ARCH=`echo $i|cut -d"=" -f2`
147
			ARCH=`echo $i|cut -d"=" -f2`
148
			unknown_os=`expr $unknown_os + 1`
148
			unknown_os=`expr $unknown_os + 1`
149
		fi
149
		fi
150
	done
150
	done
151
	IFS="$old"
151
	IFS="$old"
152
# Test if ALCASAR is already installed
152
# Test if ALCASAR is already installed
153
	if [ -e $CONF_FILE ]
153
	if [ -e $CONF_FILE ]
154
	then
154
	then
155
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
155
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
156
		if [ $Lang == "fr" ]
156
		if [ $Lang == "fr" ]
157
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
157
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
158
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
158
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
159
		fi
159
		fi
160
		response=0
160
		response=0
161
		PTN='^[oOnNyY]$'
161
		PTN='^[oOnNyY]$'
162
		until [[ $(expr $response : $PTN) -gt 0 ]]
162
		until [[ $(expr $response : $PTN) -gt 0 ]]
163
		do
163
		do
164
			if [ $Lang == "fr" ]
164
			if [ $Lang == "fr" ]
165
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
165
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
166
				else echo -n "Do you want to update (Y/n)?";
166
				else echo -n "Do you want to update (Y/n)?";
167
			 fi
167
			 fi
168
			read response
168
			read response
169
		done
169
		done
170
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
170
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
171
		then
171
		then
172
			rm -f /tmp/alcasar-conf*
172
			rm -f /tmp/alcasar-conf*
173
		else
173
		else
174
# Create the current conf file
174
# Create the current conf file
175
			$DIR_SCRIPTS/alcasar-conf.sh --create
175
			$DIR_SCRIPTS/alcasar-conf.sh --create
176
			mode="update"
176
			mode="update"
177
		fi
177
		fi
178
	fi
178
	fi
179
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
179
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
180
		then
180
		then
181
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
181
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
182
			then
182
			then
183
			echo
183
			echo
184
			if [ $Lang == "fr" ]
184
			if [ $Lang == "fr" ]
185
				then	
185
				then	
186
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
186
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
187
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
187
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
188
				echo "2 - Installez Linux-Mageia 4.1 (cf. doc d'installation)"
188
				echo "2 - Installez Linux-Mageia 4.1 (cf. doc d'installation)"
189
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
189
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
190
			else
190
			else
191
				echo "The automatic update of ALCASAR can't be performed."
191
				echo "The automatic update of ALCASAR can't be performed."
192
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
192
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
193
				echo "2 - Install Linux-Mageia 4.1 (cf. installation doc)"
193
				echo "2 - Install Linux-Mageia 4.1 (cf. installation doc)"
194
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
194
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
195
			fi
195
			fi
196
		else
196
		else
197
			if [ $Lang == "fr" ]
197
			if [ $Lang == "fr" ]
198
				then	
198
				then	
199
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
199
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
200
			else
200
			else
201
				echo "The installation of ALCASAR can't be performed."
201
				echo "The installation of ALCASAR can't be performed."
202
			fi
202
			fi
203
		fi
203
		fi
204
		echo
204
		echo
205
		if [ $Lang == "fr" ]
205
		if [ $Lang == "fr" ]
206
			then	
206
			then	
207
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
207
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
208
		else
208
		else
209
			echo "The OS must be replaced (Mageia4.1)"
209
			echo "The OS must be replaced (Mageia4.1)"
210
		fi
210
		fi
211
		exit 0
211
		exit 0
212
	fi
212
	fi
213
	if [ ! -d /var/log/netflow/porttracker ]
213
	if [ ! -d /var/log/netflow/porttracker ]
214
		then
214
		then
215
# Test of free space on /var
215
# Test of free space on /var
216
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
216
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
217
		if [ $free_space -lt 10 ]
217
		if [ $free_space -lt 10 ]
218
			then
218
			then
219
			if [ $Lang == "fr" ]
219
			if [ $Lang == "fr" ]
220
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
220
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
221
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
221
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
222
			fi
222
			fi
223
		exit 0
223
		exit 0
224
		fi
224
		fi
225
	fi
225
	fi
226
	if [ $Lang == "fr" ]
226
	if [ $Lang == "fr" ]
227
		then echo -n "Tests des paramètres réseau : "
227
		then echo -n "Tests des paramètres réseau : "
228
		else echo -n "Network parameters tests : "
228
		else echo -n "Network parameters tests : "
229
	fi
229
	fi
230
# Test of Ethernet links state
230
# Test of Ethernet links state
231
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
231
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
232
	for i in $DOWN_IF
232
	for i in $DOWN_IF
233
	do
233
	do
234
		if [ $Lang == "fr" ]
234
		if [ $Lang == "fr" ]
235
		then 
235
		then 
236
			echo "Échec"
236
			echo "Échec"
237
			echo "Le lien réseau de la carte $i n'est pas actif."
237
			echo "Le lien réseau de la carte $i n'est pas actif."
238
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
238
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
239
		else
239
		else
240
			echo "Failed"
240
			echo "Failed"
241
			echo "The link state of $i interface is down."
241
			echo "The link state of $i interface is down."
242
			echo "Make sure that this network card is connected to a switch or an A.P."
242
			echo "Make sure that this network card is connected to a switch or an A.P."
243
		fi
243
		fi
244
		exit 0
244
		exit 0
245
	done
245
	done
246
	echo -n "."
246
	echo -n "."
247
 
247
 
248
# Test EXTIF config files
248
# Test EXTIF config files
249
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
249
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
250
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
250
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
251
	PUBLIC_GATEWAY=`ip route list|grep ^default|cut -d" " -f3`
251
	PUBLIC_GATEWAY=`ip route list|grep ^default|cut -d" " -f3`
252
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
252
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
253
	then
253
	then
254
		if [ $Lang == "fr" ]
254
		if [ $Lang == "fr" ]
255
		then 
255
		then 
256
			echo "Échec"
256
			echo "Échec"
257
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
257
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
258
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
258
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
259
			echo "Appliquez les changements : 'systemctl restart network'"
259
			echo "Appliquez les changements : 'systemctl restart network'"
260
		else
260
		else
261
			echo "Failed"
261
			echo "Failed"
262
			echo "The Internet connected network card ($EXTIF) isn't well configured."
262
			echo "The Internet connected network card ($EXTIF) isn't well configured."
263
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
263
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
264
			echo "Apply the new configuration 'systemctl restart network'"
264
			echo "Apply the new configuration 'systemctl restart network'"
265
		fi
265
		fi
266
		echo "DEVICE=$EXTIF"
266
		echo "DEVICE=$EXTIF"
267
		echo "IPADDR="
267
		echo "IPADDR="
268
		echo "NETMASK="
268
		echo "NETMASK="
269
		echo "GATEWAY="
269
		echo "GATEWAY="
270
		echo "DNS1="
270
		echo "DNS1="
271
		echo "DNS2="
271
		echo "DNS2="
272
		echo "ONBOOT=yes"
272
		echo "ONBOOT=yes"
273
		exit 0
273
		exit 0
274
	fi
274
	fi
275
	echo -n "."
275
	echo -n "."
276
 
276
 
277
# Test if router is alive (Box FAI)
277
# Test if router is alive (Box FAI)
278
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
278
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
279
		if [ $Lang == "fr" ]
279
		if [ $Lang == "fr" ]
280
		then 
280
		then 
281
			echo "Échec"
281
			echo "Échec"
282
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
282
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
283
			echo "Réglez ce problème puis relancez ce script."
283
			echo "Réglez ce problème puis relancez ce script."
284
		else
284
		else
285
			echo "Failed"
285
			echo "Failed"
286
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
286
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
287
			echo "Resolv this problem, then restart this script."
287
			echo "Resolv this problem, then restart this script."
288
		fi
288
		fi
289
		exit 0
289
		exit 0
290
	fi
290
	fi
291
	echo -n "."
291
	echo -n "."
292
# On teste le lien vers le routeur par defaut
292
# On teste le lien vers le routeur par defaut
293
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
293
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
294
	if [ $(expr $arp_reply) -eq 0 ]
294
	if [ $(expr $arp_reply) -eq 0 ]
295
	       	then
295
	       	then
296
		if [ $Lang == "fr" ]
296
		if [ $Lang == "fr" ]
297
		then 
297
		then 
298
			echo "Échec"
298
			echo "Échec"
299
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
299
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
300
			echo "Réglez ce problème puis relancez ce script."
300
			echo "Réglez ce problème puis relancez ce script."
301
		else
301
		else
302
			echo "Failed"
302
			echo "Failed"
303
			echo "The Internet gateway doesn't answered"
303
			echo "The Internet gateway doesn't answered"
304
			echo "Resolv this problem, then restart this script."
304
			echo "Resolv this problem, then restart this script."
305
		fi
305
		fi
306
		exit 0
306
		exit 0
307
	fi
307
	fi
308
	echo -n "."
308
	echo -n "."
309
# On teste la connectivité Internet
309
# On teste la connectivité Internet
310
	rm -rf /tmp/con_ok.html
310
	rm -rf /tmp/con_ok.html
311
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
311
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
312
	if [ ! -e /tmp/con_ok.html ]
312
	if [ ! -e /tmp/con_ok.html ]
313
	then
313
	then
314
		if [ $Lang == "fr" ]
314
		if [ $Lang == "fr" ]
315
		then 
315
		then 
316
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
316
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
317
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
317
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
318
			echo "Vérifiez la validité des adresses IP des DNS."
318
			echo "Vérifiez la validité des adresses IP des DNS."
319
		else
319
		else
320
			echo "The Internet connection try failed (google.fr)."
320
			echo "The Internet connection try failed (google.fr)."
321
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
321
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
322
			echo "Verify the DNS IP addresses"
322
			echo "Verify the DNS IP addresses"
323
		fi
323
		fi
324
		exit 0
324
		exit 0
325
	fi
325
	fi
326
	rm -rf /tmp/con_ok.html
326
	rm -rf /tmp/con_ok.html
327
	echo ". : ok"
327
	echo ". : ok"
328
} # end of testing ()
328
} # end of testing ()
329
 
329
 
330
##################################################################
330
##################################################################
331
##			Function "init"				##
331
##			Function "init"				##
332
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
332
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
333
## - Installation et modification des scripts du portail	##
333
## - Installation et modification des scripts du portail	##
334
##################################################################
334
##################################################################
335
init ()
335
init ()
336
{
336
{
337
	if [ "$mode" != "update" ]
337
	if [ "$mode" != "update" ]
338
	then
338
	then
339
# On affecte le nom d'organisme
339
# On affecte le nom d'organisme
340
		header_install
340
		header_install
341
		ORGANISME=!
341
		ORGANISME=!
342
		PTN='^[a-zA-Z0-9-]*$'
342
		PTN='^[a-zA-Z0-9-]*$'
343
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
343
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
344
                do
344
                do
345
			if [ $Lang == "fr" ]
345
			if [ $Lang == "fr" ]
346
			       	then echo -n "Entrez le nom de votre organisme : "
346
			       	then echo -n "Entrez le nom de votre organisme : "
347
				else echo -n "Enter the name of your organism : "
347
				else echo -n "Enter the name of your organism : "
348
			fi
348
			fi
349
			read ORGANISME
349
			read ORGANISME
350
			if [ "$ORGANISME" == "" ]
350
			if [ "$ORGANISME" == "" ]
351
				then
351
				then
352
				ORGANISME=!
352
				ORGANISME=!
353
			fi
353
			fi
354
		done
354
		done
355
	fi
355
	fi
356
# On crée aléatoirement les mots de passe et les secrets partagés
356
# On crée aléatoirement les mots de passe et les secrets partagés
357
	rm -f $PASSWD_FILE
357
	rm -f $PASSWD_FILE
358
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
358
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
359
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
359
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
360
	echo "$grubpwd" >> $PASSWD_FILE
360
	echo "$grubpwd" >> $PASSWD_FILE
361
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
361
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
362
	$SED "/^password.*/d" /boot/grub/menu.lst
362
	$SED "/^password.*/d" /boot/grub/menu.lst
363
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
363
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
364
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
364
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
365
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
365
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
366
	echo "root / $mysqlpwd" >> $PASSWD_FILE
366
	echo "root / $mysqlpwd" >> $PASSWD_FILE
367
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
367
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
368
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
368
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
369
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
369
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
370
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
370
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
371
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
371
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
372
	echo "$secretuam" >> $PASSWD_FILE
372
	echo "$secretuam" >> $PASSWD_FILE
373
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
373
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
374
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
374
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
375
	echo "$secretradius" >> $PASSWD_FILE
375
	echo "$secretradius" >> $PASSWD_FILE
376
	chmod 640 $PASSWD_FILE
376
	chmod 640 $PASSWD_FILE
377
# Scripts and conf files copy 
377
# Scripts and conf files copy 
378
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
378
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
379
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
379
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
380
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
380
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
381
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
381
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
382
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
382
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
383
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
383
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
384
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
384
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
385
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
385
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
386
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
386
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
387
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
387
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
388
# generate central conf file
388
# generate central conf file
389
	cat <<EOF > $CONF_FILE
389
	cat <<EOF > $CONF_FILE
390
##########################################
390
##########################################
391
##                                      ##
391
##                                      ##
392
##          ALCASAR Parameters          ##
392
##          ALCASAR Parameters          ##
393
##                                      ##
393
##                                      ##
394
##########################################
394
##########################################
395
 
395
 
396
INSTALL_DATE=$DATE
396
INSTALL_DATE=$DATE
397
VERSION=$VERSION
397
VERSION=$VERSION
398
ORGANISM=$ORGANISME
398
ORGANISM=$ORGANISME
399
DOMAIN=$DOMAIN
399
DOMAIN=$DOMAIN
400
EOF
400
EOF
401
	chmod o-rwx $CONF_FILE
401
	chmod o-rwx $CONF_FILE
402
} # End of init ()
402
} # End of init ()
403
 
403
 
404
##################################################################
404
##################################################################
405
##			Function "network"			##
405
##			Function "network"			##
406
## - Définition du plan d'adressage du réseau de consultation	##
406
## - Définition du plan d'adressage du réseau de consultation	##
407
## - Nommage DNS du système 					##
407
## - Nommage DNS du système 					##
408
## - Configuration de l'interface INTIF (réseau de consultation)##
408
## - Configuration de l'interface INTIF (réseau de consultation)##
409
## - Modification du fichier /etc/hosts				##
409
## - Modification du fichier /etc/hosts				##
410
## - Configuration du serveur de temps (NTP)			##
410
## - Configuration du serveur de temps (NTP)			##
411
## - Renseignement des fichiers hosts.allow et hosts.deny	##
411
## - Renseignement des fichiers hosts.allow et hosts.deny	##
412
##################################################################
412
##################################################################
413
network ()
413
network ()
414
{
414
{
415
	header_install
415
	header_install
416
	if [ "$mode" != "update" ]
416
	if [ "$mode" != "update" ]
417
		then
417
		then
418
		if [ $Lang == "fr" ]
418
		if [ $Lang == "fr" ]
419
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
419
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
420
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
420
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
421
		fi
421
		fi
422
		response=0
422
		response=0
423
		PTN='^[oOyYnN]$'
423
		PTN='^[oOyYnN]$'
424
		until [[ $(expr $response : $PTN) -gt 0 ]]
424
		until [[ $(expr $response : $PTN) -gt 0 ]]
425
		do
425
		do
426
			if [ $Lang == "fr" ]
426
			if [ $Lang == "fr" ]
427
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
427
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
428
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
428
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
429
			fi
429
			fi
430
			read response
430
			read response
431
		done
431
		done
432
		if [ "$response" = "n" ] || [ "$response" = "N" ]
432
		if [ "$response" = "n" ] || [ "$response" = "N" ]
433
		then
433
		then
434
			PRIVATE_IP_MASK="0"
434
			PRIVATE_IP_MASK="0"
435
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
435
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
436
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
436
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
437
			do
437
			do
438
				if [ $Lang == "fr" ]
438
				if [ $Lang == "fr" ]
439
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
439
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
440
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
440
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
441
				fi
441
				fi
442
				read PRIVATE_IP_MASK
442
				read PRIVATE_IP_MASK
443
			done
443
			done
444
		else
444
		else
445
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
445
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
446
		fi
446
		fi
447
	else
447
	else
448
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
448
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
449
		rm -rf conf/etc/alcasar.conf
449
		rm -rf conf/etc/alcasar.conf
450
	fi
450
	fi
451
# Define LAN side global parameters
451
# Define LAN side global parameters
452
	hostname $HOSTNAME.$DOMAIN
452
	hostname $HOSTNAME.$DOMAIN
453
	echo $HOSTNAME.$DOMAIN > /etc/hostname
453
	echo $HOSTNAME.$DOMAIN > /etc/hostname
454
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
454
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
455
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
455
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
456
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
456
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
457
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
457
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
458
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
458
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
459
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
459
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
460
		then
460
		then
461
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
461
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
462
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
462
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
463
	fi	
463
	fi	
464
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
464
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
465
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
465
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
466
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
466
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
467
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
467
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
468
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
468
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
469
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
469
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
470
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
470
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
471
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
471
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
472
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
472
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
473
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
473
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
474
# Define Internet parameters
474
# Define Internet parameters
475
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
475
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
476
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
476
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
477
	if [ $nb_dns == 2 ]
477
	if [ $nb_dns == 2 ]
478
		then
478
		then
479
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
479
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
480
	fi
480
	fi
481
	DNS1=${DNS1:=208.67.220.220}
481
	DNS1=${DNS1:=208.67.220.220}
482
	DNS2=${DNS2:=208.67.222.222}
482
	DNS2=${DNS2:=208.67.222.222}
483
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
483
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
484
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
484
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
485
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
485
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
486
# Wrtie the conf file
486
# Wrtie the conf file
487
	echo "EXTIF=$EXTIF" >> $CONF_FILE
487
	echo "EXTIF=$EXTIF" >> $CONF_FILE
488
	echo "INTIF=$INTIF" >> $CONF_FILE
488
	echo "INTIF=$INTIF" >> $CONF_FILE
489
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
489
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
490
	if [ $IP_SETTING == "dhcp" ]
490
	if [ $IP_SETTING == "dhcp" ]
491
		then
491
		then
492
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
492
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
493
		echo "GW=dhcp" >> $CONF_FILE
493
		echo "GW=dhcp" >> $CONF_FILE
494
	else
494
	else
495
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
495
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
496
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
496
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
497
	fi
497
	fi
498
	echo "DNS1=$DNS1" >> $CONF_FILE
498
	echo "DNS1=$DNS1" >> $CONF_FILE
499
	echo "DNS2=$DNS2" >> $CONF_FILE
499
	echo "DNS2=$DNS2" >> $CONF_FILE
500
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
500
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
501
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
501
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
502
	echo "DHCP=on" >> $CONF_FILE
502
	echo "DHCP=on" >> $CONF_FILE
503
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
503
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
504
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
504
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
505
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
505
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
506
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
506
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
507
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
507
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
508
	echo "INT_DNS_IP=none" >> $CONF_FILE
508
	echo "INT_DNS_IP=none" >> $CONF_FILE
509
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
509
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
510
# network default
510
# network default
511
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
511
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
512
	cat <<EOF > /etc/sysconfig/network
512
	cat <<EOF > /etc/sysconfig/network
513
NETWORKING=yes
513
NETWORKING=yes
514
HOSTNAME="$HOSTNAME.$DOMAIN"
514
HOSTNAME="$HOSTNAME.$DOMAIN"
515
FORWARD_IPV4=true
515
FORWARD_IPV4=true
516
EOF
516
EOF
517
# /etc/hosts config
517
# /etc/hosts config
518
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
518
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
519
	cat <<EOF > /etc/hosts
519
	cat <<EOF > /etc/hosts
520
127.0.0.1	localhost
520
127.0.0.1	localhost
521
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
521
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
522
EOF
522
EOF
523
# EXTIF (Internet) config
523
# EXTIF (Internet) config
524
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
524
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
525
	if [ $IP_SETTING == "dhcp" ]
525
	if [ $IP_SETTING == "dhcp" ]
526
		then
526
		then
527
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
527
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
528
DEVICE=$EXTIF
528
DEVICE=$EXTIF
529
BOOTPROTO=dhcp
529
BOOTPROTO=dhcp
530
DNS1=127.0.0.1
530
DNS1=127.0.0.1
531
PEERDNS=no
531
PEERDNS=no
532
RESOLV_MODS=yes
532
RESOLV_MODS=yes
533
ONBOOT=yes
533
ONBOOT=yes
534
NOZEROCONF=yes
534
NOZEROCONF=yes
535
METRIC=10
535
METRIC=10
536
MII_NOT_SUPPORTED=yes
536
MII_NOT_SUPPORTED=yes
537
IPV6INIT=no
537
IPV6INIT=no
538
IPV6TO4INIT=no
538
IPV6TO4INIT=no
539
ACCOUNTING=no
539
ACCOUNTING=no
540
USERCTL=no
540
USERCTL=no
541
MTU=$MTU
541
MTU=$MTU
542
EOF
542
EOF
543
		else	
543
		else	
544
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
544
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
545
DEVICE=$EXTIF
545
DEVICE=$EXTIF
546
BOOTPROTO=static
546
BOOTPROTO=static
547
IPADDR=$PUBLIC_IP
547
IPADDR=$PUBLIC_IP
548
NETMASK=$PUBLIC_NETMASK
548
NETMASK=$PUBLIC_NETMASK
549
GATEWAY=$PUBLIC_GATEWAY
549
GATEWAY=$PUBLIC_GATEWAY
550
DNS1=127.0.0.1
550
DNS1=127.0.0.1
551
RESOLV_MODS=yes
551
RESOLV_MODS=yes
552
ONBOOT=yes
552
ONBOOT=yes
553
METRIC=10
553
METRIC=10
554
NOZEROCONF=yes
554
NOZEROCONF=yes
555
MII_NOT_SUPPORTED=yes
555
MII_NOT_SUPPORTED=yes
556
IPV6INIT=no
556
IPV6INIT=no
557
IPV6TO4INIT=no
557
IPV6TO4INIT=no
558
ACCOUNTING=no
558
ACCOUNTING=no
559
USERCTL=no
559
USERCTL=no
560
MTU=$MTU
560
MTU=$MTU
561
EOF
561
EOF
562
	fi
562
	fi
563
# Config INTIF (consultation LAN) in normal mode
563
# Config INTIF (consultation LAN) in normal mode
564
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
564
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
565
DEVICE=$INTIF
565
DEVICE=$INTIF
566
BOOTPROTO=static
566
BOOTPROTO=static
567
ONBOOT=yes
567
ONBOOT=yes
568
NOZEROCONF=yes
568
NOZEROCONF=yes
569
MII_NOT_SUPPORTED=yes
569
MII_NOT_SUPPORTED=yes
570
IPV6INIT=no
570
IPV6INIT=no
571
IPV6TO4INIT=no
571
IPV6TO4INIT=no
572
ACCOUNTING=no
572
ACCOUNTING=no
573
USERCTL=no
573
USERCTL=no
574
EOF
574
EOF
575
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
575
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
576
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
576
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
577
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
577
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
578
DEVICE=$INTIF
578
DEVICE=$INTIF
579
BOOTPROTO=static
579
BOOTPROTO=static
580
IPADDR=$PRIVATE_IP
580
IPADDR=$PRIVATE_IP
581
NETMASK=$PRIVATE_NETMASK
581
NETMASK=$PRIVATE_NETMASK
582
ONBOOT=yes
582
ONBOOT=yes
583
METRIC=10
583
METRIC=10
584
NOZEROCONF=yes
584
NOZEROCONF=yes
585
MII_NOT_SUPPORTED=yes
585
MII_NOT_SUPPORTED=yes
586
IPV6INIT=no
586
IPV6INIT=no
587
IPV6TO4INIT=no
587
IPV6TO4INIT=no
588
ACCOUNTING=no
588
ACCOUNTING=no
589
USERCTL=no
589
USERCTL=no
590
EOF
590
EOF
591
# Mise à l'heure du serveur
591
# Mise à l'heure du serveur
592
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
592
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
593
	cat <<EOF > /etc/ntp/step-tickers
593
	cat <<EOF > /etc/ntp/step-tickers
594
0.fr.pool.ntp.org	# adapt to your country
594
0.fr.pool.ntp.org	# adapt to your country
595
1.fr.pool.ntp.org
595
1.fr.pool.ntp.org
596
2.fr.pool.ntp.org
596
2.fr.pool.ntp.org
597
EOF
597
EOF
598
# Configuration du serveur de temps (sur lui même)
598
# Configuration du serveur de temps (sur lui même)
599
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
599
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
600
	cat <<EOF > /etc/ntp.conf
600
	cat <<EOF > /etc/ntp.conf
601
server 0.fr.pool.ntp.org	# adapt to your country
601
server 0.fr.pool.ntp.org	# adapt to your country
602
server 1.fr.pool.ntp.org
602
server 1.fr.pool.ntp.org
603
server 2.fr.pool.ntp.org
603
server 2.fr.pool.ntp.org
604
server 127.127.1.0   		# local clock si NTP internet indisponible ...
604
server 127.127.1.0   		# local clock si NTP internet indisponible ...
605
fudge 127.127.1.0 stratum 10
605
fudge 127.127.1.0 stratum 10
606
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
606
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
607
restrict 127.0.0.1
607
restrict 127.0.0.1
608
driftfile /var/lib/ntp/drift
608
driftfile /var/lib/ntp/drift
609
logfile /var/log/ntp.log
609
logfile /var/log/ntp.log
610
disable monitor
610
disable monitor
611
EOF
611
EOF
612
 
612
 
613
	chown -R ntp:ntp /var/lib/ntp
613
	chown -R ntp:ntp /var/lib/ntp
614
# Renseignement des fichiers hosts.allow et hosts.deny
614
# Renseignement des fichiers hosts.allow et hosts.deny
615
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
615
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
616
	cat <<EOF > /etc/hosts.allow
616
	cat <<EOF > /etc/hosts.allow
617
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
617
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
618
sshd: ALL
618
sshd: ALL
619
ntpd: $PRIVATE_NETWORK_SHORT
619
ntpd: $PRIVATE_NETWORK_SHORT
620
EOF
620
EOF
621
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
621
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
622
	cat <<EOF > /etc/hosts.deny
622
	cat <<EOF > /etc/hosts.deny
623
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
623
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
624
EOF
624
EOF
625
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
625
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
626
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
626
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
627
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
627
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
628
# load conntrack ftp module
628
# load conntrack ftp module
629
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
629
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
630
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
630
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
631
# load ipt_NETFLOW module
631
# load ipt_NETFLOW module
632
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
632
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
633
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
633
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
634
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
634
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
635
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
635
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
636
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
636
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
637
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
637
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
638
# 
638
# 
639
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
639
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
640
} # End of network ()
640
} # End of network ()
641
 
641
 
642
##################################################################
642
##################################################################
643
##			Function "ACC"				##
643
##			Function "ACC"				##
644
## - installation du centre de gestion (ALCASAR Control Center)	##
644
## - installation du centre de gestion (ALCASAR Control Center)	##
645
## - configuration du serveur web (Apache)			##
645
## - configuration du serveur web (Apache)			##
646
## - définition du 1er comptes de gestion 			##
646
## - définition du 1er comptes de gestion 			##
647
## - sécurisation des accès					##
647
## - sécurisation des accès					##
648
##################################################################
648
##################################################################
649
ACC ()
649
ACC ()
650
{
650
{
651
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
651
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
652
	mkdir $DIR_WEB
652
	mkdir $DIR_WEB
653
# Copie et configuration des fichiers du centre de gestion
653
# Copie et configuration des fichiers du centre de gestion
654
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
654
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
655
	echo "$VERSION" > $DIR_WEB/VERSION
655
	echo "$VERSION" > $DIR_WEB/VERSION
656
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
656
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
657
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
657
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
658
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
658
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
659
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
659
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
660
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
660
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
661
	chown -R apache:apache $DIR_WEB/*
661
	chown -R apache:apache $DIR_WEB/*
662
# create the backup structure :
662
# create the backup structure :
663
# - base = users database
663
# - base = users database
664
# - archive = tarball of "base + http firewall + netflow"
664
# - archive = tarball of "base + http firewall + netflow"
665
# - security = watchdog disconnection)
665
# - security = watchdog disconnection)
666
	for i in base archive security;
666
	for i in base archive security;
667
	do
667
	do
668
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
668
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
669
	done
669
	done
670
	chown -R root:apache $DIR_SAVE
670
	chown -R root:apache $DIR_SAVE
671
# Configuration et sécurisation php
671
# Configuration et sécurisation php
672
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
672
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
673
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
673
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
674
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
674
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
675
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
675
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
676
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
676
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
677
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
677
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
678
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
678
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
679
# Configuration et sécurisation Apache
679
# Configuration et sécurisation Apache
680
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
680
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
681
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
681
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
682
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
682
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
683
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
683
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
684
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
684
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
685
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
685
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
686
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
686
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
687
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
687
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
688
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
688
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
689
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
689
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
690
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
690
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
691
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
691
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
692
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
692
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
693
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
693
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
694
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
694
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
695
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
695
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
696
# Error page management
696
# Error page management
697
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
697
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
698
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
698
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
699
Alias /error/ "/var/www/html/"
699
Alias /error/ "/var/www/html/"
700
<Directory "/usr/share/httpd/error">
700
<Directory "/usr/share/httpd/error">
701
    AllowOverride None
701
    AllowOverride None
702
    Options IncludesNoExec
702
    Options IncludesNoExec
703
    AddOutputFilter Includes html
703
    AddOutputFilter Includes html
704
    AddHandler type-map var
704
    AddHandler type-map var
705
    Require all granted
705
    Require all granted
706
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
706
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
707
    ForceLanguagePriority Prefer Fallback
707
    ForceLanguagePriority Prefer Fallback
708
</Directory>
708
</Directory>
709
ErrorDocument 400 /error/error.php?error=400
709
ErrorDocument 400 /error/error.php?error=400
710
ErrorDocument 401 /error/error.php?error=401
710
ErrorDocument 401 /error/error.php?error=401
711
ErrorDocument 403 /error/error.php?error=403
711
ErrorDocument 403 /error/error.php?error=403
712
ErrorDocument 404 /error/error.php?error=404
712
ErrorDocument 404 /error/error.php?error=404
713
ErrorDocument 405 /error/error.php?error=405
713
ErrorDocument 405 /error/error.php?error=405
714
ErrorDocument 408 /error/error.php?error=408
714
ErrorDocument 408 /error/error.php?error=408
715
ErrorDocument 410 /error/error.php?error=410
715
ErrorDocument 410 /error/error.php?error=410
716
ErrorDocument 411 /error/error.php?error=411
716
ErrorDocument 411 /error/error.php?error=411
717
ErrorDocument 412 /error/error.php?error=412
717
ErrorDocument 412 /error/error.php?error=412
718
ErrorDocument 413 /error/error.php?error=413
718
ErrorDocument 413 /error/error.php?error=413
719
ErrorDocument 414 /error/error.php?error=414
719
ErrorDocument 414 /error/error.php?error=414
720
ErrorDocument 415 /error/error.php?error=415
720
ErrorDocument 415 /error/error.php?error=415
721
ErrorDocument 500 /error/error.php?error=500
721
ErrorDocument 500 /error/error.php?error=500
722
ErrorDocument 501 /error/error.php?error=501
722
ErrorDocument 501 /error/error.php?error=501
723
ErrorDocument 502 /error/error.php?error=502
723
ErrorDocument 502 /error/error.php?error=502
724
ErrorDocument 503 /error/error.php?error=503
724
ErrorDocument 503 /error/error.php?error=503
725
ErrorDocument 506 /error/error.php?error=506
725
ErrorDocument 506 /error/error.php?error=506
726
EOF
726
EOF
727
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
727
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
728
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
728
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
729
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
729
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
730
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
730
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
731
</body>
731
</body>
732
</html>
732
</html>
733
EOF
733
EOF
734
# Définition du premier compte lié au profil 'admin'
734
# Définition du premier compte lié au profil 'admin'
735
	header_install
735
	header_install
736
	if [ "$mode" = "install" ]
736
	if [ "$mode" = "install" ]
737
	then
737
	then
738
		admin_portal=!
738
		admin_portal=!
739
		PTN='^[a-zA-Z0-9-]*$'
739
		PTN='^[a-zA-Z0-9-]*$'
740
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
740
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
741
                	do
741
                	do
742
			header_install
742
			header_install
743
			if [ $Lang == "fr" ]
743
			if [ $Lang == "fr" ]
744
			then 
744
			then 
745
				echo ""
745
				echo ""
746
				echo "Définissez un premier compte d'administration du portail :"
746
				echo "Définissez un premier compte d'administration du portail :"
747
				echo
747
				echo
748
				echo -n "Nom : "
748
				echo -n "Nom : "
749
			else
749
			else
750
				echo ""
750
				echo ""
751
				echo "Define the first account allow to administrate the portal :"
751
				echo "Define the first account allow to administrate the portal :"
752
				echo
752
				echo
753
				echo -n "Account : "
753
				echo -n "Account : "
754
			fi
754
			fi
755
			read admin_portal
755
			read admin_portal
756
			if [ "$admin_portal" == "" ]
756
			if [ "$admin_portal" == "" ]
757
				then
757
				then
758
				admin_portal=!
758
				admin_portal=!
759
			fi
759
			fi
760
			done
760
			done
761
# Creation of keys file for the admin account ("admin")
761
# Creation of keys file for the admin account ("admin")
762
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
762
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
763
		mkdir -p $DIR_DEST_ETC/digest
763
		mkdir -p $DIR_DEST_ETC/digest
764
		chmod 755 $DIR_DEST_ETC/digest
764
		chmod 755 $DIR_DEST_ETC/digest
765
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
765
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
766
			do
766
			do
767
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
767
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
768
			done
768
			done
769
		$DIR_DEST_SBIN/alcasar-profil.sh --list
769
		$DIR_DEST_SBIN/alcasar-profil.sh --list
770
	fi
770
	fi
771
# synchronisation horaire
771
# synchronisation horaire
772
	ntpd -q -g &
772
	ntpd -q -g &
773
# Sécurisation du centre
773
# Sécurisation du centre
774
	rm -f /etc/httpd/conf/webapps.d/alcasar*
774
	rm -f /etc/httpd/conf/webapps.d/alcasar*
775
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
775
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
776
<Directory $DIR_ACC>
776
<Directory $DIR_ACC>
777
	SSLRequireSSL
777
	SSLRequireSSL
778
	AllowOverride None
778
	AllowOverride None
779
	Order deny,allow
779
	Order deny,allow
780
	Deny from all
780
	Deny from all
781
	Allow from 127.0.0.1
781
	Allow from 127.0.0.1
782
	Allow from $PRIVATE_NETWORK_MASK
782
	Allow from $PRIVATE_NETWORK_MASK
783
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
783
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
784
	require valid-user
784
	require valid-user
785
	AuthType digest
785
	AuthType digest
786
	AuthName $HOSTNAME.$DOMAIN
786
	AuthName $HOSTNAME.$DOMAIN
787
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
787
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
788
	AuthUserFile $DIR_DEST_ETC/digest/key_all
788
	AuthUserFile $DIR_DEST_ETC/digest/key_all
789
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
789
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
790
</Directory>
790
</Directory>
791
<Directory $DIR_ACC/admin>
791
<Directory $DIR_ACC/admin>
792
	SSLRequireSSL
792
	SSLRequireSSL
793
	AllowOverride None
793
	AllowOverride None
794
	Order deny,allow
794
	Order deny,allow
795
	Deny from all
795
	Deny from all
796
	Allow from 127.0.0.1
796
	Allow from 127.0.0.1
797
	Allow from $PRIVATE_NETWORK_MASK
797
	Allow from $PRIVATE_NETWORK_MASK
798
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
798
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
799
	require valid-user
799
	require valid-user
800
	AuthType digest
800
	AuthType digest
801
	AuthName $HOSTNAME.$DOMAIN
801
	AuthName $HOSTNAME.$DOMAIN
802
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
802
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
803
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
803
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
804
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
804
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
805
</Directory>
805
</Directory>
806
<Directory $DIR_ACC/manager>
806
<Directory $DIR_ACC/manager>
807
	SSLRequireSSL
807
	SSLRequireSSL
808
	AllowOverride None
808
	AllowOverride None
809
	Order deny,allow
809
	Order deny,allow
810
	Deny from all
810
	Deny from all
811
	Allow from 127.0.0.1
811
	Allow from 127.0.0.1
812
	Allow from $PRIVATE_NETWORK_MASK
812
	Allow from $PRIVATE_NETWORK_MASK
813
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
813
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
814
	require valid-user
814
	require valid-user
815
	AuthType digest
815
	AuthType digest
816
	AuthName $HOSTNAME.$DOMAIN
816
	AuthName $HOSTNAME.$DOMAIN
817
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
817
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
818
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
818
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
819
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
819
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
820
</Directory>
820
</Directory>
821
<Directory $DIR_ACC/backup>
821
<Directory $DIR_ACC/backup>
822
	SSLRequireSSL
822
	SSLRequireSSL
823
	AllowOverride None
823
	AllowOverride None
824
	Order deny,allow
824
	Order deny,allow
825
	Deny from all
825
	Deny from all
826
	Allow from 127.0.0.1
826
	Allow from 127.0.0.1
827
	Allow from $PRIVATE_NETWORK_MASK
827
	Allow from $PRIVATE_NETWORK_MASK
828
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
828
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
829
	require valid-user
829
	require valid-user
830
	AuthType digest
830
	AuthType digest
831
	AuthName $HOSTNAME.$DOMAIN
831
	AuthName $HOSTNAME.$DOMAIN
832
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
832
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
833
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
833
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
834
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
834
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
835
</Directory>
835
</Directory>
836
Alias /save/ "$DIR_SAVE/"
836
Alias /save/ "$DIR_SAVE/"
837
<Directory $DIR_SAVE>
837
<Directory $DIR_SAVE>
838
	SSLRequireSSL
838
	SSLRequireSSL
839
	Options Indexes
839
	Options Indexes
840
	Order deny,allow
840
	Order deny,allow
841
	Deny from all
841
	Deny from all
842
	Allow from 127.0.0.1
842
	Allow from 127.0.0.1
843
	Allow from $PRIVATE_NETWORK_MASK
843
	Allow from $PRIVATE_NETWORK_MASK
844
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
844
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
845
	require valid-user
845
	require valid-user
846
	AuthType digest
846
	AuthType digest
847
	AuthName $HOSTNAME.$DOMAIN
847
	AuthName $HOSTNAME.$DOMAIN
848
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
848
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
849
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
849
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
850
</Directory>
850
</Directory>
851
EOF
851
EOF
852
# Launch after coova
852
# Launch after coova
853
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
853
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
854
} # End of ACC ()
854
} # End of ACC ()
855
 
855
 
856
##########################################################################################
856
##########################################################################################
857
##				Fonction "CA"						##
857
##				Fonction "CA"						##
858
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
858
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
859
##########################################################################################
859
##########################################################################################
860
CA ()
860
CA ()
861
{
861
{
862
	$DIR_DEST_BIN/alcasar-CA.sh
862
	$DIR_DEST_BIN/alcasar-CA.sh
863
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
863
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
864
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
864
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
865
	cat <<EOF > $FIC_VIRTUAL_SSL
865
	cat <<EOF > $FIC_VIRTUAL_SSL
866
# default SSL virtual host, used for all HTTPS requests that do not
866
# default SSL virtual host, used for all HTTPS requests that do not
867
# match a ServerName or ServerAlias in any <VirtualHost> block.
867
# match a ServerName or ServerAlias in any <VirtualHost> block.
868
 
868
 
869
<VirtualHost _default_:443>
869
<VirtualHost _default_:443>
870
# general configuration
870
# general configuration
871
    ServerAdmin root@localhost
871
    ServerAdmin root@localhost
872
    ServerName localhost
872
    ServerName localhost
873
 
873
 
874
# SSL configuration
874
# SSL configuration
875
    SSLEngine on
875
    SSLEngine on
876
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
876
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
877
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
877
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
878
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
878
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
879
    CustomLog logs/ssl_request_log \
879
    CustomLog logs/ssl_request_log \
880
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
880
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
881
    ErrorLog logs/ssl_error_log
881
    ErrorLog logs/ssl_error_log
882
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
882
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
883
</VirtualHost>
883
</VirtualHost>
884
EOF
884
EOF
885
 
885
 
886
	chown -R root:apache /etc/pki
886
	chown -R root:apache /etc/pki
887
	chmod -R 750 /etc/pki
887
	chmod -R 750 /etc/pki
888
} # End of CA ()
888
} # End of CA ()
889
 
889
 
890
##########################################################################################
890
##########################################################################################
891
##			Fonction "init_db"						##
891
##			Fonction "init_db"						##
892
## - Initialisation de la base Mysql							##
892
## - Initialisation de la base Mysql							##
893
## - Affectation du mot de passe de l'administrateur (root)				##
893
## - Affectation du mot de passe de l'administrateur (root)				##
894
## - Suppression des bases et des utilisateurs superflus				##
894
## - Suppression des bases et des utilisateurs superflus				##
895
## - Création de la base 'radius'							##
895
## - Création de la base 'radius'							##
896
## - Installation du schéma de cette base						##
896
## - Installation du schéma de cette base						##
897
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
897
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
898
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
898
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
899
##########################################################################################
899
##########################################################################################
900
init_db ()
900
init_db ()
901
{
901
{
902
	rm -rf /var/lib/mysql # to be sure that there is no former installation
902
	rm -rf /var/lib/mysql # to be sure that there is no former installation
903
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
903
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
904
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
904
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
905
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
905
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
906
	/usr/bin/systemctl start mysqld.service
906
	/usr/bin/systemctl start mysqld.service
907
	sleep 4
907
	sleep 4
908
	mysqladmin -u root password $mysqlpwd
908
	mysqladmin -u root password $mysqlpwd
909
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
909
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
910
# Secure the server
910
# Secure the server
911
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
911
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
912
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
912
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
913
# Create 'radius' database
913
# Create 'radius' database
914
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
914
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
915
# Add an empty radius database structure
915
# Add an empty radius database structure
916
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
916
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
917
# modify the start script in order to close accounting connexion when the system is comming down or up
917
# modify the start script in order to close accounting connexion when the system is comming down or up
918
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
918
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
919
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
919
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
920
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
920
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
921
	/usr/bin/systemctl daemon-reload
921
	/usr/bin/systemctl daemon-reload
922
} # End of init_db ()
922
} # End of init_db ()
923
 
923
 
924
##########################################################################
924
##########################################################################
925
##			Fonction "radius"				##
925
##			Fonction "radius"				##
926
## - Paramètrage des fichiers de configuration FreeRadius		##
926
## - Paramètrage des fichiers de configuration FreeRadius		##
927
## - Affectation du secret partagé entre coova-chilli et freeradius	##
927
## - Affectation du secret partagé entre coova-chilli et freeradius	##
928
## - Modification de fichier de conf pour l'accès à Mysql		##
928
## - Modification de fichier de conf pour l'accès à Mysql		##
929
##########################################################################
929
##########################################################################
930
radius ()
930
radius ()
931
{
931
{
932
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
932
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
933
	chown -R radius:radius /etc/raddb
933
	chown -R radius:radius /etc/raddb
934
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
934
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
935
# Set radius.conf parameters
935
# Set radius.conf parameters
936
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
936
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
937
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
937
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
938
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
938
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
939
# remove the proxy function
939
# remove the proxy function
940
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
940
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
941
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
941
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
942
# remove EAP module
942
# remove EAP module
943
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
943
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
944
# listen on loopback (should be modified later if EAP enabled)
944
# listen on loopback (should be modified later if EAP enabled)
945
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
945
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
946
# enable the  SQL module (and SQL counter)
946
# enable the  SQL module (and SQL counter)
947
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
947
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
948
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
948
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
949
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
949
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
950
# only include modules for ALCASAR needs
950
# only include modules for ALCASAR needs
951
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
951
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
952
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
952
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
953
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
953
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
954
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
954
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
955
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
955
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
956
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
956
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
957
# remvove virtual server and copy our conf file
957
# remvove virtual server and copy our conf file
958
	rm -f /etc/raddb/sites-enabled/*
958
	rm -f /etc/raddb/sites-enabled/*
959
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
959
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
960
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
960
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
961
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
961
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
962
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
962
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
963
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
963
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
964
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
964
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
965
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
965
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
966
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
966
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
967
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
967
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
968
	cat << EOF > /etc/raddb/clients.conf
968
	cat << EOF > /etc/raddb/clients.conf
969
client 127.0.0.1 {
969
client 127.0.0.1 {
970
	secret = $secretradius
970
	secret = $secretradius
971
	shortname = localhost
971
	shortname = localhost
972
}
972
}
973
EOF
973
EOF
974
# sql.conf modification
974
# sql.conf modification
975
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
975
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
976
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
976
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
977
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
977
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
978
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
978
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
979
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
979
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
980
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
980
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
981
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
981
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
982
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
982
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
983
# counter.conf modification (change the Max-All-Session-Time counter)
983
# counter.conf modification (change the Max-All-Session-Time counter)
984
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
984
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
985
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
985
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
986
	chown -R radius:radius /etc/raddb/sql/mysql/*
986
	chown -R radius:radius /etc/raddb/sql/mysql/*
987
# make certain that mysql is up before radius start
987
# make certain that mysql is up before radius start
988
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
988
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
989
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
989
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
990
	/usr/bin/systemctl daemon-reload
990
	/usr/bin/systemctl daemon-reload
991
} # End radius ()
991
} # End radius ()
992
 
992
 
993
##########################################################################
993
##########################################################################
994
##			Function "radius_web"				##
994
##			Function "radius_web"				##
995
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
995
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
996
## - Création du lien vers la page de changement de mot de passe        ##
996
## - Création du lien vers la page de changement de mot de passe        ##
997
##########################################################################
997
##########################################################################
998
radius_web ()
998
radius_web ()
999
{
999
{
1000
# copie de l'interface d'origine dans la structure Alcasar
1000
# copie de l'interface d'origine dans la structure Alcasar
1001
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
1001
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
1002
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
1002
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
1003
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
1003
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
1004
# copie des fichiers modifiés
1004
# copie des fichiers modifiés
1005
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
1005
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
1006
	chown -R apache:apache $DIR_ACC/manager/
1006
	chown -R apache:apache $DIR_ACC/manager/
1007
# Modification des fichiers de configuration
1007
# Modification des fichiers de configuration
1008
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
1008
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
1009
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
1009
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
1010
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
1010
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
1011
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
1011
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
1012
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
1012
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
1013
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
1013
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
1014
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
1014
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
1015
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
1015
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
1016
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
1016
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
1017
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
1017
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
1018
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
1018
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
1019
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
1019
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
1020
	cat <<EOF > /etc/freeradius-web/naslist.conf
1020
	cat <<EOF > /etc/freeradius-web/naslist.conf
1021
nas1_name: alcasar-$ORGANISME
1021
nas1_name: alcasar-$ORGANISME
1022
nas1_model: Portail captif
1022
nas1_model: Portail captif
1023
nas1_ip: $PRIVATE_IP
1023
nas1_ip: $PRIVATE_IP
1024
nas1_port_num: 0
1024
nas1_port_num: 0
1025
nas1_community: public
1025
nas1_community: public
1026
EOF
1026
EOF
1027
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1027
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1028
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1028
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1029
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1029
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1030
# Ajout du mappage des attributs chillispot
1030
# Ajout du mappage des attributs chillispot
1031
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1031
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1032
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1032
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1033
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1033
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1034
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1034
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1035
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1035
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1036
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1036
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1037
	chown -R apache:apache /etc/freeradius-web
1037
	chown -R apache:apache /etc/freeradius-web
1038
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1038
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1039
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1039
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1040
<Directory $DIR_WEB/pass>
1040
<Directory $DIR_WEB/pass>
1041
	SSLRequireSSL
1041
	SSLRequireSSL
1042
	AllowOverride None
1042
	AllowOverride None
1043
	Order deny,allow
1043
	Order deny,allow
1044
	Deny from all
1044
	Deny from all
1045
	Allow from 127.0.0.1
1045
	Allow from 127.0.0.1
1046
	Allow from $PRIVATE_NETWORK_MASK
1046
	Allow from $PRIVATE_NETWORK_MASK
1047
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1047
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1048
</Directory>
1048
</Directory>
1049
EOF
1049
EOF
1050
} # End of radius_web ()
1050
} # End of radius_web ()
1051
 
1051
 
1052
##################################################################################
1052
##################################################################################
1053
##			Fonction "chilli"					##
1053
##			Fonction "chilli"					##
1054
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1054
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1055
## - Paramètrage de la page d'authentification (intercept.php)			##
1055
## - Paramètrage de la page d'authentification (intercept.php)			##
1056
##################################################################################
1056
##################################################################################
1057
chilli ()
1057
chilli ()
1058
{
1058
{
1059
# chilli unit for systemd
1059
# chilli unit for systemd
1060
cat << EOF > /lib/systemd/system/chilli.service
1060
cat << EOF > /lib/systemd/system/chilli.service
1061
#  This file is part of systemd.
1061
#  This file is part of systemd.
1062
#
1062
#
1063
#  systemd is free software; you can redistribute it and/or modify it
1063
#  systemd is free software; you can redistribute it and/or modify it
1064
#  under the terms of the GNU General Public License as published by
1064
#  under the terms of the GNU General Public License as published by
1065
#  the Free Software Foundation; either version 2 of the License, or
1065
#  the Free Software Foundation; either version 2 of the License, or
1066
#  (at your option) any later version.
1066
#  (at your option) any later version.
1067
[Unit]
1067
[Unit]
1068
Description=chilli is a captive portal daemon
1068
Description=chilli is a captive portal daemon
1069
After=network.target
1069
After=network.target
1070
 
1070
 
1071
[Service]
1071
[Service]
1072
Type=forking
1072
Type=forking
1073
ExecStart=/usr/libexec/chilli start
1073
ExecStart=/usr/libexec/chilli start
1074
ExecStop=/usr/libexec/chilli stop
1074
ExecStop=/usr/libexec/chilli stop
1075
ExecReload=/usr/libexec/chilli reload
1075
ExecReload=/usr/libexec/chilli reload
1076
PIDFile=/var/run/chilli.pid
1076
PIDFile=/var/run/chilli.pid
1077
 
1077
 
1078
[Install]
1078
[Install]
1079
WantedBy=multi-user.target
1079
WantedBy=multi-user.target
1080
EOF
1080
EOF
1081
# init file creation
1081
# init file creation
1082
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1082
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1083
	cat <<EOF > /usr/libexec/chilli
1083
	cat <<EOF > /usr/libexec/chilli
1084
#!/bin/sh
1084
#!/bin/sh
1085
#
1085
#
1086
# chilli CoovaChilli init
1086
# chilli CoovaChilli init
1087
#
1087
#
1088
# chkconfig: 2345 65 35
1088
# chkconfig: 2345 65 35
1089
# description: CoovaChilli
1089
# description: CoovaChilli
1090
### BEGIN INIT INFO
1090
### BEGIN INIT INFO
1091
# Provides:       chilli
1091
# Provides:       chilli
1092
# Required-Start: network 
1092
# Required-Start: network 
1093
# Should-Start: 
1093
# Should-Start: 
1094
# Required-Stop:  network
1094
# Required-Stop:  network
1095
# Should-Stop: 
1095
# Should-Stop: 
1096
# Default-Start:  2 3 5
1096
# Default-Start:  2 3 5
1097
# Default-Stop:
1097
# Default-Stop:
1098
# Description:    CoovaChilli access controller
1098
# Description:    CoovaChilli access controller
1099
### END INIT INFO
1099
### END INIT INFO
1100
 
1100
 
1101
[ -f /usr/sbin/chilli ] || exit 0
1101
[ -f /usr/sbin/chilli ] || exit 0
1102
. /etc/init.d/functions
1102
. /etc/init.d/functions
1103
CONFIG=/etc/chilli.conf
1103
CONFIG=/etc/chilli.conf
1104
pidfile=/var/run/chilli.pid
1104
pidfile=/var/run/chilli.pid
1105
[ -f \$CONFIG ] || {
1105
[ -f \$CONFIG ] || {
1106
    echo "\$CONFIG Not found"
1106
    echo "\$CONFIG Not found"
1107
    exit 0
1107
    exit 0
1108
}
1108
}
1109
RETVAL=0
1109
RETVAL=0
1110
prog="chilli"
1110
prog="chilli"
1111
case \$1 in
1111
case \$1 in
1112
    start)
1112
    start)
1113
	if [ -f \$pidfile ] ; then 
1113
	if [ -f \$pidfile ] ; then 
1114
		gprintf "chilli is already running"
1114
		gprintf "chilli is already running"
1115
	else
1115
	else
1116
        	gprintf "Starting \$prog: "
1116
        	gprintf "Starting \$prog: "
1117
		rm -f /var/run/chilli* # cleaning
1117
		rm -f /var/run/chilli* # cleaning
1118
        	/sbin/modprobe tun >/dev/null 2>&1
1118
        	/sbin/modprobe tun >/dev/null 2>&1
1119
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1119
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1120
		[ -e /dev/net/tun ] || {
1120
		[ -e /dev/net/tun ] || {
1121
	    	(cd /dev; 
1121
	    	(cd /dev; 
1122
			mkdir net; 
1122
			mkdir net; 
1123
			cd net; 
1123
			cd net; 
1124
			mknod tun c 10 200)
1124
			mknod tun c 10 200)
1125
		}
1125
		}
1126
		ifconfig $INTIF 0.0.0.0
1126
		ifconfig $INTIF 0.0.0.0
1127
		/usr/sbin/ethtool -K $INTIF gro off
1127
		/usr/sbin/ethtool -K $INTIF gro off
1128
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1128
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1129
        	RETVAL=$?
1129
        	RETVAL=$?
1130
	fi
1130
	fi
1131
	;;
1131
	;;
1132
 
1132
 
1133
    reload)
1133
    reload)
1134
	killall -HUP chilli
1134
	killall -HUP chilli
1135
	;;
1135
	;;
1136
 
1136
 
1137
    restart)
1137
    restart)
1138
	\$0 stop
1138
	\$0 stop
1139
        sleep 2
1139
        sleep 2
1140
	\$0 start
1140
	\$0 start
1141
	;;
1141
	;;
1142
    
1142
    
1143
    status)
1143
    status)
1144
        status chilli
1144
        status chilli
1145
        RETVAL=0
1145
        RETVAL=0
1146
        ;;
1146
        ;;
1147
 
1147
 
1148
    stop)
1148
    stop)
1149
	if [ -f \$pidfile ] ; then  
1149
	if [ -f \$pidfile ] ; then  
1150
        	gprintf "Shutting down \$prog: "
1150
        	gprintf "Shutting down \$prog: "
1151
		killproc /usr/sbin/chilli
1151
		killproc /usr/sbin/chilli
1152
		RETVAL=\$?
1152
		RETVAL=\$?
1153
		[ \$RETVAL = 0 ] && rm -f $pidfile
1153
		[ \$RETVAL = 0 ] && rm -f $pidfile
1154
	else	
1154
	else	
1155
        	gprintf "chilli is not running"
1155
        	gprintf "chilli is not running"
1156
	fi
1156
	fi
1157
	;;
1157
	;;
1158
    
1158
    
1159
    *)
1159
    *)
1160
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1160
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1161
        exit 1
1161
        exit 1
1162
esac
1162
esac
1163
echo
1163
echo
1164
EOF
1164
EOF
1165
chmod a+x /usr/libexec/chilli
1165
chmod a+x /usr/libexec/chilli
1166
# conf file creation
1166
# conf file creation
1167
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1167
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1168
	cat <<EOF > /etc/chilli.conf
1168
	cat <<EOF > /etc/chilli.conf
1169
# coova config for ALCASAR
1169
# coova config for ALCASAR
1170
cmdsocket	/var/run/chilli.sock
1170
cmdsocket	/var/run/chilli.sock
1171
unixipc		chilli.$INTIF.ipc
1171
unixipc		chilli.$INTIF.ipc
1172
pidfile		/var/run/chilli.pid
1172
pidfile		/var/run/chilli.pid
1173
net		$PRIVATE_NETWORK_MASK
1173
net		$PRIVATE_NETWORK_MASK
1174
dhcpif		$INTIF
1174
dhcpif		$INTIF
1175
ethers		$DIR_DEST_ETC/alcasar-ethers
1175
ethers		$DIR_DEST_ETC/alcasar-ethers
1176
#nodynip
1176
#nodynip
1177
#statip
1177
#statip
1178
dynip		$PRIVATE_NETWORK_MASK
1178
dynip		$PRIVATE_NETWORK_MASK
1179
domain		$DOMAIN
1179
domain		$DOMAIN
1180
dns1		$PRIVATE_IP
1180
dns1		$PRIVATE_IP
1181
dns2		$PRIVATE_IP
1181
dns2		$PRIVATE_IP
1182
uamlisten	$PRIVATE_IP
1182
uamlisten	$PRIVATE_IP
1183
uamport		3990
1183
uamport		3990
1184
macauth
1184
macauth
1185
macpasswd	password
1185
macpasswd	password
1186
locationname	$HOSTNAME.$DOMAIN
1186
locationname	$HOSTNAME.$DOMAIN
1187
radiusserver1	127.0.0.1
1187
radiusserver1	127.0.0.1
1188
radiusserver2	127.0.0.1
1188
radiusserver2	127.0.0.1
1189
radiussecret	$secretradius
1189
radiussecret	$secretradius
1190
radiusauthport	1812
1190
radiusauthport	1812
1191
radiusacctport	1813
1191
radiusacctport	1813
1192
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1192
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1193
radiusnasid	$HOSTNAME.$DOMAIN
1193
radiusnasid	$HOSTNAME.$DOMAIN
1194
uamsecret	$secretuam
1194
uamsecret	$secretuam
1195
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1195
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1196
coaport		3799
1196
coaport		3799
1197
conup		$DIR_DEST_BIN/alcasar-conup.sh
1197
conup		$DIR_DEST_BIN/alcasar-conup.sh
1198
condown		$DIR_DEST_BIN/alcasar-condown.sh
1198
condown		$DIR_DEST_BIN/alcasar-condown.sh
1199
include		$DIR_DEST_ETC/alcasar-uamallowed
1199
include		$DIR_DEST_ETC/alcasar-uamallowed
1200
include		$DIR_DEST_ETC/alcasar-uamdomain
1200
include		$DIR_DEST_ETC/alcasar-uamdomain
1201
#dhcpgateway		none
1201
#dhcpgateway		none
1202
#dhcprelayagent		none
1202
#dhcprelayagent		none
1203
#dhcpgatewayport	none
1203
#dhcpgatewayport	none
1204
EOF
1204
EOF
1205
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1205
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1206
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1206
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1207
# create files for trusted domains and urls
1207
# create files for trusted domains and urls
1208
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1208
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1209
	chown root:apache $DIR_DEST_ETC/alcasar-*
1209
	chown root:apache $DIR_DEST_ETC/alcasar-*
1210
	chmod 660 $DIR_DEST_ETC/alcasar-*
1210
	chmod 660 $DIR_DEST_ETC/alcasar-*
1211
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1211
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1212
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1212
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1213
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1213
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1214
# user 'chilli' creation (in order to run conup/off and up/down scripts
1214
# user 'chilli' creation (in order to run conup/off and up/down scripts
1215
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1215
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1216
	if [ "$chilli_exist" == "1" ]
1216
	if [ "$chilli_exist" == "1" ]
1217
	then
1217
	then
1218
	      userdel -r chilli 2>/dev/null
1218
	      userdel -r chilli 2>/dev/null
1219
	fi
1219
	fi
1220
	groupadd -f chilli
1220
	groupadd -f chilli
1221
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1221
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1222
}  # End of chilli ()
1222
}  # End of chilli ()
1223
 
1223
 
1224
##################################################################
1224
##################################################################
1225
##		Fonction "dansguardian"				##
1225
##		Fonction "dansguardian"				##
1226
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1226
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1227
##################################################################
1227
##################################################################
1228
dansguardian ()
1228
dansguardian ()
1229
{
1229
{
1230
	mkdir /var/dansguardian
1230
	mkdir /var/dansguardian
1231
	chown dansguardian /var/dansguardian
1231
	chown dansguardian /var/dansguardian
1232
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1232
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1233
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1233
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1234
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1234
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1235
# By default the filter is off 
1235
# By default the filter is off 
1236
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1236
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1237
# French deny HTML page
1237
# French deny HTML page
1238
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1238
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1239
# Listen only on LAN side
1239
# Listen only on LAN side
1240
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1240
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1241
# DG send its flow to HAVP
1241
# DG send its flow to HAVP
1242
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1242
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1243
# replace the default deny HTML page
1243
# replace the default deny HTML page
1244
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1244
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1245
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1245
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1246
# Don't log
1246
# Don't log
1247
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1247
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1248
# Run 10 daemons (20 in largest server)
1248
# Run 10 daemons (20 in largest server)
1249
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1249
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1250
# on désactive par défaut le controle de contenu des pages html
1250
# on désactive par défaut le controle de contenu des pages html
1251
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1251
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1252
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1252
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1253
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1253
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1254
# on désactive par défaut le contrôle d'URL par expressions régulières
1254
# on désactive par défaut le contrôle d'URL par expressions régulières
1255
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1255
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1256
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1256
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1257
# on désactive par défaut le contrôle de téléchargement de fichiers
1257
# on désactive par défaut le contrôle de téléchargement de fichiers
1258
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1258
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1259
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1259
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1260
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1260
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1261
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1261
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1262
	touch $DIR_DG/lists/bannedextensionlist
1262
	touch $DIR_DG/lists/bannedextensionlist
1263
	touch $DIR_DG/lists/bannedmimetypelist
1263
	touch $DIR_DG/lists/bannedmimetypelist
1264
# 'Safesearch' regex actualisation
1264
# 'Safesearch' regex actualisation
1265
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1265
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1266
# empty LAN IP list that won't be WEB filtered
1266
# empty LAN IP list that won't be WEB filtered
1267
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1267
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1268
	touch $DIR_DG/lists/exceptioniplist
1268
	touch $DIR_DG/lists/exceptioniplist
1269
# Keep a copy of URL & domain filter configuration files
1269
# Keep a copy of URL & domain filter configuration files
1270
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1270
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1271
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1271
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1272
} # End of dansguardian ()
1272
} # End of dansguardian ()
1273
 
1273
 
1274
##################################################################
1274
##################################################################
1275
##			Fonction "antivirus"			##
1275
##			Fonction "antivirus"			##
1276
## - configuration of havp, libclamav and freshclam		##
1276
## - configuration of havp, libclamav and freshclam		##
1277
##################################################################
1277
##################################################################
1278
antivirus ()		
1278
antivirus ()		
1279
{
1279
{
1280
# create 'havp' user
1280
# create 'havp' user
1281
	havp_exist=`grep havp /etc/passwd|wc -l`
1281
	havp_exist=`grep havp /etc/passwd|wc -l`
1282
	if [ "$havp_exist" == "1" ]
1282
	if [ "$havp_exist" == "1" ]
1283
	then
1283
	then
1284
	      userdel -r havp 2>/dev/null
1284
	      userdel -r havp 2>/dev/null
1285
	      groupdel havp 2>/dev/null
1285
	      groupdel havp 2>/dev/null
1286
	fi
1286
	fi
1287
	groupadd -f havp
1287
	groupadd -f havp
1288
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1288
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1289
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1289
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1290
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1290
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1291
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1291
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1292
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1292
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1293
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1293
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1294
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1294
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1295
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1295
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1296
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1296
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1297
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1297
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1298
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1298
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1299
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1299
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1300
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1300
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1301
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1301
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1302
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1302
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1303
# skip checking of youtube flow (too heavy load / risk too low)
1303
# skip checking of youtube flow (too heavy load / risk too low)
1304
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1304
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1305
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1305
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1306
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1306
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1307
# adapt init script and systemd unit
1307
# adapt init script and systemd unit
1308
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1308
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1309
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1309
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1310
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1310
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1311
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1311
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1312
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1312
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1313
# replace of the intercept page (template)
1313
# replace of the intercept page (template)
1314
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1314
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1315
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1315
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1316
# update virus database every 4 hours (24h/6)
1316
# update virus database every 4 hours (24h/6)
1317
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1317
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1318
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1318
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1319
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1319
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1320
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1320
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1321
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1321
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1322
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1322
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1323
# update now
1323
# update now
1324
	/usr/bin/freshclam --no-warnings
1324
	/usr/bin/freshclam --no-warnings
1325
} # End of antivirus ()
1325
} # End of antivirus ()
1326
 
1326
 
1327
##########################################################################
1327
##########################################################################
1328
##			Fonction "tinyproxy"				##
1328
##			Fonction "tinyproxy"				##
1329
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1329
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1330
##########################################################################
1330
##########################################################################
1331
tinyproxy ()		
1331
tinyproxy ()		
1332
{
1332
{
1333
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1333
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1334
	if [ "$tinyproxy_exist" == "1" ]
1334
	if [ "$tinyproxy_exist" == "1" ]
1335
	then
1335
	then
1336
	      userdel -r tinyproxy 2>/dev/null
1336
	      userdel -r tinyproxy 2>/dev/null
1337
	      groupdel tinyproxy 2>/dev/null
1337
	      groupdel tinyproxy 2>/dev/null
1338
	fi
1338
	fi
1339
	groupadd -f tinyproxy
1339
	groupadd -f tinyproxy
1340
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1340
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1341
	mkdir -p var/run/tinyproxy /var/log/tinyproxy
1341
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1342
	chown -R tinyproxy.tinyproxy /run/tinyproxy /var/log/tinyproxy
1342
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1343
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1343
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1344
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1344
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1345
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1345
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1346
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1346
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1347
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1347
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1348
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1348
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1349
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1349
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1350
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1350
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1351
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1351
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1352
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1352
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1353
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1353
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1354
# Create the systemd unit
1354
# Create the systemd unit
1355
cat << EOF > /lib/systemd/system/tinyproxy.service
1355
cat << EOF > /lib/systemd/system/tinyproxy.service
1356
#  This file is part of systemd.
1356
#  This file is part of systemd.
1357
#
1357
#
1358
#  systemd is free software; you can redistribute it and/or modify it
1358
#  systemd is free software; you can redistribute it and/or modify it
1359
#  under the terms of the GNU General Public License as published by
1359
#  under the terms of the GNU General Public License as published by
1360
#  the Free Software Foundation; either version 2 of the License, or
1360
#  the Free Software Foundation; either version 2 of the License, or
1361
#  (at your option) any later version.
1361
#  (at your option) any later version.
1362
 
1362
 
1363
# This unit launches tinyproxy (a very light proxy).
1363
# This unit launches tinyproxy (a very light proxy).
1364
# The "sleep 2" is needed because the pid file isn't ready for systemd
1364
# The "sleep 2" is needed because the pid file isn't ready for systemd
1365
[Unit]
1365
[Unit]
1366
Description=Tinyproxy Web Proxy Server
1366
Description=Tinyproxy Web Proxy Server
1367
After=network.target iptables.service
1367
After=network.target iptables.service
1368
 
1368
 
1369
[Service]
1369
[Service]
1370
Type=forking
1370
Type=forking
1371
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1371
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1372
ExecStartPre=/bin/sleep 2
1372
ExecStartPre=/bin/sleep 2
1373
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1373
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1374
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1374
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1375
 
1375
 
1376
[Install]
1376
[Install]
1377
WantedBy=multi-user.target
1377
WantedBy=multi-user.target
1378
EOF
1378
EOF
1379
 
1379
 
1380
} # end of tinyproxy
1380
} # end of tinyproxy
1381
##################################################################################
1381
##################################################################################
1382
##			function "ulogd"					##
1382
##			function "ulogd"					##
1383
## - Ulog config for multi-log files 						##
1383
## - Ulog config for multi-log files 						##
1384
##################################################################################
1384
##################################################################################
1385
ulogd ()
1385
ulogd ()
1386
{
1386
{
1387
# Three instances of ulogd (three different logfiles)
1387
# Three instances of ulogd (three different logfiles)
1388
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1388
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1389
	nl=1
1389
	nl=1
1390
	for log_type in traceability ssh ext-access
1390
	for log_type in traceability ssh ext-access
1391
	do
1391
	do
1392
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1392
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1393
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1393
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1394
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1394
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1395
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf
1395
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf
1396
		if [ "$ARCH" == "i586" ]; then $SED "s/lib64/lib/g" /etc/ulogd-$log_type.conf; fi
1396
		if [ "$ARCH" == "i586" ]; then $SED "s/lib64/lib/g" /etc/ulogd-$log_type.conf; fi
1397
		cat << EOF >> /etc/ulogd-$log_type.conf
1397
		cat << EOF >> /etc/ulogd-$log_type.conf
1398
[emu1]
1398
[emu1]
1399
file="/var/log/firewall/$log_type.log"
1399
file="/var/log/firewall/$log_type.log"
1400
sync=1
1400
sync=1
1401
EOF
1401
EOF
1402
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1402
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1403
		nl=`expr $nl + 1`
1403
		nl=`expr $nl + 1`
1404
	done
1404
	done
1405
	chown -R root:apache /var/log/firewall
1405
	chown -R root:apache /var/log/firewall
1406
	chmod 750 /var/log/firewall
1406
	chmod 750 /var/log/firewall
1407
	chmod 640 /var/log/firewall/*
1407
	chmod 640 /var/log/firewall/*
1408
}  # End of ulogd ()
1408
}  # End of ulogd ()
1409
 
1409
 
1410
 
1410
 
1411
##########################################################
1411
##########################################################
1412
##              Function "nfsen"			##
1412
##              Function "nfsen"			##
1413
## - install the nfsen grapher				##
1413
## - install the nfsen grapher				##
1414
## - install the two plugins porttracker & surfmap	##
1414
## - install the two plugins porttracker & surfmap	##
1415
##########################################################
1415
##########################################################
1416
nfsen()
1416
nfsen()
1417
{
1417
{
1418
	tar xzf ./conf/nfsen/nfsen-1.3.7.tar.gz -C /tmp/
1418
	tar xzf ./conf/nfsen/nfsen-1.3.7.tar.gz -C /tmp/
1419
# Add PortTracker plugin
1419
# Add PortTracker plugin
1420
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1420
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1421
	do
1421
	do
1422
	[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1422
	[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1423
	done
1423
	done
1424
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.7/contrib/PortTracker/PortTracker.pm
1424
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.7/contrib/PortTracker/PortTracker.pm
1425
# use of our conf file and init unit
1425
# use of our conf file and init unit
1426
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.7/etc/
1426
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.7/etc/
1427
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1427
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1428
	DirTmp=$(pwd)
1428
	DirTmp=$(pwd)
1429
	cd /tmp/nfsen-1.3.7/
1429
	cd /tmp/nfsen-1.3.7/
1430
	/usr/bin/perl install.pl etc/nfsen.conf
1430
	/usr/bin/perl install.pl etc/nfsen.conf
1431
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1431
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1432
# Create RRD DB for porttracker (only in it still doesn't exist)
1432
# Create RRD DB for porttracker (only in it still doesn't exist)
1433
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1433
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1434
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1434
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1435
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1435
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1436
	chmod -R 770 /var/log/netflow/porttracker
1436
	chmod -R 770 /var/log/netflow/porttracker
1437
# nfsen unit for systemd
1437
# nfsen unit for systemd
1438
cat << EOF > /lib/systemd/system/nfsen.service
1438
cat << EOF > /lib/systemd/system/nfsen.service
1439
#  This file is part of systemd.
1439
#  This file is part of systemd.
1440
#
1440
#
1441
#  systemd is free software; you can redistribute it and/or modify it
1441
#  systemd is free software; you can redistribute it and/or modify it
1442
#  under the terms of the GNU General Public License as published by
1442
#  under the terms of the GNU General Public License as published by
1443
#  the Free Software Foundation; either version 2 of the License, or
1443
#  the Free Software Foundation; either version 2 of the License, or
1444
#  (at your option) any later version.
1444
#  (at your option) any later version.
1445
 
1445
 
1446
# This unit launches nfsen (a Netflow grapher).
1446
# This unit launches nfsen (a Netflow grapher).
1447
[Unit]
1447
[Unit]
1448
Description= NfSen init script
1448
Description= NfSen init script
1449
After=network.target iptables.service
1449
After=network.target iptables.service
1450
 
1450
 
1451
[Service]
1451
[Service]
1452
Type=oneshot
1452
Type=oneshot
1453
RemainAfterExit=yes
1453
RemainAfterExit=yes
1454
PIDFile=/var/run/nfsen/nfsen.pid
1454
PIDFile=/var/run/nfsen/nfsen.pid
1455
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1455
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1456
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1456
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1457
ExecStart=/usr/bin/nfsen start 
1457
ExecStart=/usr/bin/nfsen start 
1458
ExecStop=/usr/bin/nfsen stop
1458
ExecStop=/usr/bin/nfsen stop
1459
ExecReload=/usr/bin/nfsen restart
1459
ExecReload=/usr/bin/nfsen restart
1460
TimeoutSec=0
1460
TimeoutSec=0
1461
 
1461
 
1462
[Install]
1462
[Install]
1463
WantedBy=multi-user.target
1463
WantedBy=multi-user.target
1464
EOF
1464
EOF
1465
# Add the listen port to collect netflow packet (nfcapd)
1465
# Add the listen port to collect netflow packet (nfcapd)
1466
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1466
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1467
# expire delay for the profile "live"
1467
# expire delay for the profile "live"
1468
	/usr/bin/systemctl start nfsen
1468
	/usr/bin/systemctl start nfsen
1469
	/bin/nfsen -m live -e 62d 2>/dev/null
1469
	/bin/nfsen -m live -e 62d 2>/dev/null
1470
# add SURFmap plugin
1470
# add SURFmap plugin
1471
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1471
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1472
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1472
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1473
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1473
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1474
	cd /tmp/
1474
	cd /tmp/
1475
	/usr/bin/sh SURFmap/install.sh
1475
	/usr/bin/sh SURFmap/install.sh
1476
chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1476
chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1477
# clear the installation
1477
# clear the installation
1478
	cd $DirTmp
1478
	cd $DirTmp
1479
	rm -rf /tmp/nfsen*
1479
	rm -rf /tmp/nfsen*
1480
	rm -rf /tmp/SURFmap*
1480
	rm -rf /tmp/SURFmap*
1481
} # End of nfsen ()
1481
} # End of nfsen ()
1482
 
1482
 
1483
##################################################
1483
##################################################
1484
##		Function "vnstat"		##
1484
##		Function "vnstat"		##
1485
## Initialization of Vnstat and vnstat phpFE    ##
1485
## Initialization of Vnstat and vnstat phpFE    ##
1486
##################################################
1486
##################################################
1487
vnstat ()
1487
vnstat ()
1488
{
1488
{
1489
	 [ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1489
	 [ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1490
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1490
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1491
	 [ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1491
	 [ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1492
	 $SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?g" $DIR_ACC/manager/stats/config.php
1492
	 $SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?g" $DIR_ACC/manager/stats/config.php
1493
	 $SED "s?\$iface_title.*?\$iface_title['$EXTIF'] = 'Internet outbound';?g" $DIR_ACC/manager/stats/config.php
1493
	 $SED "s?\$iface_title.*?\$iface_title['$EXTIF'] = 'Internet outbound';?g" $DIR_ACC/manager/stats/config.php
1494
	/usr/bin/vnstat -u -i $EXTIF
1494
	/usr/bin/vnstat -u -i $EXTIF
1495
} # End of vnstat	
1495
} # End of vnstat	
1496
##################################################
1496
##################################################
1497
##		Function "dnsmasq"		##
1497
##		Function "dnsmasq"		##
1498
##################################################
1498
##################################################
1499
dnsmasq ()
1499
dnsmasq ()
1500
{
1500
{
1501
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1501
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1502
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1502
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1503
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1503
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1504
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1504
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1505
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1505
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1506
	cat << EOF > /etc/dnsmasq.conf 
1506
	cat << EOF > /etc/dnsmasq.conf 
1507
# Configuration file for "dnsmasq in forward mode"
1507
# Configuration file for "dnsmasq in forward mode"
1508
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1508
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1509
listen-address=$PRIVATE_IP
1509
listen-address=$PRIVATE_IP
1510
pid-file=/var/run/dnsmasq.pid
1510
pid-file=/var/run/dnsmasq.pid
1511
listen-address=127.0.0.1
1511
listen-address=127.0.0.1
1512
no-dhcp-interface=$INTIF
1512
no-dhcp-interface=$INTIF
1513
no-dhcp-interface=tun0
1513
no-dhcp-interface=tun0
1514
no-dhcp-interface=lo
1514
no-dhcp-interface=lo
1515
bind-interfaces
1515
bind-interfaces
1516
cache-size=256
1516
cache-size=256
1517
domain=$DOMAIN
1517
domain=$DOMAIN
1518
domain-needed
1518
domain-needed
1519
expand-hosts
1519
expand-hosts
1520
bogus-priv
1520
bogus-priv
1521
filterwin2k
1521
filterwin2k
1522
server=$DNS1
1522
server=$DNS1
1523
server=$DNS2
1523
server=$DNS2
1524
# DHCP service is configured. It will be enabled in "bypass" mode
1524
# DHCP service is configured. It will be enabled in "bypass" mode
1525
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1525
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1526
#dhcp-option=option:router,$PRIVATE_IP
1526
#dhcp-option=option:router,$PRIVATE_IP
1527
#dhcp-option=option:ntp-server,$PRIVATE_IP
1527
#dhcp-option=option:ntp-server,$PRIVATE_IP
1528
 
1528
 
1529
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1529
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1530
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1530
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1531
EOF
1531
EOF
1532
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1532
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1533
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1533
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1534
# Configuration file for "dnsmasq with blacklist"
1534
# Configuration file for "dnsmasq with blacklist"
1535
# Add Toulouse blacklist domains
1535
# Add Toulouse blacklist domains
1536
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1536
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1537
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1537
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1538
pid-file=/var/run/dnsmasq-blacklist.pid
1538
pid-file=/var/run/dnsmasq-blacklist.pid
1539
listen-address=$PRIVATE_IP
1539
listen-address=$PRIVATE_IP
1540
port=54
1540
port=54
1541
no-dhcp-interface=$INTIF
1541
no-dhcp-interface=$INTIF
1542
no-dhcp-interface=tun0
1542
no-dhcp-interface=tun0
1543
no-dhcp-interface=lo
1543
no-dhcp-interface=lo
1544
bind-interfaces
1544
bind-interfaces
1545
cache-size=256
1545
cache-size=256
1546
domain=$DOMAIN
1546
domain=$DOMAIN
1547
domain-needed
1547
domain-needed
1548
expand-hosts
1548
expand-hosts
1549
bogus-priv
1549
bogus-priv
1550
filterwin2k
1550
filterwin2k
1551
server=$DNS1
1551
server=$DNS1
1552
server=$DNS2
1552
server=$DNS2
1553
EOF
1553
EOF
1554
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1554
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1555
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1555
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1556
# Configuration file for "dnsmasq with whitelist"
1556
# Configuration file for "dnsmasq with whitelist"
1557
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1557
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1558
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1558
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1559
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1559
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1560
pid-file=/var/run/dnsmasq-whitelist.pid
1560
pid-file=/var/run/dnsmasq-whitelist.pid
1561
listen-address=$PRIVATE_IP
1561
listen-address=$PRIVATE_IP
1562
port=55
1562
port=55
1563
no-dhcp-interface=$INTIF
1563
no-dhcp-interface=$INTIF
1564
no-dhcp-interface=tun0
1564
no-dhcp-interface=tun0
1565
no-dhcp-interface=lo
1565
no-dhcp-interface=lo
1566
bind-interfaces
1566
bind-interfaces
1567
cache-size=256
1567
cache-size=256
1568
domain=$DOMAIN
1568
domain=$DOMAIN
1569
domain-needed
1569
domain-needed
1570
expand-hosts
1570
expand-hosts
1571
bogus-priv
1571
bogus-priv
1572
filterwin2k
1572
filterwin2k
1573
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1573
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1574
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1574
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1575
EOF
1575
EOF
1576
# 4th dnsmasq listen on udp 56 ("blackhole")
1576
# 4th dnsmasq listen on udp 56 ("blackhole")
1577
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1577
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1578
# Configuration file for "dnsmasq as a blackhole"
1578
# Configuration file for "dnsmasq as a blackhole"
1579
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1579
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1580
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1580
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1581
pid-file=/var/run/dnsmasq-blackhole.pid
1581
pid-file=/var/run/dnsmasq-blackhole.pid
1582
listen-address=$PRIVATE_IP
1582
listen-address=$PRIVATE_IP
1583
port=56
1583
port=56
1584
no-dhcp-interface=$INTIF
1584
no-dhcp-interface=$INTIF
1585
no-dhcp-interface=tun0
1585
no-dhcp-interface=tun0
1586
no-dhcp-interface=lo
1586
no-dhcp-interface=lo
1587
bind-interfaces
1587
bind-interfaces
1588
cache-size=256
1588
cache-size=256
1589
domain=$DOMAIN
1589
domain=$DOMAIN
1590
domain-needed
1590
domain-needed
1591
expand-hosts
1591
expand-hosts
1592
bogus-priv
1592
bogus-priv
1593
filterwin2k
1593
filterwin2k
1594
EOF
1594
EOF
1595
 
1595
 
1596
# the main instance should start after network and chilli (which create tun0)
1596
# the main instance should start after network and chilli (which create tun0)
1597
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1597
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1598
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1598
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1599
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1599
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1600
	for list in blacklist whitelist blackhole
1600
	for list in blacklist whitelist blackhole
1601
	do
1601
	do
1602
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1602
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1603
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1603
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1604
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1604
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1605
	done
1605
	done
1606
} # End dnsmasq
1606
} # End dnsmasq
1607
 
1607
 
1608
##########################################################
1608
##########################################################
1609
##		Fonction "BL"				##
1609
##		Fonction "BL"				##
1610
##########################################################
1610
##########################################################
1611
BL ()
1611
BL ()
1612
{
1612
{
1613
# copy and extract toulouse BL
1613
# copy and extract toulouse BL
1614
	rm -rf $DIR_DG/lists/blacklists
1614
	rm -rf $DIR_DG/lists/blacklists
1615
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1615
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1616
# creation of the OSSI BL and WL categories (domain name and url)
1616
# creation of the OSSI BL and WL categories (domain name and url)
1617
	mkdir $DIR_DG/lists/blacklists/ossi
1617
	mkdir $DIR_DG/lists/blacklists/ossi
1618
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1618
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1619
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1619
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1620
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1620
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1621
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1621
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1622
# creation of file for the rehabilited domains and urls
1622
# creation of file for the rehabilited domains and urls
1623
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1623
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1624
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1624
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1625
	touch $DIR_DG/lists/exceptionsitelist
1625
	touch $DIR_DG/lists/exceptionsitelist
1626
	touch $DIR_DG/lists/exceptionurllist
1626
	touch $DIR_DG/lists/exceptionurllist
1627
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1627
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1628
	cat <<EOF > $DIR_DG/lists/bannedurllist
1628
	cat <<EOF > $DIR_DG/lists/bannedurllist
1629
# Dansguardian filter config for ALCASAR
1629
# Dansguardian filter config for ALCASAR
1630
EOF
1630
EOF
1631
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1631
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1632
# Dansguardian domain filter config for ALCASAR
1632
# Dansguardian domain filter config for ALCASAR
1633
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1633
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1634
#**
1634
#**
1635
# block all SSL and CONNECT tunnels
1635
# block all SSL and CONNECT tunnels
1636
**s
1636
**s
1637
# block all SSL and CONNECT tunnels specified only as an IP
1637
# block all SSL and CONNECT tunnels specified only as an IP
1638
*ips
1638
*ips
1639
# block all sites specified only by an IP
1639
# block all sites specified only by an IP
1640
*ip
1640
*ip
1641
EOF
1641
EOF
1642
# Add Bing and Youtube to the safesearch url regext list (parental control)
1642
# Add Bing and Youtube to the safesearch url regext list (parental control)
1643
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1643
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1644
# Bing - add 'adlt=strict'
1644
# Bing - add 'adlt=strict'
1645
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1645
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1646
# Youtube - add 'edufilter=your_ID' 
1646
# Youtube - add 'edufilter=your_ID' 
1647
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1647
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1648
EOF
1648
EOF
1649
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1649
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1650
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1650
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1651
# adapt the BL to ALCASAR architecture. Enable the default categories
1651
# adapt the BL to ALCASAR architecture. Enable the default categories
1652
	if [ "$mode" != "update" ]; then
1652
	if [ "$mode" != "update" ]; then
1653
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1653
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1654
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1654
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1655
	fi
1655
	fi
1656
}
1656
}
1657
 
1657
 
1658
##########################################################
1658
##########################################################
1659
##		Fonction "cron"				##
1659
##		Fonction "cron"				##
1660
## - Mise en place des différents fichiers de cron	##
1660
## - Mise en place des différents fichiers de cron	##
1661
##########################################################
1661
##########################################################
1662
cron ()
1662
cron ()
1663
{
1663
{
1664
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1664
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1665
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1665
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1666
	cat <<EOF > /etc/crontab
1666
	cat <<EOF > /etc/crontab
1667
SHELL=/bin/bash
1667
SHELL=/bin/bash
1668
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1668
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1669
MAILTO=root
1669
MAILTO=root
1670
HOME=/
1670
HOME=/
1671
 
1671
 
1672
# run-parts
1672
# run-parts
1673
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1673
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1674
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1674
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1675
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1675
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1676
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1676
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1677
EOF
1677
EOF
1678
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1678
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1679
	cat <<EOF >> /etc/anacrontab
1679
	cat <<EOF >> /etc/anacrontab
1680
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1680
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1681
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1681
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1682
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1682
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1683
EOF
1683
EOF
1684
 
1684
 
1685
	cat <<EOF > /etc/cron.d/alcasar-mysql
1685
	cat <<EOF > /etc/cron.d/alcasar-mysql
1686
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1686
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1687
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1687
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1688
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1688
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1689
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1689
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1690
EOF
1690
EOF
1691
	cat <<EOF > /etc/cron.d/alcasar-archive
1691
	cat <<EOF > /etc/cron.d/alcasar-archive
1692
# Archive des logs et de la base de données (tous les lundi à 5h35)
1692
# Archive des logs et de la base de données (tous les lundi à 5h35)
1693
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1693
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1694
EOF
1694
EOF
1695
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1695
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1696
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1696
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1697
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1697
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1698
EOF
1698
EOF
1699
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1699
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1700
# mise à jour automatique de la distribution tous les jours 3h30
1700
# mise à jour automatique de la distribution tous les jours 3h30
1701
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1701
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1702
EOF
1702
EOF
1703
	#cat << EOF > /etc/cron.d/alcasar-netflow
1703
	#cat << EOF > /etc/cron.d/alcasar-netflow
1704
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1704
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1705
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1705
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1706
#EOF
1706
#EOF
1707
 
1707
 
1708
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1708
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1709
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1709
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1710
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1710
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1711
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1711
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1712
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1712
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1713
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1713
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1714
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1714
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1715
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1715
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1716
	rm -f /etc/cron.daily/freeradius-web
1716
	rm -f /etc/cron.daily/freeradius-web
1717
	rm -f /etc/cron.monthly/freeradius-web
1717
	rm -f /etc/cron.monthly/freeradius-web
1718
	cat << EOF > /etc/cron.d/freeradius-web
1718
	cat << EOF > /etc/cron.d/freeradius-web
1719
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1719
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1720
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1720
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1721
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1721
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1722
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1722
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1723
EOF
1723
EOF
1724
	cat << EOF > /etc/cron.d/alcasar-watchdog
1724
	cat << EOF > /etc/cron.d/alcasar-watchdog
1725
# activation du "chien de garde" (watchdog) toutes les 3'
1725
# activation du "chien de garde" (watchdog) toutes les 3'
1726
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1726
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1727
EOF
1727
EOF
1728
# activation du "chien de garde des services" (watchdog) toutes les 18'
1728
# activation du "chien de garde des services" (watchdog) toutes les 18'
1729
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1729
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1730
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1730
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1731
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1731
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1732
EOF
1732
EOF
1733
# suppression des crons usagers
1733
# suppression des crons usagers
1734
	rm -f /var/spool/cron/*
1734
	rm -f /var/spool/cron/*
1735
} # End cron
1735
} # End cron
1736
 
1736
 
1737
##################################################################
1737
##################################################################
1738
## 			Fonction "Fail2Ban"			##
1738
## 			Fonction "Fail2Ban"			##
1739
##- Modification de la configuration de fail2ban		##
1739
##- Modification de la configuration de fail2ban		##
1740
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1740
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1741
##################################################################
1741
##################################################################
1742
fail2ban()
1742
fail2ban()
1743
{
1743
{
1744
	$DIR_CONF/fail2ban.sh
1744
	$DIR_CONF/fail2ban.sh
1745
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1745
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1746
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1746
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1747
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1747
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1748
	chmod 644 /var/log/fail2ban.log
1748
	chmod 644 /var/log/fail2ban.log
1749
	chmod 644 /var/Save/security/watchdog.log
1749
	chmod 644 /var/Save/security/watchdog.log
1750
	/usr/bin/touch /var/log/auth.log
1750
	/usr/bin/touch /var/log/auth.log
1751
# fail2ban unit
1751
# fail2ban unit
1752
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1752
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1753
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1753
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1754
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1754
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1755
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1755
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1756
} #Fin de fail2ban_install()
1756
} #Fin de fail2ban_install()
1757
 
1757
 
1758
##################################################################
1758
##################################################################
1759
## 			Fonction "gammu_smsd"			##
1759
## 			Fonction "gammu_smsd"			##
1760
## - Creation de la base de donnée Gammu			##
1760
## - Creation de la base de donnée Gammu			##
1761
## - Creation du fichier de config: gammu_smsd_conf		##
1761
## - Creation du fichier de config: gammu_smsd_conf		##
1762
##								##
1762
##								##
1763
##################################################################
1763
##################################################################
1764
gammu_smsd()
1764
gammu_smsd()
1765
{
1765
{
1766
# Create 'gammu' databse
1766
# Create 'gammu' databse
1767
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1767
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1768
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1768
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1769
# Add a gammu database structure
1769
# Add a gammu database structure
1770
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1770
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1771
 
1771
 
1772
# config file for the daemon
1772
# config file for the daemon
1773
cat << EOF > /etc/gammu_smsd_conf
1773
cat << EOF > /etc/gammu_smsd_conf
1774
[gammu]
1774
[gammu]
1775
port = /dev/ttyUSB0
1775
port = /dev/ttyUSB0
1776
connection = at115200
1776
connection = at115200
1777
 
1777
 
1778
;########################################################
1778
;########################################################
1779
 
1779
 
1780
[smsd]
1780
[smsd]
1781
 
1781
 
1782
PIN = 1234
1782
PIN = 1234
1783
 
1783
 
1784
logfile = /var/log/gammu-smsd/gammu-smsd.log
1784
logfile = /var/log/gammu-smsd/gammu-smsd.log
1785
logformat = textall
1785
logformat = textall
1786
debuglevel = 0
1786
debuglevel = 0
1787
 
1787
 
1788
service = sql
1788
service = sql
1789
driver = native_mysql
1789
driver = native_mysql
1790
user = $DB_USER
1790
user = $DB_USER
1791
password = $radiuspwd
1791
password = $radiuspwd
1792
pc = localhost
1792
pc = localhost
1793
database = $DB_GAMMU
1793
database = $DB_GAMMU
1794
 
1794
 
1795
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1795
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1796
 
1796
 
1797
StatusFrequency = 30
1797
StatusFrequency = 30
1798
;LoopSleep = 2
1798
;LoopSleep = 2
1799
 
1799
 
1800
;ResetFrequency = 300
1800
;ResetFrequency = 300
1801
;HardResetFrequency = 120
1801
;HardResetFrequency = 120
1802
 
1802
 
1803
CheckSecurity = 1 
1803
CheckSecurity = 1 
1804
CheckSignal = 1
1804
CheckSignal = 1
1805
CheckBattery = 0
1805
CheckBattery = 0
1806
EOF
1806
EOF
1807
 
1807
 
1808
chmod 755 /etc/gammu_smsd_conf
1808
chmod 755 /etc/gammu_smsd_conf
1809
 
1809
 
1810
#Creation dossier de log Gammu-smsd
1810
#Creation dossier de log Gammu-smsd
1811
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1811
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1812
chmod 755 /var/log/gammu-smsd
1812
chmod 755 /var/log/gammu-smsd
1813
 
1813
 
1814
#Edition du script sql gammu <-> radius
1814
#Edition du script sql gammu <-> radius
1815
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1815
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1816
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1816
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1817
 
1817
 
1818
#Création de la règle udev pour les Huawei // idVendor: 12d1
1818
#Création de la règle udev pour les Huawei // idVendor: 12d1
1819
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1819
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1820
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1820
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1821
EOF
1821
EOF
1822
 
1822
 
1823
} # END gammu_smsd()
1823
} # END gammu_smsd()
1824
 
1824
 
1825
##################################################################
1825
##################################################################
1826
##			Fonction "post_install"			##
1826
##			Fonction "post_install"			##
1827
## - Modification des bannières (locales et ssh) et des prompts ##
1827
## - Modification des bannières (locales et ssh) et des prompts ##
1828
## - Installation de la structure de chiffrement pour root	##
1828
## - Installation de la structure de chiffrement pour root	##
1829
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1829
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1830
## - Mise en place du la rotation des logs			##
1830
## - Mise en place du la rotation des logs			##
1831
## - Configuration dans le cas d'une mise à jour		##
1831
## - Configuration dans le cas d'une mise à jour		##
1832
##################################################################
1832
##################################################################
1833
post_install()
1833
post_install()
1834
{
1834
{
1835
# création de la bannière locale
1835
# création de la bannière locale
1836
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1836
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1837
	cp -f $DIR_CONF/banner /etc/mageia-release
1837
	cp -f $DIR_CONF/banner /etc/mageia-release
1838
	echo " V$VERSION" >> /etc/mageia-release
1838
	echo " V$VERSION" >> /etc/mageia-release
1839
# création de la bannière SSH
1839
# création de la bannière SSH
1840
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1840
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1841
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1841
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1842
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1842
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1843
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1843
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1844
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1844
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1845
# postfix banner anonymisation
1845
# postfix banner anonymisation
1846
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1846
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1847
# sshd écoute côté LAN et WAN
1847
# sshd écoute côté LAN et WAN
1848
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1848
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1849
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1849
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1850
	echo "SSH=off" >> $CONF_FILE
1850
	echo "SSH=off" >> $CONF_FILE
1851
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
1851
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
1852
	echo "QOS=off" >> $CONF_FILE
1852
	echo "QOS=off" >> $CONF_FILE
1853
	echo "LDAP=off" >> $CONF_FILE
1853
	echo "LDAP=off" >> $CONF_FILE
1854
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1854
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1855
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1855
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1856
	echo "MULTIWAN=off" >> $CONF_FILE
1856
	echo "MULTIWAN=off" >> $CONF_FILE
1857
	echo "FAILOVER=30" >> $CONF_FILE
1857
	echo "FAILOVER=30" >> $CONF_FILE
1858
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1858
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1859
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1859
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1860
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1860
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1861
# Coloration des prompts
1861
# Coloration des prompts
1862
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1862
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1863
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1863
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1864
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1864
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1865
# Droits d'exécution pour utilisateur apache et sysadmin
1865
# Droits d'exécution pour utilisateur apache et sysadmin
1866
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1866
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1867
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1867
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1868
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1868
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1869
# Modify some logrotate files (gammu, ulogd)
1869
# Modify some logrotate files (gammu, ulogd)
1870
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1870
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1871
	chmod 644 /etc/logrotate.d/*
1871
	chmod 644 /etc/logrotate.d/*
1872
# rectification sur versions précédentes de la compression des logs
1872
# rectification sur versions précédentes de la compression des logs
1873
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1873
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1874
# actualisation des fichiers logs compressés
1874
# actualisation des fichiers logs compressés
1875
	for dir in firewall dansguardian httpd
1875
	for dir in firewall dansguardian httpd
1876
	do
1876
	do
1877
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1877
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1878
	done
1878
	done
1879
# create the alcasar-load_balancing unit
1879
# create the alcasar-load_balancing unit
1880
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1880
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1881
#  This file is part of systemd.
1881
#  This file is part of systemd.
1882
#
1882
#
1883
#  systemd is free software; you can redistribute it and/or modify it
1883
#  systemd is free software; you can redistribute it and/or modify it
1884
#  under the terms of the GNU General Public License as published by
1884
#  under the terms of the GNU General Public License as published by
1885
#  the Free Software Foundation; either version 2 of the License, or
1885
#  the Free Software Foundation; either version 2 of the License, or
1886
#  (at your option) any later version.
1886
#  (at your option) any later version.
1887
 
1887
 
1888
# This unit lauches alcasar-load-balancing.sh script.
1888
# This unit lauches alcasar-load-balancing.sh script.
1889
[Unit]
1889
[Unit]
1890
Description=alcasar-load_balancing.sh execution
1890
Description=alcasar-load_balancing.sh execution
1891
After=network.target iptables.service
1891
After=network.target iptables.service
1892
 
1892
 
1893
[Service]
1893
[Service]
1894
Type=oneshot
1894
Type=oneshot
1895
RemainAfterExit=yes
1895
RemainAfterExit=yes
1896
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1896
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1897
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1897
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1898
TimeoutSec=0
1898
TimeoutSec=0
1899
SysVStartPriority=99
1899
SysVStartPriority=99
1900
 
1900
 
1901
[Install]
1901
[Install]
1902
WantedBy=multi-user.target
1902
WantedBy=multi-user.target
1903
EOF
1903
EOF
1904
# processes launched at boot time (Systemctl)
1904
# processes launched at boot time (Systemctl)
1905
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1905
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1906
	do
1906
	do
1907
		/usr/bin/systemctl -q enable $i.service
1907
		/usr/bin/systemctl -q enable $i.service
1908
	done
1908
	done
1909
	
1909
	
1910
# disable processes at boot time (Systemctl)
1910
# disable processes at boot time (Systemctl)
1911
	for i in ulogd
1911
	for i in ulogd
1912
	do
1912
	do
1913
		/usr/bin/systemctl -q disable $i.service
1913
		/usr/bin/systemctl -q disable $i.service
1914
	done
1914
	done
1915
	
1915
	
1916
# Apply French Security Agency (ANSSI) rules
1916
# Apply French Security Agency (ANSSI) rules
1917
# ignore ICMP broadcast (smurf attack)
1917
# ignore ICMP broadcast (smurf attack)
1918
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1918
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1919
# ignore ICMP errors bogus
1919
# ignore ICMP errors bogus
1920
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1920
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1921
# remove ICMP redirects responces
1921
# remove ICMP redirects responces
1922
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1922
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1923
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1923
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1924
# enable SYN Cookies (Syn flood attacks)
1924
# enable SYN Cookies (Syn flood attacks)
1925
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1925
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1926
# enable kernel antispoofing
1926
# enable kernel antispoofing
1927
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1927
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1928
# ignore source routing
1928
# ignore source routing
1929
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1929
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1930
# set conntrack timer to 1h (3600s) instead of 5 weeks
1930
# set conntrack timer to 1h (3600s) instead of 5 weeks
1931
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1931
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1932
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1932
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1933
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1933
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1934
# remove Magic SysReq Keys
1934
# remove Magic SysReq Keys
1935
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1935
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1936
# switch to multi-users runlevel (instead of x11)
1936
# switch to multi-users runlevel (instead of x11)
1937
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1937
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1938
#	GRUB modifications (only one time)
1938
#	GRUB modifications (only one time)
1939
# limit wait time to 3s
1939
# limit wait time to 3s
1940
# create an alcasar entry instead of linux-nonfb
1940
# create an alcasar entry instead of linux-nonfb
1941
# change display to 1024*768 (vga791)
1941
# change display to 1024*768 (vga791)
1942
	grub_already_modified=`grep ALCASAR /boot/grub/menu.lst|wc -l`
1942
	grub_already_modified=`grep ALCASAR /boot/grub/menu.lst|wc -l`
1943
	if [ $grub_already_modified == 0 ]
1943
	if [ $grub_already_modified == 0 ]
1944
		then
1944
		then
1945
		$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1945
		$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1946
		$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1946
		$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1947
		$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1947
		$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1948
		$SED "/^kernel/s/$/ vga=791/" /boot/grub/menu.lst
1948
		$SED "/^kernel/s/$/ vga=791/" /boot/grub/menu.lst
1949
		$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1949
		$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1950
		$SED "/^gfxmenu/d" /boot/grub/menu.lst
1950
		$SED "/^gfxmenu/d" /boot/grub/menu.lst
1951
	fi
1951
	fi
1952
# Remove unused services and users
1952
# Remove unused services and users
1953
	for svc in sshd
1953
	for svc in sshd
1954
	do
1954
	do
1955
		/usr/bin/systemctl -q disable $svc.service
1955
		/usr/bin/systemctl -q disable $svc.service
1956
	done
1956
	done
1957
# Load and apply the previous conf file
1957
# Load and apply the previous conf file
1958
	if [ "$mode" = "update" ]
1958
	if [ "$mode" = "update" ]
1959
	then
1959
	then
1960
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1960
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
1961
		$DIR_DEST_BIN/alcasar-conf.sh --load
1961
		$DIR_DEST_BIN/alcasar-conf.sh --load
1962
		PARENT_SCRIPT=`basename $0`
1962
		PARENT_SCRIPT=`basename $0`
1963
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1963
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1964
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1964
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1965
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1965
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1966
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1966
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1967
	fi
1967
	fi
1968
	rm -f /tmp/alcasar-conf*
1968
	rm -f /tmp/alcasar-conf*
1969
	chown -R root:apache $DIR_DEST_ETC/*
1969
	chown -R root:apache $DIR_DEST_ETC/*
1970
	chmod -R 660 $DIR_DEST_ETC/*
1970
	chmod -R 660 $DIR_DEST_ETC/*
1971
	chmod ug+x $DIR_DEST_ETC/digest
1971
	chmod ug+x $DIR_DEST_ETC/digest
1972
# Apply and save the firewall rules
1972
# Apply and save the firewall rules
1973
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1973
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1974
	sleep 2
1974
	sleep 2
1975
	cd $DIR_INSTALL
1975
	cd $DIR_INSTALL
1976
	echo ""
1976
	echo ""
1977
	echo "#############################################################################"
1977
	echo "#############################################################################"
1978
	if [ $Lang == "fr" ]
1978
	if [ $Lang == "fr" ]
1979
		then
1979
		then
1980
		echo "#                        Fin d'installation d'ALCASAR                       #"
1980
		echo "#                        Fin d'installation d'ALCASAR                       #"
1981
		echo "#                                                                           #"
1981
		echo "#                                                                           #"
1982
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1982
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1983
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1983
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1984
		echo "#                                                                           #"
1984
		echo "#                                                                           #"
1985
		echo "#############################################################################"
1985
		echo "#############################################################################"
1986
		echo
1986
		echo
1987
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1987
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1988
		echo
1988
		echo
1989
		echo "- Lisez attentivement la documentation d'exploitation"
1989
		echo "- Lisez attentivement la documentation d'exploitation"
1990
		echo
1990
		echo
1991
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1991
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1992
		echo
1992
		echo
1993
		echo "                   Appuyez sur 'Entrée' pour continuer"
1993
		echo "                   Appuyez sur 'Entrée' pour continuer"
1994
	else	
1994
	else	
1995
		echo "#                        Enf of ALCASAR install process                     #"
1995
		echo "#                        Enf of ALCASAR install process                     #"
1996
		echo "#                                                                           #"
1996
		echo "#                                                                           #"
1997
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1997
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1998
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1998
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1999
		echo "#                                                                           #"
1999
		echo "#                                                                           #"
2000
		echo "#############################################################################"
2000
		echo "#############################################################################"
2001
		echo
2001
		echo
2002
		echo "- The system will be rebooted in order to operate ALCASAR"
2002
		echo "- The system will be rebooted in order to operate ALCASAR"
2003
		echo
2003
		echo
2004
		echo "- Read the exploitation documentation"
2004
		echo "- Read the exploitation documentation"
2005
		echo
2005
		echo
2006
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
2006
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
2007
		echo
2007
		echo
2008
		echo "                   Hit 'Enter' to continue"
2008
		echo "                   Hit 'Enter' to continue"
2009
	fi
2009
	fi
2010
	sleep 2
2010
	sleep 2
2011
	if [ "$mode" != "update" ]
2011
	if [ "$mode" != "update" ]
2012
	then
2012
	then
2013
		read a
2013
		read a
2014
	fi
2014
	fi
2015
	clear
2015
	clear
2016
	reboot
2016
	reboot
2017
} # End post_install ()
2017
} # End post_install ()
2018
 
2018
 
2019
#################################
2019
#################################
2020
#  	Main Install loop  	#
2020
#  	Main Install loop  	#
2021
#################################
2021
#################################
2022
dir_exec=`dirname "$0"`
2022
dir_exec=`dirname "$0"`
2023
if [ $dir_exec != "." ]
2023
if [ $dir_exec != "." ]
2024
then
2024
then
2025
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2025
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2026
	echo "Launch this program from the ALCASAR archive directory"
2026
	echo "Launch this program from the ALCASAR archive directory"
2027
	exit 0
2027
	exit 0
2028
fi
2028
fi
2029
VERSION=`cat $DIR_INSTALL/VERSION`
2029
VERSION=`cat $DIR_INSTALL/VERSION`
2030
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2030
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2031
nb_args=$#
2031
nb_args=$#
2032
args=$1
2032
args=$1
2033
if [ $nb_args -eq 0 ]
2033
if [ $nb_args -eq 0 ]
2034
then
2034
then
2035
	nb_args=1
2035
	nb_args=1
2036
	args="-h"
2036
	args="-h"
2037
fi
2037
fi
2038
chmod -R u+x $DIR_SCRIPTS/*
2038
chmod -R u+x $DIR_SCRIPTS/*
2039
case $args in
2039
case $args in
2040
	-\? | -h* | --h*)
2040
	-\? | -h* | --h*)
2041
		echo "$usage"
2041
		echo "$usage"
2042
		exit 0
2042
		exit 0
2043
		;;
2043
		;;
2044
	-i | --install)
2044
	-i | --install)
2045
		header_install
2045
		header_install
2046
		license
2046
		license
2047
		header_install
2047
		header_install
2048
		testing
2048
		testing
2049
# RPMs install
2049
# RPMs install
2050
		$DIR_SCRIPTS/alcasar-urpmi.sh
2050
		$DIR_SCRIPTS/alcasar-urpmi.sh
2051
		if [ "$?" != "0" ]
2051
		if [ "$?" != "0" ]
2052
		then
2052
		then
2053
			exit 0
2053
			exit 0
2054
		fi
2054
		fi
2055
		if [ -e $CONF_FILE ]
2055
		if [ -e $CONF_FILE ]
2056
		then
2056
		then
2057
# Uninstall the running version
2057
# Uninstall the running version
2058
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2058
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2059
		fi
2059
		fi
2060
# Test if manual update	
2060
# Test if manual update	
2061
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2061
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2062
		then
2062
		then
2063
			header_install
2063
			header_install
2064
			if [ $Lang == "fr" ]
2064
			if [ $Lang == "fr" ]
2065
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2065
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2066
				else echo "The configuration file of an old version has been found";
2066
				else echo "The configuration file of an old version has been found";
2067
			fi
2067
			fi
2068
			response=0
2068
			response=0
2069
			PTN='^[oOnNyY]$'
2069
			PTN='^[oOnNyY]$'
2070
			until [[ $(expr $response : $PTN) -gt 0 ]]
2070
			until [[ $(expr $response : $PTN) -gt 0 ]]
2071
			do
2071
			do
2072
				if [ $Lang == "fr" ]
2072
				if [ $Lang == "fr" ]
2073
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2073
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2074
					else echo -n "Do you want to use it (Y/n)?";
2074
					else echo -n "Do you want to use it (Y/n)?";
2075
				 fi
2075
				 fi
2076
				read response
2076
				read response
2077
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2077
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2078
				then rm -f /tmp/alcasar-conf*
2078
				then rm -f /tmp/alcasar-conf*
2079
				fi
2079
				fi
2080
			done
2080
			done
2081
		fi
2081
		fi
2082
# Test if update
2082
# Test if update
2083
		if [ -e /tmp/alcasar-conf* ] 
2083
		if [ -e /tmp/alcasar-conf* ] 
2084
		then
2084
		then
2085
			if [ $Lang == "fr" ]
2085
			if [ $Lang == "fr" ]
2086
				then echo "#### Installation avec mise à jour ####";
2086
				then echo "#### Installation avec mise à jour ####";
2087
				else echo "#### Installation with update     ####";
2087
				else echo "#### Installation with update     ####";
2088
			fi
2088
			fi
2089
# Extract the central configuration file
2089
# Extract the central configuration file
2090
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2090
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2091
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2091
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2092
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2092
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2093
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2093
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2094
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2094
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2095
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2095
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2096
			mode="update"
2096
			mode="update"
2097
		fi
2097
		fi
2098
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd post_install
2098
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd post_install
2099
		do
2099
		do
2100
			$func
2100
			$func
2101
# echo "*** 'debug' : end of function $func ***"; read a
2101
# echo "*** 'debug' : end of function $func ***"; read a
2102
		done
2102
		done
2103
		;;
2103
		;;
2104
	-u | --uninstall)
2104
	-u | --uninstall)
2105
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2105
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2106
		then
2106
		then
2107
			if [ $Lang == "fr" ]
2107
			if [ $Lang == "fr" ]
2108
				then echo "ALCASAR n'est pas installé!";
2108
				then echo "ALCASAR n'est pas installé!";
2109
				else echo "ALCASAR isn't installed!";
2109
				else echo "ALCASAR isn't installed!";
2110
			fi
2110
			fi
2111
			exit 0
2111
			exit 0
2112
		fi
2112
		fi
2113
		response=0
2113
		response=0
2114
		PTN='^[oOnN]$'
2114
		PTN='^[oOnN]$'
2115
		until [[ $(expr $response : $PTN) -gt 0 ]]
2115
		until [[ $(expr $response : $PTN) -gt 0 ]]
2116
		do
2116
		do
2117
			if [ $Lang == "fr" ]
2117
			if [ $Lang == "fr" ]
2118
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2118
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2119
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2119
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2120
			fi
2120
			fi
2121
			read response
2121
			read response
2122
		done
2122
		done
2123
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2123
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2124
		then
2124
		then
2125
			$DIR_SCRIPTS/alcasar-conf.sh --create
2125
			$DIR_SCRIPTS/alcasar-conf.sh --create
2126
		else	
2126
		else	
2127
			rm -f /tmp/alcasar-conf*
2127
			rm -f /tmp/alcasar-conf*
2128
		fi
2128
		fi
2129
# Uninstall the running version
2129
# Uninstall the running version
2130
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2130
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2131
		;;
2131
		;;
2132
	*)
2132
	*)
2133
		echo "Argument inconnu :$1";
2133
		echo "Argument inconnu :$1";
2134
		echo "Unknown argument :$1";
2134
		echo "Unknown argument :$1";
2135
		echo "$usage"
2135
		echo "$usage"
2136
		exit 1
2136
		exit 1
2137
		;;
2137
		;;
2138
esac
2138
esac
2139
# end of script
2139
# end of script
2140
 
2140
 
2141
 
2141