Subversion Repositories ALCASAR

Rev

Rev 1737 | Rev 1747 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1737 Rev 1740
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 1737 2015-12-30 08:32:47Z richard $ 
2
#  $Id: alcasar.sh 1740 2016-01-03 23:10:30Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
23
 
23
 
24
# Options :
24
# Options :
25
#       -i or --install
25
#       -i or --install
26
#       -u or --uninstall
26
#       -u or --uninstall
27
 
27
 
28
# Functions :
28
# Functions :
29
#	testing			: connectivity tests, free space test and mageia version test
29
#	testing			: connectivity tests, free space test and mageia version test
30
#	init			: Installation of RPM and scripts
30
#	init			: Installation of RPM and scripts
31
#	network			: Network parameters
31
#	network			: Network parameters
32
#	ACC			: ALCASAR Control Center installation
32
#	ACC			: ALCASAR Control Center installation
33
#	CA			: Certification Authority initialization
33
#	CA			: Certification Authority initialization
34
#	init_db			: Initilization of radius database managed with MariaDB
34
#	init_db			: Initilization of radius database managed with MariaDB
35
#	radius			: FreeRadius initialisation
35
#	radius			: FreeRadius initialisation
36
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
36
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
37
#	chilli			: coovachilli initialisation (+authentication page)
37
#	chilli			: coovachilli initialisation (+authentication page)
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	antivirus		: HAVP + libclamav configuration
39
#	antivirus		: HAVP + libclamav configuration
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
42
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	vnstat			: little network stat daemon
44
#	vnstat			: little network stat daemon
45
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
46
#	cron			: Logs export + watchdog + connexion statistics
46
#	cron			: Logs export + watchdog + connexion statistics
47
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	fail2ban		: Fail2ban IDS installation and configuration
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
49
#	post_install		: Security, log rotation, etc.
49
#	post_install		: Security, log rotation, etc.
50
 
50
 
51
DATE=`date '+%d %B %Y - %Hh%M'`
51
DATE=`date '+%d %B %Y - %Hh%M'`
52
DATE_SHORT=`date '+%d/%m/%Y'`
52
DATE_SHORT=`date '+%d/%m/%Y'`
53
Lang=`echo $LANG|cut -c 1-2`
53
Lang=`echo $LANG|cut -c 1-2`
54
mode="install"
54
mode="install"
55
# ******* Files parameters - paramètres fichiers *********
55
# ******* Files parameters - paramètres fichiers *********
56
DIR_INSTALL=`pwd`				# current directory 
56
DIR_INSTALL=`pwd`				# current directory 
57
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
57
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
58
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
58
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
59
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
59
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
60
DIR_WEB="/var/www/html"				# directory of APACHE
60
DIR_WEB="/var/www/html"				# directory of APACHE
61
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
61
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
62
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
62
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
63
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
63
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
64
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
64
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
65
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
65
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
66
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
66
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
67
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
67
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
68
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
68
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
69
# ******* DBMS parameters - paramètres SGBD ********
69
# ******* DBMS parameters - paramètres SGBD ********
70
DB_RADIUS="radius"				# database name used by FreeRadius server
70
DB_RADIUS="radius"				# database name used by FreeRadius server
71
DB_USER="radius"				# user name allows to request the users database
71
DB_USER="radius"				# user name allows to request the users database
72
DB_GAMMU="gammu"				# database name used by Gammu-smsd
72
DB_GAMMU="gammu"				# database name used by Gammu-smsd
73
# ******* Network parameters - paramètres réseau *******
73
# ******* Network parameters - paramètres réseau *******
74
HOSTNAME="alcasar"				# default hostname
74
HOSTNAME="alcasar"				# default hostname
75
DOMAIN="localdomain"				# default local domain
75
DOMAIN="localdomain"				# default local domain
76
EXTIF=`/sbin/ip route|grep default|head -n1|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
76
EXTIF=`/sbin/ip route|grep default|head -n1|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
77
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
77
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
78
MTU="1500"
78
MTU="1500"
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
80
# ****** Paths - chemin des commandes *******
80
# ****** Paths - chemin des commandes *******
81
SED="/bin/sed -i"
81
SED="/bin/sed -i"
82
# ****************** End of global parameters *********************
82
# ****************** End of global parameters *********************
83
 
83
 
84
license ()
84
license ()
85
{
85
{
86
	if [ $Lang == "fr" ]
86
	if [ $Lang == "fr" ]
87
	then
87
	then
88
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
88
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
89
	else
89
	else
90
		cat $DIR_INSTALL/gpl-warning.txt | more
90
		cat $DIR_INSTALL/gpl-warning.txt | more
91
	fi
91
	fi
92
	response=0
92
	response=0
93
	PTN='^[oOyYnN]$'
93
	PTN='^[oOyYnN]$'
94
	until [[ $(expr $response : $PTN) -gt 0 ]]
94
	until [[ $(expr $response : $PTN) -gt 0 ]]
95
	do
95
	do
96
		if [ $Lang == "fr" ]
96
		if [ $Lang == "fr" ]
97
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
97
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
98
			else echo -n "Do you accept the terms of this license (Y/n)? : "
98
			else echo -n "Do you accept the terms of this license (Y/n)? : "
99
		fi
99
		fi
100
		read response
100
		read response
101
	done
101
	done
102
	if [ "$response" = "n" ] || [ "$response" = "N" ]
102
	if [ "$response" = "n" ] || [ "$response" = "N" ]
103
	then
103
	then
104
		exit 1
104
		exit 1
105
	fi
105
	fi
106
}
106
}
107
 
107
 
108
header_install ()
108
header_install ()
109
{
109
{
110
	clear
110
	clear
111
	echo "-----------------------------------------------------------------------------"
111
	echo "-----------------------------------------------------------------------------"
112
	echo "                     ALCASAR V$VERSION Installation"
112
	echo "                     ALCASAR V$VERSION Installation"
113
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
113
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
114
	echo "-----------------------------------------------------------------------------"
114
	echo "-----------------------------------------------------------------------------"
115
}
115
}
116
 
116
 
117
##################################################################
117
##################################################################
118
##			Function "testing"			##
118
##			Function "testing"			##
119
## - Test of Mageia version					##
119
## - Test of Mageia version					##
120
## - Test of ALCASAR version (if already installed)		##
120
## - Test of ALCASAR version (if already installed)		##
121
## - Test of free space on /var  (>10G)				##
121
## - Test of free space on /var  (>10G)				##
122
## - Test of Internet access					##
122
## - Test of Internet access					##
123
##################################################################
123
##################################################################
124
testing ()
124
testing ()
125
{
125
{
126
# Test of Mageia version
126
# Test of Mageia version
127
# extract the current Mageia version and hardware architecture (i586 ou X64)
127
# extract the current Mageia version and hardware architecture (i586 ou X64)
128
	fic=`cat /etc/product.id`
128
	fic=`cat /etc/product.id`
129
	unknown_os=0
129
	unknown_os=0
130
	old="$IFS"
130
	old="$IFS"
131
	IFS=","
131
	IFS=","
132
	set $fic
132
	set $fic
133
	for i in $*
133
	for i in $*
134
	do
134
	do
135
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
135
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
136
			then 
136
			then 
137
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
137
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
138
			unknown_os=`expr $unknown_os + 1`
138
			unknown_os=`expr $unknown_os + 1`
139
		fi
139
		fi
140
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
140
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
141
			then 
141
			then 
142
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
142
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
143
			unknown_os=`expr $unknown_os + 1`
143
			unknown_os=`expr $unknown_os + 1`
144
		fi
144
		fi
145
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
145
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
146
			then 
146
			then 
147
			ARCH=`echo $i|cut -d"=" -f2`
147
			ARCH=`echo $i|cut -d"=" -f2`
148
			unknown_os=`expr $unknown_os + 1`
148
			unknown_os=`expr $unknown_os + 1`
149
		fi
149
		fi
150
	done
150
	done
151
	IFS="$old"
151
	IFS="$old"
152
# Test if ALCASAR is already installed
152
# Test if ALCASAR is already installed
153
	if [ -e $CONF_FILE ]
153
	if [ -e $CONF_FILE ]
154
	then
154
	then
155
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
155
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
156
		if [ $Lang == "fr" ]
156
		if [ $Lang == "fr" ]
157
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
157
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
158
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
158
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
159
		fi
159
		fi
160
		response=0
160
		response=0
161
		PTN='^[oOnNyY]$'
161
		PTN='^[oOnNyY]$'
162
		until [[ $(expr $response : $PTN) -gt 0 ]]
162
		until [[ $(expr $response : $PTN) -gt 0 ]]
163
		do
163
		do
164
			if [ $Lang == "fr" ]
164
			if [ $Lang == "fr" ]
165
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
165
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
166
				else echo -n "Do you want to update (Y/n)?";
166
				else echo -n "Do you want to update (Y/n)?";
167
			 fi
167
			 fi
168
			read response
168
			read response
169
		done
169
		done
170
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
170
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
171
		then
171
		then
172
			rm -f /tmp/alcasar-conf*
172
			rm -f /tmp/alcasar-conf*
173
		else
173
		else
174
# Retrieve former NICname
174
# Retrieve former NICname
175
			EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`				# EXTernal InterFace
175
			EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`				# EXTernal InterFace
176
			INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`				# INTernal InterFace
176
			INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`				# INTernal InterFace
177
# Create the current conf file
177
# Create the current conf file
178
			$DIR_SCRIPTS/alcasar-conf.sh --create
178
			$DIR_SCRIPTS/alcasar-conf.sh --create
179
			mode="update"
179
			mode="update"
180
		fi
180
		fi
181
	fi
181
	fi
182
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
182
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
183
		then
183
		then
184
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
184
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
185
			then
185
			then
186
			echo
186
			echo
187
			if [ $Lang == "fr" ]
187
			if [ $Lang == "fr" ]
188
				then	
188
				then	
189
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
189
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
190
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
190
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
191
				echo "2 - Installez Linux-Mageia 4.1 (cf. doc d'installation)"
191
				echo "2 - Installez Linux-Mageia 4.1 (cf. doc d'installation)"
192
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
192
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
193
			else
193
			else
194
				echo "The automatic update of ALCASAR can't be performed."
194
				echo "The automatic update of ALCASAR can't be performed."
195
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
195
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
196
				echo "2 - Install Linux-Mageia 4.1 (cf. installation doc)"
196
				echo "2 - Install Linux-Mageia 4.1 (cf. installation doc)"
197
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
197
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
198
			fi
198
			fi
199
		else
199
		else
200
			if [ $Lang == "fr" ]
200
			if [ $Lang == "fr" ]
201
				then	
201
				then	
202
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
202
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
203
			else
203
			else
204
				echo "The installation of ALCASAR can't be performed."
204
				echo "The installation of ALCASAR can't be performed."
205
			fi
205
			fi
206
		fi
206
		fi
207
		echo
207
		echo
208
		if [ $Lang == "fr" ]
208
		if [ $Lang == "fr" ]
209
			then	
209
			then	
210
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
210
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
211
		else
211
		else
212
			echo "The OS must be replaced (Mageia4.1)"
212
			echo "The OS must be replaced (Mageia4.1)"
213
		fi
213
		fi
214
		exit 0
214
		exit 0
215
	fi
215
	fi
216
	if [ ! -d /var/log/netflow/porttracker ]
216
	if [ ! -d /var/log/netflow/porttracker ]
217
		then
217
		then
218
# Test of free space on /var
218
# Test of free space on /var
219
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
219
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
220
		if [ $free_space -lt 10 ]
220
		if [ $free_space -lt 10 ]
221
			then
221
			then
222
			if [ $Lang == "fr" ]
222
			if [ $Lang == "fr" ]
223
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
223
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
224
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
224
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
225
			fi
225
			fi
226
		exit 0
226
		exit 0
227
		fi
227
		fi
228
	fi
228
	fi
229
	if [ $Lang == "fr" ]
229
	if [ $Lang == "fr" ]
230
		then echo -n "Tests des paramètres réseau : "
230
		then echo -n "Tests des paramètres réseau : "
231
		else echo -n "Network parameters tests : "
231
		else echo -n "Network parameters tests : "
232
	fi
232
	fi
233
# Test of Ethernet links state
233
# Test of Ethernet links state
234
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
234
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
235
	for i in $DOWN_IF
235
	for i in $DOWN_IF
236
	do
236
	do
237
		if [ $Lang == "fr" ]
237
		if [ $Lang == "fr" ]
238
		then 
238
		then 
239
			echo "Échec"
239
			echo "Échec"
240
			echo "Le lien réseau de la carte $i n'est pas actif."
240
			echo "Le lien réseau de la carte $i n'est pas actif."
241
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
241
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
242
		else
242
		else
243
			echo "Failed"
243
			echo "Failed"
244
			echo "The link state of $i interface is down."
244
			echo "The link state of $i interface is down."
245
			echo "Make sure that this network card is connected to a switch or an A.P."
245
			echo "Make sure that this network card is connected to a switch or an A.P."
246
		fi
246
		fi
247
		exit 0
247
		exit 0
248
	done
248
	done
249
	echo -n "."
249
	echo -n "."
250
 
250
 
251
# Test EXTIF config files
251
# Test EXTIF config files
252
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
252
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
253
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
253
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
254
	PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
254
	PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
255
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
255
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
256
	then
256
	then
257
		if [ $Lang == "fr" ]
257
		if [ $Lang == "fr" ]
258
		then 
258
		then 
259
			echo "Échec"
259
			echo "Échec"
260
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
260
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
261
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
261
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
262
			echo "Appliquez les changements : 'systemctl restart network'"
262
			echo "Appliquez les changements : 'systemctl restart network'"
263
		else
263
		else
264
			echo "Failed"
264
			echo "Failed"
265
			echo "The Internet connected network card ($EXTIF) isn't well configured."
265
			echo "The Internet connected network card ($EXTIF) isn't well configured."
266
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
266
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
267
			echo "Apply the new configuration 'systemctl restart network'"
267
			echo "Apply the new configuration 'systemctl restart network'"
268
		fi
268
		fi
269
		echo "DEVICE=$EXTIF"
269
		echo "DEVICE=$EXTIF"
270
		echo "IPADDR="
270
		echo "IPADDR="
271
		echo "NETMASK="
271
		echo "NETMASK="
272
		echo "GATEWAY="
272
		echo "GATEWAY="
273
		echo "DNS1="
273
		echo "DNS1="
274
		echo "DNS2="
274
		echo "DNS2="
275
		echo "ONBOOT=yes"
275
		echo "ONBOOT=yes"
276
		exit 0
276
		exit 0
277
	fi
277
	fi
278
	echo -n "."
278
	echo -n "."
279
 
279
 
280
# Test if router is alive (Box FAI)
280
# Test if router is alive (Box FAI)
281
	if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
281
	if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
282
		if [ $Lang == "fr" ]
282
		if [ $Lang == "fr" ]
283
		then 
283
		then 
284
			echo "Échec"
284
			echo "Échec"
285
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
285
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
286
			echo "Réglez ce problème puis relancez ce script."
286
			echo "Réglez ce problème puis relancez ce script."
287
		else
287
		else
288
			echo "Failed"
288
			echo "Failed"
289
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
289
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
290
			echo "Resolv this problem, then restart this script."
290
			echo "Resolv this problem, then restart this script."
291
		fi
291
		fi
292
		exit 0
292
		exit 0
293
	fi
293
	fi
294
	echo -n "."
294
	echo -n "."
295
# On teste le lien vers le routeur par defaut
295
# On teste le lien vers le routeur par defaut
296
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
296
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
297
	if [ $(expr $arp_reply) -eq 0 ]
297
	if [ $(expr $arp_reply) -eq 0 ]
298
	       	then
298
	       	then
299
		if [ $Lang == "fr" ]
299
		if [ $Lang == "fr" ]
300
		then 
300
		then 
301
			echo "Échec"
301
			echo "Échec"
302
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
302
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
303
			echo "Réglez ce problème puis relancez ce script."
303
			echo "Réglez ce problème puis relancez ce script."
304
		else
304
		else
305
			echo "Failed"
305
			echo "Failed"
306
			echo "The Internet gateway doesn't answered"
306
			echo "The Internet gateway doesn't answered"
307
			echo "Resolv this problem, then restart this script."
307
			echo "Resolv this problem, then restart this script."
308
		fi
308
		fi
309
		exit 0
309
		exit 0
310
	fi
310
	fi
311
	echo -n "."
311
	echo -n "."
312
# On teste la connectivité Internet
312
# On teste la connectivité Internet
313
	rm -rf /tmp/con_ok.html
313
	rm -rf /tmp/con_ok.html
314
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
314
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
315
	if [ ! -e /tmp/con_ok.html ]
315
	if [ ! -e /tmp/con_ok.html ]
316
	then
316
	then
317
		if [ $Lang == "fr" ]
317
		if [ $Lang == "fr" ]
318
		then 
318
		then 
319
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
319
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
320
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
320
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
321
			echo "Vérifiez la validité des adresses IP des DNS."
321
			echo "Vérifiez la validité des adresses IP des DNS."
322
		else
322
		else
323
			echo "The Internet connection try failed (google.fr)."
323
			echo "The Internet connection try failed (google.fr)."
324
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
324
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
325
			echo "Verify the DNS IP addresses"
325
			echo "Verify the DNS IP addresses"
326
		fi
326
		fi
327
		exit 0
327
		exit 0
328
	fi
328
	fi
329
	rm -rf /tmp/con_ok.html
329
	rm -rf /tmp/con_ok.html
330
	echo ". : ok"
330
	echo ". : ok"
331
} # end of testing ()
331
} # end of testing ()
332
 
332
 
333
##################################################################
333
##################################################################
334
##			Function "init"				##
334
##			Function "init"				##
335
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
335
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
336
## - Installation et modification des scripts du portail	##
336
## - Installation et modification des scripts du portail	##
337
##################################################################
337
##################################################################
338
init ()
338
init ()
339
{
339
{
340
	if [ "$mode" != "update" ]
340
	if [ "$mode" != "update" ]
341
	then
341
	then
342
# On affecte le nom d'organisme
342
# On affecte le nom d'organisme
343
		header_install
343
		header_install
344
		ORGANISME=!
344
		ORGANISME=!
345
		PTN='^[a-zA-Z0-9-]*$'
345
		PTN='^[a-zA-Z0-9-]*$'
346
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
346
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
347
                do
347
                do
348
			if [ $Lang == "fr" ]
348
			if [ $Lang == "fr" ]
349
			       	then echo -n "Entrez le nom de votre organisme : "
349
			       	then echo -n "Entrez le nom de votre organisme : "
350
				else echo -n "Enter the name of your organism : "
350
				else echo -n "Enter the name of your organism : "
351
			fi
351
			fi
352
			read ORGANISME
352
			read ORGANISME
353
			if [ "$ORGANISME" == "" ]
353
			if [ "$ORGANISME" == "" ]
354
				then
354
				then
355
				ORGANISME=!
355
				ORGANISME=!
356
			fi
356
			fi
357
		done
357
		done
358
	fi
358
	fi
359
# On crée aléatoirement les mots de passe et les secrets partagés
359
# On crée aléatoirement les mots de passe et les secrets partagés
360
	rm -f $PASSWD_FILE
360
	rm -f $PASSWD_FILE
361
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
361
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
362
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
362
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
363
	echo "$grubpwd" >> $PASSWD_FILE
363
	echo "$grubpwd" >> $PASSWD_FILE
364
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
364
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
365
	$SED "/^password.*/d" /boot/grub/menu.lst
365
	$SED "/^password.*/d" /boot/grub/menu.lst
366
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
366
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
367
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
367
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
368
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
368
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
369
	echo "root / $mysqlpwd" >> $PASSWD_FILE
369
	echo "root / $mysqlpwd" >> $PASSWD_FILE
370
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
370
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
371
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
371
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
372
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
372
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
373
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
373
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
374
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
374
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
375
	echo "$secretuam" >> $PASSWD_FILE
375
	echo "$secretuam" >> $PASSWD_FILE
376
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
376
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
377
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
377
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
378
	echo "$secretradius" >> $PASSWD_FILE
378
	echo "$secretradius" >> $PASSWD_FILE
379
	chmod 640 $PASSWD_FILE
379
	chmod 640 $PASSWD_FILE
380
# Scripts and conf files copy 
380
# Scripts and conf files copy 
381
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
381
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
382
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
382
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
383
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
383
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
384
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
384
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
385
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
385
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
386
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
386
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
387
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
387
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
388
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
388
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
389
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
389
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
390
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
390
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
391
# generate central conf file
391
# generate central conf file
392
	cat <<EOF > $CONF_FILE
392
	cat <<EOF > $CONF_FILE
393
##########################################
393
##########################################
394
##                                      ##
394
##                                      ##
395
##          ALCASAR Parameters          ##
395
##          ALCASAR Parameters          ##
396
##                                      ##
396
##                                      ##
397
##########################################
397
##########################################
398
 
398
 
399
INSTALL_DATE=$DATE
399
INSTALL_DATE=$DATE
400
VERSION=$VERSION
400
VERSION=$VERSION
401
ORGANISM=$ORGANISME
401
ORGANISM=$ORGANISME
402
DOMAIN=$DOMAIN
402
DOMAIN=$DOMAIN
403
EOF
403
EOF
404
	chmod o-rwx $CONF_FILE
404
	chmod o-rwx $CONF_FILE
405
} # End of init ()
405
} # End of init ()
406
 
406
 
407
##################################################################
407
##################################################################
408
##			Function "network"			##
408
##			Function "network"			##
409
## - Définition du plan d'adressage du réseau de consultation	##
409
## - Définition du plan d'adressage du réseau de consultation	##
410
## - Nommage DNS du système 					##
410
## - Nommage DNS du système 					##
411
## - Configuration de l'interface INTIF (réseau de consultation)##
411
## - Configuration de l'interface INTIF (réseau de consultation)##
412
## - Modification du fichier /etc/hosts				##
412
## - Modification du fichier /etc/hosts				##
413
## - Configuration du serveur de temps (NTP)			##
413
## - Configuration du serveur de temps (NTP)			##
414
## - Renseignement des fichiers hosts.allow et hosts.deny	##
414
## - Renseignement des fichiers hosts.allow et hosts.deny	##
415
##################################################################
415
##################################################################
416
network ()
416
network ()
417
{
417
{
418
	header_install
418
	header_install
419
	if [ "$mode" != "update" ]
419
	if [ "$mode" != "update" ]
420
		then
420
		then
421
		if [ $Lang == "fr" ]
421
		if [ $Lang == "fr" ]
422
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
422
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
423
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
423
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
424
		fi
424
		fi
425
		response=0
425
		response=0
426
		PTN='^[oOyYnN]$'
426
		PTN='^[oOyYnN]$'
427
		until [[ $(expr $response : $PTN) -gt 0 ]]
427
		until [[ $(expr $response : $PTN) -gt 0 ]]
428
		do
428
		do
429
			if [ $Lang == "fr" ]
429
			if [ $Lang == "fr" ]
430
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
430
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
431
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
431
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
432
			fi
432
			fi
433
			read response
433
			read response
434
		done
434
		done
435
		if [ "$response" = "n" ] || [ "$response" = "N" ]
435
		if [ "$response" = "n" ] || [ "$response" = "N" ]
436
		then
436
		then
437
			PRIVATE_IP_MASK="0"
437
			PRIVATE_IP_MASK="0"
438
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
438
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
439
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
439
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
440
			do
440
			do
441
				if [ $Lang == "fr" ]
441
				if [ $Lang == "fr" ]
442
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
442
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
443
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
443
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
444
				fi
444
				fi
445
				read PRIVATE_IP_MASK
445
				read PRIVATE_IP_MASK
446
			done
446
			done
447
		else
447
		else
448
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
448
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
449
		fi
449
		fi
450
	else
450
	else
451
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
451
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
452
		rm -rf conf/etc/alcasar.conf
452
		rm -rf conf/etc/alcasar.conf
453
	fi
453
	fi
454
# Define LAN side global parameters
454
# Define LAN side global parameters
455
	hostname $HOSTNAME.$DOMAIN
455
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
456
	echo $HOSTNAME.$DOMAIN > /etc/hostname
-
 
457
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
456
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
458
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
457
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
459
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
458
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
460
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
459
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
461
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
460
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
462
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
461
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
463
		then
462
		then
464
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
463
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
465
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
464
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
466
	fi	
465
	fi	
467
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
466
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
468
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
467
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
469
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
468
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
470
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
469
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
471
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
470
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
472
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
471
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
473
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
472
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
474
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
473
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
475
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
474
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
476
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
475
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
477
# Define Internet parameters
476
# Define Internet parameters
478
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
477
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
479
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
478
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
480
	if [ $nb_dns == 2 ]
479
	if [ $nb_dns == 2 ]
481
		then
480
		then
482
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
481
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
483
	fi
482
	fi
484
	DNS1=${DNS1:=208.67.220.220}
483
	DNS1=${DNS1:=208.67.220.220}
485
	DNS2=${DNS2:=208.67.222.222}
484
	DNS2=${DNS2:=208.67.222.222}
486
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
485
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
487
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
486
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
488
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
487
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
489
# Wrtie the conf file
488
# Wrtie the conf file
490
	echo "EXTIF=$EXTIF" >> $CONF_FILE
489
	echo "EXTIF=$EXTIF" >> $CONF_FILE
491
	echo "INTIF=$INTIF" >> $CONF_FILE
490
	echo "INTIF=$INTIF" >> $CONF_FILE
492
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
491
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
493
	if [ $IP_SETTING == "dhcp" ]
492
	if [ $IP_SETTING == "dhcp" ]
494
		then
493
		then
495
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
494
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
496
		echo "GW=dhcp" >> $CONF_FILE
495
		echo "GW=dhcp" >> $CONF_FILE
497
	else
496
	else
498
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
497
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
499
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
498
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
500
	fi
499
	fi
501
	echo "DNS1=$DNS1" >> $CONF_FILE
500
	echo "DNS1=$DNS1" >> $CONF_FILE
502
	echo "DNS2=$DNS2" >> $CONF_FILE
501
	echo "DNS2=$DNS2" >> $CONF_FILE
503
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
502
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
504
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
503
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
505
	echo "DHCP=on" >> $CONF_FILE
504
	echo "DHCP=on" >> $CONF_FILE
506
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
505
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
507
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
506
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
508
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
507
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
509
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
508
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
510
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
509
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
511
	echo "INT_DNS_IP=none" >> $CONF_FILE
510
	echo "INT_DNS_IP=none" >> $CONF_FILE
512
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
511
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
513
# network default
512
# network default
514
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
513
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
515
	cat <<EOF > /etc/sysconfig/network
514
	cat <<EOF > /etc/sysconfig/network
516
NETWORKING=yes
515
NETWORKING=yes
517
HOSTNAME="$HOSTNAME.$DOMAIN"
-
 
518
FORWARD_IPV4=true
516
FORWARD_IPV4=true
519
EOF
517
EOF
520
# /etc/hosts config
518
# /etc/hosts config
521
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
519
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
522
	cat <<EOF > /etc/hosts
520
	cat <<EOF > /etc/hosts
523
127.0.0.1	localhost
521
127.0.0.1	localhost
524
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME
522
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME
525
EOF
523
EOF
526
# EXTIF (Internet) config
524
# EXTIF (Internet) config
527
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
525
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
528
	if [ $IP_SETTING == "dhcp" ]
526
	if [ $IP_SETTING == "dhcp" ]
529
		then
527
		then
530
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
528
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
531
DEVICE=$EXTIF
529
DEVICE=$EXTIF
532
BOOTPROTO=dhcp
530
BOOTPROTO=dhcp
533
DNS1=127.0.0.1
531
DNS1=127.0.0.1
534
PEERDNS=no
532
PEERDNS=no
535
RESOLV_MODS=yes
533
RESOLV_MODS=yes
536
ONBOOT=yes
534
ONBOOT=yes
537
NOZEROCONF=yes
535
NOZEROCONF=yes
538
METRIC=10
536
METRIC=10
539
MII_NOT_SUPPORTED=yes
537
MII_NOT_SUPPORTED=yes
540
IPV6INIT=no
538
IPV6INIT=no
541
IPV6TO4INIT=no
539
IPV6TO4INIT=no
542
ACCOUNTING=no
540
ACCOUNTING=no
543
USERCTL=no
541
USERCTL=no
544
MTU=$MTU
542
MTU=$MTU
545
EOF
543
EOF
546
		else	
544
		else	
547
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
545
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
548
DEVICE=$EXTIF
546
DEVICE=$EXTIF
549
BOOTPROTO=static
547
BOOTPROTO=static
550
IPADDR=$PUBLIC_IP
548
IPADDR=$PUBLIC_IP
551
NETMASK=$PUBLIC_NETMASK
549
NETMASK=$PUBLIC_NETMASK
552
GATEWAY=$PUBLIC_GATEWAY
550
GATEWAY=$PUBLIC_GATEWAY
553
DNS1=127.0.0.1
551
DNS1=127.0.0.1
554
RESOLV_MODS=yes
552
RESOLV_MODS=yes
555
ONBOOT=yes
553
ONBOOT=yes
556
METRIC=10
554
METRIC=10
557
NOZEROCONF=yes
555
NOZEROCONF=yes
558
MII_NOT_SUPPORTED=yes
556
MII_NOT_SUPPORTED=yes
559
IPV6INIT=no
557
IPV6INIT=no
560
IPV6TO4INIT=no
558
IPV6TO4INIT=no
561
ACCOUNTING=no
559
ACCOUNTING=no
562
USERCTL=no
560
USERCTL=no
563
MTU=$MTU
561
MTU=$MTU
564
EOF
562
EOF
565
	fi
563
	fi
566
# Config INTIF (consultation LAN) in normal mode
564
# Config INTIF (consultation LAN) in normal mode
567
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
565
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
568
DEVICE=$INTIF
566
DEVICE=$INTIF
569
BOOTPROTO=static
567
BOOTPROTO=static
570
ONBOOT=yes
568
ONBOOT=yes
571
NOZEROCONF=yes
569
NOZEROCONF=yes
572
MII_NOT_SUPPORTED=yes
570
MII_NOT_SUPPORTED=yes
573
IPV6INIT=no
571
IPV6INIT=no
574
IPV6TO4INIT=no
572
IPV6TO4INIT=no
575
ACCOUNTING=no
573
ACCOUNTING=no
576
USERCTL=no
574
USERCTL=no
577
EOF
575
EOF
578
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
576
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
579
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
577
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
580
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
578
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
581
DEVICE=$INTIF
579
DEVICE=$INTIF
582
BOOTPROTO=static
580
BOOTPROTO=static
583
IPADDR=$PRIVATE_IP
581
IPADDR=$PRIVATE_IP
584
NETMASK=$PRIVATE_NETMASK
582
NETMASK=$PRIVATE_NETMASK
585
ONBOOT=yes
583
ONBOOT=yes
586
METRIC=10
584
METRIC=10
587
NOZEROCONF=yes
585
NOZEROCONF=yes
588
MII_NOT_SUPPORTED=yes
586
MII_NOT_SUPPORTED=yes
589
IPV6INIT=no
587
IPV6INIT=no
590
IPV6TO4INIT=no
588
IPV6TO4INIT=no
591
ACCOUNTING=no
589
ACCOUNTING=no
592
USERCTL=no
590
USERCTL=no
593
EOF
591
EOF
594
# Mise à l'heure du serveur
592
# Mise à l'heure du serveur
595
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
593
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
596
	cat <<EOF > /etc/ntp/step-tickers
594
	cat <<EOF > /etc/ntp/step-tickers
597
0.fr.pool.ntp.org	# adapt to your country
595
0.fr.pool.ntp.org	# adapt to your country
598
1.fr.pool.ntp.org
596
1.fr.pool.ntp.org
599
2.fr.pool.ntp.org
597
2.fr.pool.ntp.org
600
EOF
598
EOF
601
# Configuration du serveur de temps (sur lui même)
599
# Configuration du serveur de temps (sur lui même)
602
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
600
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
603
	cat <<EOF > /etc/ntp.conf
601
	cat <<EOF > /etc/ntp.conf
604
server 0.fr.pool.ntp.org	# adapt to your country
602
server 0.fr.pool.ntp.org	# adapt to your country
605
server 1.fr.pool.ntp.org
603
server 1.fr.pool.ntp.org
606
server 2.fr.pool.ntp.org
604
server 2.fr.pool.ntp.org
607
server 127.127.1.0   		# local clock si NTP internet indisponible ...
605
server 127.127.1.0   		# local clock si NTP internet indisponible ...
608
fudge 127.127.1.0 stratum 10
606
fudge 127.127.1.0 stratum 10
609
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
607
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
610
restrict 127.0.0.1
608
restrict 127.0.0.1
611
driftfile /var/lib/ntp/drift
609
driftfile /var/lib/ntp/drift
612
logfile /var/log/ntp.log
610
logfile /var/log/ntp.log
613
disable monitor
611
disable monitor
614
EOF
612
EOF
615
 
613
 
616
	chown -R ntp:ntp /var/lib/ntp
614
	chown -R ntp:ntp /var/lib/ntp
617
# Renseignement des fichiers hosts.allow et hosts.deny
615
# Renseignement des fichiers hosts.allow et hosts.deny
618
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
616
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
619
	cat <<EOF > /etc/hosts.allow
617
	cat <<EOF > /etc/hosts.allow
620
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
618
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
621
sshd: ALL
619
sshd: ALL
622
ntpd: $PRIVATE_NETWORK_SHORT
620
ntpd: $PRIVATE_NETWORK_SHORT
623
EOF
621
EOF
624
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
622
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
625
	cat <<EOF > /etc/hosts.deny
623
	cat <<EOF > /etc/hosts.deny
626
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
624
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
627
EOF
625
EOF
628
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
626
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
629
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
627
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
630
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
628
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
631
# load conntrack ftp module
629
# load conntrack ftp module
632
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
630
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
633
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
631
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
634
# load ipt_NETFLOW module
632
# load ipt_NETFLOW module
635
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
633
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
636
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
634
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
637
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
635
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
638
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
636
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
639
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
637
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
640
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
638
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
641
# 
639
# 
642
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
640
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
643
} # End of network ()
641
} # End of network ()
644
 
642
 
645
##################################################################
643
##################################################################
646
##			Function "ACC"				##
644
##			Function "ACC"				##
647
## - installation du centre de gestion (ALCASAR Control Center)	##
645
## - installation du centre de gestion (ALCASAR Control Center)	##
648
## - configuration du serveur web (Apache)			##
646
## - configuration du serveur web (Apache)			##
649
## - définition du 1er comptes de gestion 			##
647
## - définition du 1er comptes de gestion 			##
650
## - sécurisation des accès					##
648
## - sécurisation des accès					##
651
##################################################################
649
##################################################################
652
ACC ()
650
ACC ()
653
{
651
{
654
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
652
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
655
	mkdir $DIR_WEB
653
	mkdir $DIR_WEB
656
# Copie et configuration des fichiers du centre de gestion
654
# Copie et configuration des fichiers du centre de gestion
657
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
655
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
658
	echo "$VERSION" > $DIR_WEB/VERSION
656
	echo "$VERSION" > $DIR_WEB/VERSION
659
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
657
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
660
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
658
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
661
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
659
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
662
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
660
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
663
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
661
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
664
	chown -R apache:apache $DIR_WEB/*
662
	chown -R apache:apache $DIR_WEB/*
665
# create the backup structure :
663
# create the backup structure :
666
# - base = users database
664
# - base = users database
667
# - archive = tarball of "base + http firewall + netflow"
665
# - archive = tarball of "base + http firewall + netflow"
668
# - security = watchdog disconnection)
666
# - security = watchdog disconnection)
669
	for i in base archive security;
667
	for i in base archive security;
670
	do
668
	do
671
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
669
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
672
	done
670
	done
673
	chown -R root:apache $DIR_SAVE
671
	chown -R root:apache $DIR_SAVE
674
# Configuration et sécurisation php
672
# Configuration et sécurisation php
675
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
673
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
676
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
674
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
677
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
675
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
678
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
676
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
679
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
677
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
680
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
678
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
681
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
679
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
682
# Configuration et sécurisation Apache
680
# Configuration et sécurisation Apache
683
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
681
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
684
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
682
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
685
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
683
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
686
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
684
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
687
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
685
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
688
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
686
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
689
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
687
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
690
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
688
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
691
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
689
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
692
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
690
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
693
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
691
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
694
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
692
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
695
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
693
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
696
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
694
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
697
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
695
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
698
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
696
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
699
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
697
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
700
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
698
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
701
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
699
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
702
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
700
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
703
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
701
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
704
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
702
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
705
# Error page management
703
# Error page management
706
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
704
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
707
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
705
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
708
Alias /error/ "/var/www/html/"
706
Alias /error/ "/var/www/html/"
709
<Directory "/usr/share/httpd/error">
707
<Directory "/usr/share/httpd/error">
710
    AllowOverride None
708
    AllowOverride None
711
    Options IncludesNoExec
709
    Options IncludesNoExec
712
    AddOutputFilter Includes html
710
    AddOutputFilter Includes html
713
    AddHandler type-map var
711
    AddHandler type-map var
714
    Require all granted
712
    Require all granted
715
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
713
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
716
    ForceLanguagePriority Prefer Fallback
714
    ForceLanguagePriority Prefer Fallback
717
</Directory>
715
</Directory>
718
ErrorDocument 400 /error/error.php?error=400
716
ErrorDocument 400 /error/error.php?error=400
719
ErrorDocument 401 /error/error.php?error=401
717
ErrorDocument 401 /error/error.php?error=401
720
ErrorDocument 403 /error/error.php?error=403
718
ErrorDocument 403 /error/error.php?error=403
721
ErrorDocument 404 /error/error.php?error=404
719
ErrorDocument 404 /error/error.php?error=404
722
ErrorDocument 405 /error/error.php?error=405
720
ErrorDocument 405 /error/error.php?error=405
723
ErrorDocument 408 /error/error.php?error=408
721
ErrorDocument 408 /error/error.php?error=408
724
ErrorDocument 410 /error/error.php?error=410
722
ErrorDocument 410 /error/error.php?error=410
725
ErrorDocument 411 /error/error.php?error=411
723
ErrorDocument 411 /error/error.php?error=411
726
ErrorDocument 412 /error/error.php?error=412
724
ErrorDocument 412 /error/error.php?error=412
727
ErrorDocument 413 /error/error.php?error=413
725
ErrorDocument 413 /error/error.php?error=413
728
ErrorDocument 414 /error/error.php?error=414
726
ErrorDocument 414 /error/error.php?error=414
729
ErrorDocument 415 /error/error.php?error=415
727
ErrorDocument 415 /error/error.php?error=415
730
ErrorDocument 500 /error/error.php?error=500
728
ErrorDocument 500 /error/error.php?error=500
731
ErrorDocument 501 /error/error.php?error=501
729
ErrorDocument 501 /error/error.php?error=501
732
ErrorDocument 502 /error/error.php?error=502
730
ErrorDocument 502 /error/error.php?error=502
733
ErrorDocument 503 /error/error.php?error=503
731
ErrorDocument 503 /error/error.php?error=503
734
ErrorDocument 506 /error/error.php?error=506
732
ErrorDocument 506 /error/error.php?error=506
735
EOF
733
EOF
736
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
734
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
737
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
735
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
738
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
736
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
739
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
737
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
740
</body>
738
</body>
741
</html>
739
</html>
742
EOF
740
EOF
743
# Définition du premier compte lié au profil 'admin'
741
# Définition du premier compte lié au profil 'admin'
744
	if [ "$mode" = "install" ]
742
	if [ "$mode" = "install" ]
745
	then
743
	then
746
		header_install
744
		header_install
747
		admin_portal=!
745
		admin_portal=!
748
		PTN='^[a-zA-Z0-9-]*$'
746
		PTN='^[a-zA-Z0-9-]*$'
749
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
747
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
750
                	do
748
                	do
751
			header_install
749
			header_install
752
			if [ $Lang == "fr" ]
750
			if [ $Lang == "fr" ]
753
			then 
751
			then 
754
				echo ""
752
				echo ""
755
				echo "Définissez un premier compte d'administration du portail :"
753
				echo "Définissez un premier compte d'administration du portail :"
756
				echo
754
				echo
757
				echo -n "Nom : "
755
				echo -n "Nom : "
758
			else
756
			else
759
				echo ""
757
				echo ""
760
				echo "Define the first account allow to administrate the portal :"
758
				echo "Define the first account allow to administrate the portal :"
761
				echo
759
				echo
762
				echo -n "Account : "
760
				echo -n "Account : "
763
			fi
761
			fi
764
			read admin_portal
762
			read admin_portal
765
			if [ "$admin_portal" == "" ]
763
			if [ "$admin_portal" == "" ]
766
				then
764
				then
767
				admin_portal=!
765
				admin_portal=!
768
			fi
766
			fi
769
			done
767
			done
770
# Creation of keys file for the admin account ("admin")
768
# Creation of keys file for the admin account ("admin")
771
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
769
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
772
		mkdir -p $DIR_DEST_ETC/digest
770
		mkdir -p $DIR_DEST_ETC/digest
773
		chmod 755 $DIR_DEST_ETC/digest
771
		chmod 755 $DIR_DEST_ETC/digest
774
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
772
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
775
			do
773
			do
776
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
774
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
777
			done
775
			done
778
		$DIR_DEST_SBIN/alcasar-profil.sh --list
776
		$DIR_DEST_SBIN/alcasar-profil.sh --list
779
	fi
777
	fi
780
# synchronisation horaire
778
# synchronisation horaire
781
	ntpd -q -g &
779
	ntpd -q -g &
782
# Sécurisation du centre
780
# Sécurisation du centre
783
	rm -f /etc/httpd/conf/webapps.d/alcasar*
781
	rm -f /etc/httpd/conf/webapps.d/alcasar*
784
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
782
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
785
<Directory $DIR_ACC>
783
<Directory $DIR_ACC>
786
	SSLRequireSSL
784
	SSLRequireSSL
787
	AllowOverride None
785
	AllowOverride None
788
	Order deny,allow
786
	Order deny,allow
789
	Deny from all
787
	Deny from all
790
	Allow from 127.0.0.1
788
	Allow from 127.0.0.1
791
	Allow from $PRIVATE_NETWORK_MASK
789
	Allow from $PRIVATE_NETWORK_MASK
792
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
-
 
793
	require valid-user
790
	require valid-user
794
	AuthType digest
791
	AuthType digest
795
	AuthName $HOSTNAME.$DOMAIN
792
	AuthName $HOSTNAME.$DOMAIN
796
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
793
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
797
	AuthUserFile $DIR_DEST_ETC/digest/key_all
794
	AuthUserFile $DIR_DEST_ETC/digest/key_all
798
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
795
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
799
</Directory>
796
</Directory>
800
<Directory $DIR_ACC/admin>
797
<Directory $DIR_ACC/admin>
801
	SSLRequireSSL
798
	SSLRequireSSL
802
	AllowOverride None
799
	AllowOverride None
803
	Order deny,allow
800
	Order deny,allow
804
	Deny from all
801
	Deny from all
805
	Allow from 127.0.0.1
802
	Allow from 127.0.0.1
806
	Allow from $PRIVATE_NETWORK_MASK
803
	Allow from $PRIVATE_NETWORK_MASK
807
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
-
 
808
	require valid-user
804
	require valid-user
809
	AuthType digest
805
	AuthType digest
810
	AuthName $HOSTNAME.$DOMAIN
806
	AuthName $HOSTNAME.$DOMAIN
811
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
807
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
812
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
808
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
813
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
809
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
814
</Directory>
810
</Directory>
815
<Directory $DIR_ACC/manager>
811
<Directory $DIR_ACC/manager>
816
	SSLRequireSSL
812
	SSLRequireSSL
817
	AllowOverride None
813
	AllowOverride None
818
	Order deny,allow
814
	Order deny,allow
819
	Deny from all
815
	Deny from all
820
	Allow from 127.0.0.1
816
	Allow from 127.0.0.1
821
	Allow from $PRIVATE_NETWORK_MASK
817
	Allow from $PRIVATE_NETWORK_MASK
822
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
-
 
823
	require valid-user
818
	require valid-user
824
	AuthType digest
819
	AuthType digest
825
	AuthName $HOSTNAME.$DOMAIN
820
	AuthName $HOSTNAME.$DOMAIN
826
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
821
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
827
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
822
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
828
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
823
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
829
</Directory>
824
</Directory>
830
<Directory $DIR_ACC/backup>
825
<Directory $DIR_ACC/backup>
831
	SSLRequireSSL
826
	SSLRequireSSL
832
	AllowOverride None
827
	AllowOverride None
833
	Order deny,allow
828
	Order deny,allow
834
	Deny from all
829
	Deny from all
835
	Allow from 127.0.0.1
830
	Allow from 127.0.0.1
836
	Allow from $PRIVATE_NETWORK_MASK
831
	Allow from $PRIVATE_NETWORK_MASK
837
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
-
 
838
	require valid-user
832
	require valid-user
839
	AuthType digest
833
	AuthType digest
840
	AuthName $HOSTNAME.$DOMAIN
834
	AuthName $HOSTNAME.$DOMAIN
841
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
835
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
842
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
836
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
843
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
837
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
844
</Directory>
838
</Directory>
845
Alias /save/ "$DIR_SAVE/"
839
Alias /save/ "$DIR_SAVE/"
846
<Directory $DIR_SAVE>
840
<Directory $DIR_SAVE>
847
	SSLRequireSSL
841
	SSLRequireSSL
848
	Options Indexes
842
	Options Indexes
849
	Order deny,allow
843
	Order deny,allow
850
	Deny from all
844
	Deny from all
851
	Allow from 127.0.0.1
845
	Allow from 127.0.0.1
852
	Allow from $PRIVATE_NETWORK_MASK
846
	Allow from $PRIVATE_NETWORK_MASK
853
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
-
 
854
	require valid-user
847
	require valid-user
855
	AuthType digest
848
	AuthType digest
856
	AuthName $HOSTNAME.$DOMAIN
849
	AuthName $HOSTNAME.$DOMAIN
857
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
850
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
858
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
851
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
859
</Directory>
852
</Directory>
860
EOF
853
EOF
861
# Launch after coova
854
# Launch after coova
862
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
855
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
863
} # End of ACC ()
856
} # End of ACC ()
864
 
857
 
865
##########################################################################################
858
##########################################################################################
866
##				Fonction "CA"						##
859
##				Fonction "CA"						##
867
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
860
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
868
##########################################################################################
861
##########################################################################################
869
CA ()
862
CA ()
870
{
863
{
871
	$DIR_DEST_BIN/alcasar-CA.sh
864
	$DIR_DEST_BIN/alcasar-CA.sh
872
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
865
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
873
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
866
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
874
	cat <<EOF > $FIC_VIRTUAL_SSL
867
	cat <<EOF > $FIC_VIRTUAL_SSL
875
# default SSL virtual host, used for all HTTPS requests that do not
868
# default SSL virtual host, used for all HTTPS requests that do not
876
# match a ServerName or ServerAlias in any <VirtualHost> block.
869
# match a ServerName or ServerAlias in any <VirtualHost> block.
877
 
870
 
878
<VirtualHost _default_:443>
871
<VirtualHost _default_:443>
879
# general configuration
872
# general configuration
880
    ServerAdmin root@localhost
873
    ServerAdmin root@localhost
881
    ServerName localhost
874
    ServerName localhost
882
 
875
 
883
# SSL configuration
876
# SSL configuration
884
    SSLEngine on
877
    SSLEngine on
885
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
878
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
886
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
879
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
887
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
880
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
888
    CustomLog logs/ssl_request_log \
881
    CustomLog logs/ssl_request_log \
889
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
882
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
890
    ErrorLog logs/ssl_error_log
883
    ErrorLog logs/ssl_error_log
891
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
884
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
892
</VirtualHost>
885
</VirtualHost>
893
EOF
886
EOF
894
 
887
 
895
	chown -R root:apache /etc/pki
888
	chown -R root:apache /etc/pki
896
	chmod -R 750 /etc/pki
889
	chmod -R 750 /etc/pki
897
} # End of CA ()
890
} # End of CA ()
898
 
891
 
899
##########################################################################################
892
##########################################################################################
900
##			Fonction "init_db"						##
893
##			Fonction "init_db"						##
901
## - Initialisation de la base Mysql							##
894
## - Initialisation de la base Mysql							##
902
## - Affectation du mot de passe de l'administrateur (root)				##
895
## - Affectation du mot de passe de l'administrateur (root)				##
903
## - Suppression des bases et des utilisateurs superflus				##
896
## - Suppression des bases et des utilisateurs superflus				##
904
## - Création de la base 'radius'							##
897
## - Création de la base 'radius'							##
905
## - Installation du schéma de cette base						##
898
## - Installation du schéma de cette base						##
906
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
899
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
907
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
900
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
908
##########################################################################################
901
##########################################################################################
909
init_db ()
902
init_db ()
910
{
903
{
911
	rm -rf /var/lib/mysql # to be sure that there is no former installation
904
	rm -rf /var/lib/mysql # to be sure that there is no former installation
912
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
905
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
913
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
906
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
914
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
907
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
915
	/usr/bin/systemctl start mysqld.service
908
	/usr/bin/systemctl start mysqld.service
916
	sleep 4
909
	sleep 4
917
	mysqladmin -u root password $mysqlpwd
910
	mysqladmin -u root password $mysqlpwd
918
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
911
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
919
# Secure the server
912
# Secure the server
920
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
913
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
921
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
914
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
922
# Create 'radius' database
915
# Create 'radius' database
923
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
916
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
924
# Add an empty radius database structure
917
# Add an empty radius database structure
925
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
918
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
926
# modify the start script in order to close accounting connexion when the system is comming down or up
919
# modify the start script in order to close accounting connexion when the system is comming down or up
927
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
920
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
928
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
921
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
929
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
922
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
930
	/usr/bin/systemctl daemon-reload
923
	/usr/bin/systemctl daemon-reload
931
} # End of init_db ()
924
} # End of init_db ()
932
 
925
 
933
##########################################################################
926
##########################################################################
934
##			Fonction "radius"				##
927
##			Fonction "radius"				##
935
## - Paramètrage des fichiers de configuration FreeRadius		##
928
## - Paramètrage des fichiers de configuration FreeRadius		##
936
## - Affectation du secret partagé entre coova-chilli et freeradius	##
929
## - Affectation du secret partagé entre coova-chilli et freeradius	##
937
## - Modification de fichier de conf pour l'accès à Mysql		##
930
## - Modification de fichier de conf pour l'accès à Mysql		##
938
##########################################################################
931
##########################################################################
939
radius ()
932
radius ()
940
{
933
{
941
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
934
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
942
	chown -R radius:radius /etc/raddb
935
	chown -R radius:radius /etc/raddb
943
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
936
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
944
# Set radius.conf parameters
937
# Set radius.conf parameters
945
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
938
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
946
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
939
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
947
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
940
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
948
# remove the proxy function
941
# remove the proxy function
949
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
942
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
950
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
943
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
951
# remove EAP module
944
# remove EAP module
952
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
945
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
953
# listen on loopback (should be modified later if EAP enabled)
946
# listen on loopback (should be modified later if EAP enabled)
954
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
947
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
955
# enable the  SQL module (and SQL counter)
948
# enable the  SQL module (and SQL counter)
956
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
949
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
957
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
950
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
958
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
951
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
959
# only include modules for ALCASAR needs
952
# only include modules for ALCASAR needs
960
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
953
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
961
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
954
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
962
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
955
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
963
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
956
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
964
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
957
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
965
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
958
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
966
# remvove virtual server and copy our conf file
959
# remvove virtual server and copy our conf file
967
	rm -f /etc/raddb/sites-enabled/*
960
	rm -f /etc/raddb/sites-enabled/*
968
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
961
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
969
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
962
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
970
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
963
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
971
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
964
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
972
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
965
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
973
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
966
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
974
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
967
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
975
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
968
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
976
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
969
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
977
	cat << EOF > /etc/raddb/clients.conf
970
	cat << EOF > /etc/raddb/clients.conf
978
client 127.0.0.1 {
971
client 127.0.0.1 {
979
	secret = $secretradius
972
	secret = $secretradius
980
	shortname = localhost
973
	shortname = localhost
981
}
974
}
982
EOF
975
EOF
983
# sql.conf modification
976
# sql.conf modification
984
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
977
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
985
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
978
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
986
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
979
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
987
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
980
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
988
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
981
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
989
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
982
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
990
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
983
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
991
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
984
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
992
# counter.conf modification (change the Max-All-Session-Time counter)
985
# counter.conf modification (change the Max-All-Session-Time counter)
993
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
986
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
994
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
987
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
995
	chown -R radius:radius /etc/raddb/sql/mysql/*
988
	chown -R radius:radius /etc/raddb/sql/mysql/*
996
# make certain that mysql is up before radius start
989
# make certain that mysql is up before radius start
997
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
990
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
998
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
991
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
999
	/usr/bin/systemctl daemon-reload
992
	/usr/bin/systemctl daemon-reload
1000
} # End radius ()
993
} # End radius ()
1001
 
994
 
1002
##########################################################################
995
##########################################################################
1003
##			Function "radius_web"				##
996
##			Function "radius_web"				##
1004
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
997
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
1005
## - Création du lien vers la page de changement de mot de passe        ##
998
## - Création du lien vers la page de changement de mot de passe        ##
1006
##########################################################################
999
##########################################################################
1007
radius_web ()
1000
radius_web ()
1008
{
1001
{
1009
# copie de l'interface d'origine dans la structure Alcasar
1002
# copie de l'interface d'origine dans la structure Alcasar
1010
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
1003
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
1011
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
1004
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
1012
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
1005
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
1013
# copie des fichiers modifiés
1006
# copie des fichiers modifiés
1014
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
1007
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
1015
	chown -R apache:apache $DIR_ACC/manager/
1008
	chown -R apache:apache $DIR_ACC/manager/
1016
# Modification des fichiers de configuration
1009
# Modification des fichiers de configuration
1017
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
1010
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
1018
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
1011
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
1019
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
1012
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
1020
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
1013
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
1021
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
1014
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
1022
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
1015
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
1023
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
1016
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
1024
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
1017
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
1025
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
1018
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
1026
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
1019
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
1027
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
1020
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
1028
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
1021
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
1029
	cat <<EOF > /etc/freeradius-web/naslist.conf
1022
	cat <<EOF > /etc/freeradius-web/naslist.conf
1030
nas1_name: alcasar-$ORGANISME
1023
nas1_name: alcasar-$ORGANISME
1031
nas1_model: Portail captif
1024
nas1_model: Portail captif
1032
nas1_ip: $PRIVATE_IP
1025
nas1_ip: $PRIVATE_IP
1033
nas1_port_num: 0
1026
nas1_port_num: 0
1034
nas1_community: public
1027
nas1_community: public
1035
EOF
1028
EOF
1036
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1029
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1037
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1030
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1038
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1031
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1039
# Ajout du mappage des attributs chillispot
1032
# Ajout du mappage des attributs chillispot
1040
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1033
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1041
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1034
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1042
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1035
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1043
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1036
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1044
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1037
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1045
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1038
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1046
	chown -R apache:apache /etc/freeradius-web
1039
	chown -R apache:apache /etc/freeradius-web
1047
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1040
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1048
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1041
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1049
<Directory $DIR_WEB/pass>
1042
<Directory $DIR_WEB/pass>
1050
	SSLRequireSSL
1043
	SSLRequireSSL
1051
	AllowOverride None
1044
	AllowOverride None
1052
	Order deny,allow
1045
	Order deny,allow
1053
	Deny from all
1046
	Deny from all
1054
	Allow from 127.0.0.1
1047
	Allow from 127.0.0.1
1055
	Allow from $PRIVATE_NETWORK_MASK
1048
	Allow from $PRIVATE_NETWORK_MASK
1056
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1049
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1057
</Directory>
1050
</Directory>
1058
EOF
1051
EOF
1059
} # End of radius_web ()
1052
} # End of radius_web ()
1060
 
1053
 
1061
##################################################################################
1054
##################################################################################
1062
##			Fonction "chilli"					##
1055
##			Fonction "chilli"					##
1063
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1056
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1064
## - Paramètrage de la page d'authentification (intercept.php)			##
1057
## - Paramètrage de la page d'authentification (intercept.php)			##
1065
##################################################################################
1058
##################################################################################
1066
chilli ()
1059
chilli ()
1067
{
1060
{
1068
# chilli unit for systemd
1061
# chilli unit for systemd
1069
cat << EOF > /lib/systemd/system/chilli.service
1062
cat << EOF > /lib/systemd/system/chilli.service
1070
#  This file is part of systemd.
1063
#  This file is part of systemd.
1071
#
1064
#
1072
#  systemd is free software; you can redistribute it and/or modify it
1065
#  systemd is free software; you can redistribute it and/or modify it
1073
#  under the terms of the GNU General Public License as published by
1066
#  under the terms of the GNU General Public License as published by
1074
#  the Free Software Foundation; either version 2 of the License, or
1067
#  the Free Software Foundation; either version 2 of the License, or
1075
#  (at your option) any later version.
1068
#  (at your option) any later version.
1076
[Unit]
1069
[Unit]
1077
Description=chilli is a captive portal daemon
1070
Description=chilli is a captive portal daemon
1078
After=network.target
1071
After=network.target
1079
 
1072
 
1080
[Service]
1073
[Service]
1081
Type=forking
1074
Type=forking
1082
ExecStart=/usr/libexec/chilli start
1075
ExecStart=/usr/libexec/chilli start
1083
ExecStop=/usr/libexec/chilli stop
1076
ExecStop=/usr/libexec/chilli stop
1084
ExecReload=/usr/libexec/chilli reload
1077
ExecReload=/usr/libexec/chilli reload
1085
PIDFile=/var/run/chilli.pid
1078
PIDFile=/var/run/chilli.pid
1086
 
1079
 
1087
[Install]
1080
[Install]
1088
WantedBy=multi-user.target
1081
WantedBy=multi-user.target
1089
EOF
1082
EOF
1090
# init file creation
1083
# init file creation
1091
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1084
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1092
	cat <<EOF > /usr/libexec/chilli
1085
	cat <<EOF > /usr/libexec/chilli
1093
#!/bin/sh
1086
#!/bin/sh
1094
#
1087
#
1095
# chilli CoovaChilli init
1088
# chilli CoovaChilli init
1096
#
1089
#
1097
# chkconfig: 2345 65 35
1090
# chkconfig: 2345 65 35
1098
# description: CoovaChilli
1091
# description: CoovaChilli
1099
### BEGIN INIT INFO
1092
### BEGIN INIT INFO
1100
# Provides:       chilli
1093
# Provides:       chilli
1101
# Required-Start: network 
1094
# Required-Start: network 
1102
# Should-Start: 
1095
# Should-Start: 
1103
# Required-Stop:  network
1096
# Required-Stop:  network
1104
# Should-Stop: 
1097
# Should-Stop: 
1105
# Default-Start:  2 3 5
1098
# Default-Start:  2 3 5
1106
# Default-Stop:
1099
# Default-Stop:
1107
# Description:    CoovaChilli access controller
1100
# Description:    CoovaChilli access controller
1108
### END INIT INFO
1101
### END INIT INFO
1109
 
1102
 
1110
[ -f /usr/sbin/chilli ] || exit 0
1103
[ -f /usr/sbin/chilli ] || exit 0
1111
. /etc/init.d/functions
1104
. /etc/init.d/functions
1112
CONFIG=/etc/chilli.conf
1105
CONFIG=/etc/chilli.conf
1113
pidfile=/var/run/chilli.pid
1106
pidfile=/var/run/chilli.pid
1114
[ -f \$CONFIG ] || {
1107
[ -f \$CONFIG ] || {
1115
    echo "\$CONFIG Not found"
1108
    echo "\$CONFIG Not found"
1116
    exit 0
1109
    exit 0
1117
}
1110
}
1118
RETVAL=0
1111
RETVAL=0
1119
prog="chilli"
1112
prog="chilli"
1120
case \$1 in
1113
case \$1 in
1121
    start)
1114
    start)
1122
	if [ -f \$pidfile ] ; then 
1115
	if [ -f \$pidfile ] ; then 
1123
		gprintf "chilli is already running"
1116
		gprintf "chilli is already running"
1124
	else
1117
	else
1125
        	gprintf "Starting \$prog: "
1118
        	gprintf "Starting \$prog: "
1126
		rm -f /var/run/chilli* # cleaning
1119
		rm -f /var/run/chilli* # cleaning
1127
        	/sbin/modprobe tun >/dev/null 2>&1
1120
        	/sbin/modprobe tun >/dev/null 2>&1
1128
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1121
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1129
		[ -e /dev/net/tun ] || {
1122
		[ -e /dev/net/tun ] || {
1130
	    	(cd /dev; 
1123
	    	(cd /dev; 
1131
			mkdir net; 
1124
			mkdir net; 
1132
			cd net; 
1125
			cd net; 
1133
			mknod tun c 10 200)
1126
			mknod tun c 10 200)
1134
		}
1127
		}
1135
		ifconfig $INTIF 0.0.0.0
1128
		ifconfig $INTIF 0.0.0.0
1136
		/usr/sbin/ethtool -K $INTIF gro off
1129
		/usr/sbin/ethtool -K $INTIF gro off
1137
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1130
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1138
        	RETVAL=$?
1131
        	RETVAL=$?
1139
	fi
1132
	fi
1140
	;;
1133
	;;
1141
 
1134
 
1142
    reload)
1135
    reload)
1143
	killall -HUP chilli
1136
	killall -HUP chilli
1144
	;;
1137
	;;
1145
 
1138
 
1146
    restart)
1139
    restart)
1147
	\$0 stop
1140
	\$0 stop
1148
        sleep 2
1141
        sleep 2
1149
	\$0 start
1142
	\$0 start
1150
	;;
1143
	;;
1151
    
1144
    
1152
    status)
1145
    status)
1153
        status chilli
1146
        status chilli
1154
        RETVAL=0
1147
        RETVAL=0
1155
        ;;
1148
        ;;
1156
 
1149
 
1157
    stop)
1150
    stop)
1158
	if [ -f \$pidfile ] ; then  
1151
	if [ -f \$pidfile ] ; then  
1159
        	gprintf "Shutting down \$prog: "
1152
        	gprintf "Shutting down \$prog: "
1160
		killproc /usr/sbin/chilli
1153
		killproc /usr/sbin/chilli
1161
		RETVAL=\$?
1154
		RETVAL=\$?
1162
		[ \$RETVAL = 0 ] && rm -f $pidfile
1155
		[ \$RETVAL = 0 ] && rm -f $pidfile
1163
	else	
1156
	else	
1164
        	gprintf "chilli is not running"
1157
        	gprintf "chilli is not running"
1165
	fi
1158
	fi
1166
	;;
1159
	;;
1167
    
1160
    
1168
    *)
1161
    *)
1169
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1162
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1170
        exit 1
1163
        exit 1
1171
esac
1164
esac
1172
echo
1165
echo
1173
EOF
1166
EOF
1174
chmod a+x /usr/libexec/chilli
1167
chmod a+x /usr/libexec/chilli
1175
# conf file creation
1168
# conf file creation
1176
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1169
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1177
	cat <<EOF > /etc/chilli.conf
1170
	cat <<EOF > /etc/chilli.conf
1178
# coova config for ALCASAR
1171
# coova config for ALCASAR
1179
cmdsocket	/var/run/chilli.sock
1172
cmdsocket	/var/run/chilli.sock
1180
unixipc		chilli.$INTIF.ipc
1173
unixipc		chilli.$INTIF.ipc
1181
pidfile		/var/run/chilli.pid
1174
pidfile		/var/run/chilli.pid
1182
net		$PRIVATE_NETWORK_MASK
1175
net		$PRIVATE_NETWORK_MASK
1183
dhcpif		$INTIF
1176
dhcpif		$INTIF
1184
ethers		$DIR_DEST_ETC/alcasar-ethers
1177
ethers		$DIR_DEST_ETC/alcasar-ethers
1185
#nodynip
1178
#nodynip
1186
#statip
1179
#statip
1187
dynip		$PRIVATE_NETWORK_MASK
1180
dynip		$PRIVATE_NETWORK_MASK
1188
domain		$DOMAIN
1181
domain		$DOMAIN
1189
dns1		$PRIVATE_IP
1182
dns1		$PRIVATE_IP
1190
dns2		$PRIVATE_IP
1183
dns2		$PRIVATE_IP
1191
uamlisten	$PRIVATE_IP
1184
uamlisten	$PRIVATE_IP
1192
uamport		3990
1185
uamport		3990
1193
macauth
1186
macauth
1194
macpasswd	password
1187
macpasswd	password
1195
strictmacauth
1188
strictmacauth
1196
locationname	$HOSTNAME.$DOMAIN
1189
locationname	$HOSTNAME.$DOMAIN
1197
radiusserver1	127.0.0.1
1190
radiusserver1	127.0.0.1
1198
radiusserver2	127.0.0.1
1191
radiusserver2	127.0.0.1
1199
radiussecret	$secretradius
1192
radiussecret	$secretradius
1200
radiusauthport	1812
1193
radiusauthport	1812
1201
radiusacctport	1813
1194
radiusacctport	1813
1202
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1195
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1203
radiusnasid	$HOSTNAME.$DOMAIN
1196
radiusnasid	$HOSTNAME.$DOMAIN
1204
uamsecret	$secretuam
1197
uamsecret	$secretuam
1205
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1198
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1206
coaport		3799
1199
coaport		3799
1207
conup		$DIR_DEST_BIN/alcasar-conup.sh
1200
conup		$DIR_DEST_BIN/alcasar-conup.sh
1208
condown		$DIR_DEST_BIN/alcasar-condown.sh
1201
condown		$DIR_DEST_BIN/alcasar-condown.sh
1209
include		$DIR_DEST_ETC/alcasar-uamallowed
1202
include		$DIR_DEST_ETC/alcasar-uamallowed
1210
include		$DIR_DEST_ETC/alcasar-uamdomain
1203
include		$DIR_DEST_ETC/alcasar-uamdomain
1211
#dhcpgateway		none
1204
#dhcpgateway		none
1212
#dhcprelayagent		none
1205
#dhcprelayagent		none
1213
#dhcpgatewayport	none
1206
#dhcpgatewayport	none
1214
EOF
1207
EOF
1215
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1208
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1216
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1209
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1217
# create files for trusted domains and urls
1210
# create files for trusted domains and urls
1218
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1211
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1219
	chown root:apache $DIR_DEST_ETC/alcasar-*
1212
	chown root:apache $DIR_DEST_ETC/alcasar-*
1220
	chmod 660 $DIR_DEST_ETC/alcasar-*
1213
	chmod 660 $DIR_DEST_ETC/alcasar-*
1221
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1214
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1222
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1215
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1223
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1216
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1224
# user 'chilli' creation (in order to run conup/off and up/down scripts
1217
# user 'chilli' creation (in order to run conup/off and up/down scripts
1225
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1218
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1226
	if [ "$chilli_exist" == "1" ]
1219
	if [ "$chilli_exist" == "1" ]
1227
	then
1220
	then
1228
	      userdel -r chilli 2>/dev/null
1221
	      userdel -r chilli 2>/dev/null
1229
	fi
1222
	fi
1230
	groupadd -f chilli
1223
	groupadd -f chilli
1231
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1224
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1232
}  # End of chilli ()
1225
}  # End of chilli ()
1233
 
1226
 
1234
##################################################################
1227
##################################################################
1235
##		Fonction "dansguardian"				##
1228
##		Fonction "dansguardian"				##
1236
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1229
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1237
##################################################################
1230
##################################################################
1238
dansguardian ()
1231
dansguardian ()
1239
{
1232
{
1240
	mkdir /var/dansguardian
1233
	mkdir /var/dansguardian
1241
	chown dansguardian /var/dansguardian
1234
	chown dansguardian /var/dansguardian
1242
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1235
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1243
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1236
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1244
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1237
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1245
# By default the filter is off 
1238
# By default the filter is off 
1246
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1239
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1247
# French deny HTML page
1240
# French deny HTML page
1248
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1241
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1249
# Listen only on LAN side
1242
# Listen only on LAN side
1250
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1243
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1251
# DG send its flow to HAVP
1244
# DG send its flow to HAVP
1252
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1245
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1253
# replace the default deny HTML page
1246
# replace the default deny HTML page
1254
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1247
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1255
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1248
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1256
# Don't log
1249
# Don't log
1257
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1250
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1258
# on désactive par défaut le controle de contenu des pages html
1251
# on désactive par défaut le controle de contenu des pages html
1259
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1252
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1260
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1253
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1261
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1254
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1262
# on désactive par défaut le contrôle d'URL par expressions régulières
1255
# on désactive par défaut le contrôle d'URL par expressions régulières
1263
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1256
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1264
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1257
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1265
 
1258
 
1266
# Configure Dansguardian for large site
1259
# Configure Dansguardian for large site
1267
# Minimum number of processus to handle connections
1260
# Minimum number of processus to handle connections
1268
	$SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1261
	$SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1269
# Maximum number of processus to handle connections
1262
# Maximum number of processus to handle connections
1270
	$SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1263
	$SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1271
# Run at least 8 daemons
1264
# Run at least 8 daemons
1272
	$SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1265
	$SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1273
# minimum number of processes to spawn
1266
# minimum number of processes to spawn
1274
	$SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1267
	$SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1275
# maximum age of a child process before it croaks it
1268
# maximum age of a child process before it croaks it
1276
	$SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
1269
	$SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
1277
	
1270
	
1278
# on désactive par défaut le contrôle de téléchargement de fichiers
1271
# on désactive par défaut le contrôle de téléchargement de fichiers
1279
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1272
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1280
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1273
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1281
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1274
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1282
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1275
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1283
	touch $DIR_DG/lists/bannedextensionlist
1276
	touch $DIR_DG/lists/bannedextensionlist
1284
	touch $DIR_DG/lists/bannedmimetypelist
1277
	touch $DIR_DG/lists/bannedmimetypelist
1285
# 'Safesearch' regex actualisation
1278
# 'Safesearch' regex actualisation
1286
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1279
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1287
# empty LAN IP list that won't be WEB filtered
1280
# empty LAN IP list that won't be WEB filtered
1288
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1281
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1289
	touch $DIR_DG/lists/exceptioniplist
1282
	touch $DIR_DG/lists/exceptioniplist
1290
# Keep a copy of URL & domain filter configuration files
1283
# Keep a copy of URL & domain filter configuration files
1291
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1284
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1292
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1285
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1293
} # End of dansguardian ()
1286
} # End of dansguardian ()
1294
 
1287
 
1295
##################################################################
1288
##################################################################
1296
##			Fonction "antivirus"			##
1289
##			Fonction "antivirus"			##
1297
## - configuration of havp, libclamav and freshclam		##
1290
## - configuration of havp, libclamav and freshclam		##
1298
##################################################################
1291
##################################################################
1299
antivirus ()		
1292
antivirus ()		
1300
{
1293
{
1301
# create 'havp' user
1294
# create 'havp' user
1302
	havp_exist=`grep havp /etc/passwd|wc -l`
1295
	havp_exist=`grep havp /etc/passwd|wc -l`
1303
	if [ "$havp_exist" == "1" ]
1296
	if [ "$havp_exist" == "1" ]
1304
	then
1297
	then
1305
	      userdel -r havp 2>/dev/null
1298
	      userdel -r havp 2>/dev/null
1306
	      groupdel havp 2>/dev/null
1299
	      groupdel havp 2>/dev/null
1307
	fi
1300
	fi
1308
	groupadd -f havp
1301
	groupadd -f havp
1309
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1302
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1310
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1303
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1311
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1304
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1312
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1305
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1313
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1306
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1314
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1307
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1315
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1308
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1316
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1309
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1317
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1310
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1318
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1311
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1319
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1312
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1320
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1313
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1321
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1314
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1322
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1315
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1323
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1316
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1324
# skip checking of youtube flow (too heavy load / risk too low)
1317
# skip checking of youtube flow (too heavy load / risk too low)
1325
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1318
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1326
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1319
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1327
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1320
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1328
# adapt init script and systemd unit
1321
# adapt init script and systemd unit
1329
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1322
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1330
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1323
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1331
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1324
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1332
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1325
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1333
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1326
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1334
# replace of the intercept page (template)
1327
# replace of the intercept page (template)
1335
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1328
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1336
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1329
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1337
# update virus database every 4 hours (24h/6)
1330
# update virus database every 4 hours (24h/6)
1338
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1331
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1339
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1332
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1340
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1333
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1341
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1334
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1342
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1335
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1343
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1336
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1344
# update now
1337
# update now
1345
	/usr/bin/freshclam --no-warnings
1338
	/usr/bin/freshclam --no-warnings
1346
} # End of antivirus ()
1339
} # End of antivirus ()
1347
 
1340
 
1348
##########################################################################
1341
##########################################################################
1349
##			Fonction "tinyproxy"				##
1342
##			Fonction "tinyproxy"				##
1350
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1343
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1351
##########################################################################
1344
##########################################################################
1352
tinyproxy ()		
1345
tinyproxy ()		
1353
{
1346
{
1354
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1347
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1355
	if [ "$tinyproxy_exist" == "1" ]
1348
	if [ "$tinyproxy_exist" == "1" ]
1356
	then
1349
	then
1357
	      userdel -r tinyproxy 2>/dev/null
1350
	      userdel -r tinyproxy 2>/dev/null
1358
	      groupdel tinyproxy 2>/dev/null
1351
	      groupdel tinyproxy 2>/dev/null
1359
	fi
1352
	fi
1360
	groupadd -f tinyproxy
1353
	groupadd -f tinyproxy
1361
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1354
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1362
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1355
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1363
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1356
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1364
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1357
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1365
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1358
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1366
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1359
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1367
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1360
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1368
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1361
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1369
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1362
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1370
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1363
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1371
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1364
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1372
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1365
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1373
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1366
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1374
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1367
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1375
# Create the systemd unit
1368
# Create the systemd unit
1376
cat << EOF > /lib/systemd/system/tinyproxy.service
1369
cat << EOF > /lib/systemd/system/tinyproxy.service
1377
#  This file is part of systemd.
1370
#  This file is part of systemd.
1378
#
1371
#
1379
#  systemd is free software; you can redistribute it and/or modify it
1372
#  systemd is free software; you can redistribute it and/or modify it
1380
#  under the terms of the GNU General Public License as published by
1373
#  under the terms of the GNU General Public License as published by
1381
#  the Free Software Foundation; either version 2 of the License, or
1374
#  the Free Software Foundation; either version 2 of the License, or
1382
#  (at your option) any later version.
1375
#  (at your option) any later version.
1383
 
1376
 
1384
# This unit launches tinyproxy (a very light proxy).
1377
# This unit launches tinyproxy (a very light proxy).
1385
# The "sleep 2" is needed because the pid file isn't ready for systemd
1378
# The "sleep 2" is needed because the pid file isn't ready for systemd
1386
[Unit]
1379
[Unit]
1387
Description=Tinyproxy Web Proxy Server
1380
Description=Tinyproxy Web Proxy Server
1388
After=network.target iptables.service
1381
After=network.target iptables.service
1389
 
1382
 
1390
[Service]
1383
[Service]
1391
Type=forking
1384
Type=forking
1392
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1385
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1393
ExecStartPre=/bin/sleep 2
1386
ExecStartPre=/bin/sleep 2
1394
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1387
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1395
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1388
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1396
 
1389
 
1397
[Install]
1390
[Install]
1398
WantedBy=multi-user.target
1391
WantedBy=multi-user.target
1399
EOF
1392
EOF
1400
 
1393
 
1401
} # end of tinyproxy
1394
} # end of tinyproxy
1402
##################################################################################
1395
##################################################################################
1403
##			function "ulogd"					##
1396
##			function "ulogd"					##
1404
## - Ulog config for multi-log files 						##
1397
## - Ulog config for multi-log files 						##
1405
##################################################################################
1398
##################################################################################
1406
ulogd ()
1399
ulogd ()
1407
{
1400
{
1408
# Three instances of ulogd (three different logfiles)
1401
# Three instances of ulogd (three different logfiles)
1409
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1402
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1410
	nl=1
1403
	nl=1
1411
	for log_type in traceability ssh ext-access
1404
	for log_type in traceability ssh ext-access
1412
	do
1405
	do
1413
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1406
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1414
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1407
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1415
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1408
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1416
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
1409
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
1417
		if [ "$ARCH" == "i586" ]; then $SED "s/lib64/lib/g" /etc/ulogd-$log_type.conf; fi
1410
		if [ "$ARCH" == "i586" ]; then $SED "s/lib64/lib/g" /etc/ulogd-$log_type.conf; fi
1418
		cat << EOF >> /etc/ulogd-$log_type.conf
1411
		cat << EOF >> /etc/ulogd-$log_type.conf
1419
[emu1]
1412
[emu1]
1420
file="/var/log/firewall/$log_type.log"
1413
file="/var/log/firewall/$log_type.log"
1421
sync=1
1414
sync=1
1422
EOF
1415
EOF
1423
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1416
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1424
		nl=`expr $nl + 1`
1417
		nl=`expr $nl + 1`
1425
	done
1418
	done
1426
	chown -R root:apache /var/log/firewall
1419
	chown -R root:apache /var/log/firewall
1427
	chmod 750 /var/log/firewall
1420
	chmod 750 /var/log/firewall
1428
	chmod 640 /var/log/firewall/*
1421
	chmod 640 /var/log/firewall/*
1429
}  # End of ulogd ()
1422
}  # End of ulogd ()
1430
 
1423
 
1431
 
1424
 
1432
##########################################################
1425
##########################################################
1433
##              Function "nfsen"			##
1426
##              Function "nfsen"			##
1434
## - install the nfsen grapher				##
1427
## - install the nfsen grapher				##
1435
## - install the two plugins porttracker & surfmap	##
1428
## - install the two plugins porttracker & surfmap	##
1436
##########################################################
1429
##########################################################
1437
nfsen()
1430
nfsen()
1438
{
1431
{
1439
	tar xzf ./conf/nfsen/nfsen-1.3.7.tar.gz -C /tmp/
1432
	tar xzf ./conf/nfsen/nfsen-1.3.7.tar.gz -C /tmp/
1440
# Add PortTracker plugin
1433
# Add PortTracker plugin
1441
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1434
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1442
	do
1435
	do
1443
	[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1436
	[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1444
	done
1437
	done
1445
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.7/contrib/PortTracker/PortTracker.pm
1438
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.7/contrib/PortTracker/PortTracker.pm
1446
# use of our conf file and init unit
1439
# use of our conf file and init unit
1447
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.7/etc/
1440
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.7/etc/
1448
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1441
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1449
	DirTmp=$(pwd)
1442
	DirTmp=$(pwd)
1450
	cd /tmp/nfsen-1.3.7/
1443
	cd /tmp/nfsen-1.3.7/
1451
	/usr/bin/perl install.pl etc/nfsen.conf
1444
	/usr/bin/perl install.pl etc/nfsen.conf
1452
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1445
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1453
# Create RRD DB for porttracker (only in it still doesn't exist)
1446
# Create RRD DB for porttracker (only in it still doesn't exist)
1454
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1447
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1455
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1448
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1456
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1449
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1457
	chmod -R 770 /var/log/netflow/porttracker
1450
	chmod -R 770 /var/log/netflow/porttracker
1458
# nfsen unit for systemd
1451
# nfsen unit for systemd
1459
cat << EOF > /lib/systemd/system/nfsen.service
1452
cat << EOF > /lib/systemd/system/nfsen.service
1460
#  This file is part of systemd.
1453
#  This file is part of systemd.
1461
#
1454
#
1462
#  systemd is free software; you can redistribute it and/or modify it
1455
#  systemd is free software; you can redistribute it and/or modify it
1463
#  under the terms of the GNU General Public License as published by
1456
#  under the terms of the GNU General Public License as published by
1464
#  the Free Software Foundation; either version 2 of the License, or
1457
#  the Free Software Foundation; either version 2 of the License, or
1465
#  (at your option) any later version.
1458
#  (at your option) any later version.
1466
 
1459
 
1467
# This unit launches nfsen (a Netflow grapher).
1460
# This unit launches nfsen (a Netflow grapher).
1468
[Unit]
1461
[Unit]
1469
Description= NfSen init script
1462
Description= NfSen init script
1470
After=network.target iptables.service
1463
After=network.target iptables.service
1471
 
1464
 
1472
[Service]
1465
[Service]
1473
Type=oneshot
1466
Type=oneshot
1474
RemainAfterExit=yes
1467
RemainAfterExit=yes
1475
PIDFile=/var/run/nfsen/nfsen.pid
1468
PIDFile=/var/run/nfsen/nfsen.pid
1476
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1469
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1477
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1470
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1478
ExecStart=/usr/bin/nfsen start 
1471
ExecStart=/usr/bin/nfsen start 
1479
ExecStop=/usr/bin/nfsen stop
1472
ExecStop=/usr/bin/nfsen stop
1480
ExecReload=/usr/bin/nfsen restart
1473
ExecReload=/usr/bin/nfsen restart
1481
TimeoutSec=0
1474
TimeoutSec=0
1482
 
1475
 
1483
[Install]
1476
[Install]
1484
WantedBy=multi-user.target
1477
WantedBy=multi-user.target
1485
EOF
1478
EOF
1486
# Add the listen port to collect netflow packet (nfcapd)
1479
# Add the listen port to collect netflow packet (nfcapd)
1487
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1480
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1488
# expire delay for the profile "live"
1481
# expire delay for the profile "live"
1489
	/usr/bin/systemctl start nfsen
1482
	/usr/bin/systemctl start nfsen
1490
	/bin/nfsen -m live -e 62d 2>/dev/null
1483
	/bin/nfsen -m live -e 62d 2>/dev/null
1491
# add SURFmap plugin
1484
# add SURFmap plugin
1492
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1485
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1493
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1486
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1494
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1487
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1495
	cd /tmp/
1488
	cd /tmp/
1496
	/usr/bin/sh SURFmap/install.sh
1489
	/usr/bin/sh SURFmap/install.sh
1497
chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1490
chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1498
# clear the installation
1491
# clear the installation
1499
	cd $DirTmp
1492
	cd $DirTmp
1500
	rm -rf /tmp/nfsen*
1493
	rm -rf /tmp/nfsen*
1501
	rm -rf /tmp/SURFmap*
1494
	rm -rf /tmp/SURFmap*
1502
} # End of nfsen ()
1495
} # End of nfsen ()
1503
 
1496
 
1504
##################################################
1497
##################################################
1505
##		Function "vnstat"		##
1498
##		Function "vnstat"		##
1506
## Initialization of Vnstat and vnstat phpFE    ##
1499
## Initialization of Vnstat and vnstat phpFE    ##
1507
##################################################
1500
##################################################
1508
vnstat ()
1501
vnstat ()
1509
{
1502
{
1510
	 [ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1503
	 [ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1511
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1504
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1512
	 [ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1505
	 [ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1513
	 $SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?g" $DIR_ACC/manager/stats/config.php
1506
	 $SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?g" $DIR_ACC/manager/stats/config.php
1514
	/usr/bin/vnstat -u -i $EXTIF
1507
	/usr/bin/vnstat -u -i $EXTIF
1515
} # End of vnstat	
1508
} # End of vnstat	
1516
##################################################
1509
##################################################
1517
##		Function "dnsmasq"		##
1510
##		Function "dnsmasq"		##
1518
##################################################
1511
##################################################
1519
dnsmasq ()
1512
dnsmasq ()
1520
{
1513
{
1521
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1514
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1522
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1515
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1523
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1516
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1524
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1517
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1525
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1518
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1526
	cat << EOF > /etc/dnsmasq.conf 
1519
	cat << EOF > /etc/dnsmasq.conf 
1527
# Configuration file for "dnsmasq in forward mode"
1520
# Configuration file for "dnsmasq in forward mode"
1528
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1521
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1529
listen-address=$PRIVATE_IP
1522
listen-address=$PRIVATE_IP
1530
pid-file=/var/run/dnsmasq.pid
1523
pid-file=/var/run/dnsmasq.pid
1531
listen-address=127.0.0.1
1524
listen-address=127.0.0.1
1532
no-dhcp-interface=$INTIF
1525
no-dhcp-interface=$INTIF
1533
no-dhcp-interface=tun0
1526
no-dhcp-interface=tun0
1534
no-dhcp-interface=lo
1527
no-dhcp-interface=lo
1535
bind-interfaces
1528
bind-interfaces
1536
cache-size=2048
1529
cache-size=2048
1537
domain=$DOMAIN
1530
domain=$DOMAIN
1538
domain-needed
1531
domain-needed
1539
expand-hosts
1532
expand-hosts
1540
bogus-priv
1533
bogus-priv
1541
filterwin2k
1534
filterwin2k
1542
server=$DNS1
1535
server=$DNS1
1543
server=$DNS2
1536
server=$DNS2
1544
# DHCP service is configured. It will be enabled in "bypass" mode
1537
# DHCP service is configured. It will be enabled in "bypass" mode
1545
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1538
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1546
#dhcp-option=option:router,$PRIVATE_IP
1539
#dhcp-option=option:router,$PRIVATE_IP
1547
#dhcp-option=option:ntp-server,$PRIVATE_IP
1540
#dhcp-option=option:ntp-server,$PRIVATE_IP
1548
 
1541
 
1549
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1542
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1550
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1543
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1551
EOF
1544
EOF
1552
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1545
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1553
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1546
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1554
# Configuration file for "dnsmasq with blacklist"
1547
# Configuration file for "dnsmasq with blacklist"
1555
# Add Toulouse blacklist domains
1548
# Add Toulouse blacklist domains
1556
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1549
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1557
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1550
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1558
pid-file=/var/run/dnsmasq-blacklist.pid
1551
pid-file=/var/run/dnsmasq-blacklist.pid
1559
listen-address=$PRIVATE_IP
1552
listen-address=$PRIVATE_IP
1560
port=54
1553
port=54
1561
no-dhcp-interface=$INTIF
1554
no-dhcp-interface=$INTIF
1562
no-dhcp-interface=tun0
1555
no-dhcp-interface=tun0
1563
no-dhcp-interface=lo
1556
no-dhcp-interface=lo
1564
bind-interfaces
1557
bind-interfaces
1565
cache-size=2048
1558
cache-size=2048
1566
domain=$DOMAIN
1559
domain=$DOMAIN
1567
domain-needed
1560
domain-needed
1568
expand-hosts
1561
expand-hosts
1569
bogus-priv
1562
bogus-priv
1570
filterwin2k
1563
filterwin2k
1571
server=$DNS1
1564
server=$DNS1
1572
server=$DNS2
1565
server=$DNS2
1573
EOF
1566
EOF
1574
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1567
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1575
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1568
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1576
# Configuration file for "dnsmasq with whitelist"
1569
# Configuration file for "dnsmasq with whitelist"
1577
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1570
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1578
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1571
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1579
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1572
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1580
pid-file=/var/run/dnsmasq-whitelist.pid
1573
pid-file=/var/run/dnsmasq-whitelist.pid
1581
listen-address=$PRIVATE_IP
1574
listen-address=$PRIVATE_IP
1582
port=55
1575
port=55
1583
no-dhcp-interface=$INTIF
1576
no-dhcp-interface=$INTIF
1584
no-dhcp-interface=tun0
1577
no-dhcp-interface=tun0
1585
no-dhcp-interface=lo
1578
no-dhcp-interface=lo
1586
bind-interfaces
1579
bind-interfaces
1587
cache-size=1024
1580
cache-size=1024
1588
domain=$DOMAIN
1581
domain=$DOMAIN
1589
domain-needed
1582
domain-needed
1590
expand-hosts
1583
expand-hosts
1591
bogus-priv
1584
bogus-priv
1592
filterwin2k
1585
filterwin2k
1593
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1586
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1594
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1587
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1595
EOF
1588
EOF
1596
# 4th dnsmasq listen on udp 56 ("blackhole")
1589
# 4th dnsmasq listen on udp 56 ("blackhole")
1597
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1590
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1598
# Configuration file for "dnsmasq as a blackhole"
1591
# Configuration file for "dnsmasq as a blackhole"
1599
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1592
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1600
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1593
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1601
pid-file=/var/run/dnsmasq-blackhole.pid
1594
pid-file=/var/run/dnsmasq-blackhole.pid
1602
listen-address=$PRIVATE_IP
1595
listen-address=$PRIVATE_IP
1603
port=56
1596
port=56
1604
no-dhcp-interface=$INTIF
1597
no-dhcp-interface=$INTIF
1605
no-dhcp-interface=tun0
1598
no-dhcp-interface=tun0
1606
no-dhcp-interface=lo
1599
no-dhcp-interface=lo
1607
bind-interfaces
1600
bind-interfaces
1608
cache-size=256
1601
cache-size=256
1609
domain=$DOMAIN
1602
domain=$DOMAIN
1610
domain-needed
1603
domain-needed
1611
expand-hosts
1604
expand-hosts
1612
bogus-priv
1605
bogus-priv
1613
filterwin2k
1606
filterwin2k
1614
EOF
1607
EOF
1615
 
1608
 
1616
# the main instance should start after network and chilli (which create tun0)
1609
# the main instance should start after network and chilli (which create tun0)
1617
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1610
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1618
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1611
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1619
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1612
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1620
	for list in blacklist whitelist blackhole
1613
	for list in blacklist whitelist blackhole
1621
	do
1614
	do
1622
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1615
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1623
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1616
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1624
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1617
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1625
	done
1618
	done
1626
} # End dnsmasq
1619
} # End dnsmasq
1627
 
1620
 
1628
##########################################################
1621
##########################################################
1629
##		Fonction "BL"				##
1622
##		Fonction "BL"				##
1630
##########################################################
1623
##########################################################
1631
BL ()
1624
BL ()
1632
{
1625
{
1633
# copy and extract toulouse BL
1626
# copy and extract toulouse BL
1634
	rm -rf $DIR_DG/lists/blacklists
1627
	rm -rf $DIR_DG/lists/blacklists
1635
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1628
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1636
# creation of the OSSI BL and WL categories (domain name and url)
1629
# creation of the OSSI BL and WL categories (domain name and url)
1637
	mkdir $DIR_DG/lists/blacklists/ossi
1630
	mkdir $DIR_DG/lists/blacklists/ossi
1638
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1631
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1639
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1632
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1640
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1633
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1641
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1634
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1642
# creation of file for the rehabilited domains and urls
1635
# creation of file for the rehabilited domains and urls
1643
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1636
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1644
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1637
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1645
	touch $DIR_DG/lists/exceptionsitelist
1638
	touch $DIR_DG/lists/exceptionsitelist
1646
	touch $DIR_DG/lists/exceptionurllist
1639
	touch $DIR_DG/lists/exceptionurllist
1647
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1640
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1648
	cat <<EOF > $DIR_DG/lists/bannedurllist
1641
	cat <<EOF > $DIR_DG/lists/bannedurllist
1649
# Dansguardian filter config for ALCASAR
1642
# Dansguardian filter config for ALCASAR
1650
EOF
1643
EOF
1651
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1644
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1652
# Dansguardian domain filter config for ALCASAR
1645
# Dansguardian domain filter config for ALCASAR
1653
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1646
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1654
#**
1647
#**
1655
# block all SSL and CONNECT tunnels
1648
# block all SSL and CONNECT tunnels
1656
**s
1649
**s
1657
# block all SSL and CONNECT tunnels specified only as an IP
1650
# block all SSL and CONNECT tunnels specified only as an IP
1658
*ips
1651
*ips
1659
# block all sites specified only by an IP
1652
# block all sites specified only by an IP
1660
*ip
1653
*ip
1661
EOF
1654
EOF
1662
# Add Bing and Youtube to the safesearch url regext list (parental control)
1655
# Add Bing and Youtube to the safesearch url regext list (parental control)
1663
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1656
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1664
# Bing - add 'adlt=strict'
1657
# Bing - add 'adlt=strict'
1665
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1658
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1666
# Youtube - add 'edufilter=your_ID' 
1659
# Youtube - add 'edufilter=your_ID' 
1667
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1660
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1668
EOF
1661
EOF
1669
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1662
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1670
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1663
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1671
# adapt the BL to ALCASAR architecture. Enable the default categories
1664
# adapt the BL to ALCASAR architecture. Enable the default categories
1672
	if [ "$mode" != "update" ]; then
1665
	if [ "$mode" != "update" ]; then
1673
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1666
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1674
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1667
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1675
	fi
1668
	fi
1676
}
1669
}
1677
 
1670
 
1678
##########################################################
1671
##########################################################
1679
##		Fonction "cron"				##
1672
##		Fonction "cron"				##
1680
## - Mise en place des différents fichiers de cron	##
1673
## - Mise en place des différents fichiers de cron	##
1681
##########################################################
1674
##########################################################
1682
cron ()
1675
cron ()
1683
{
1676
{
1684
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1677
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1685
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1678
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1686
	cat <<EOF > /etc/crontab
1679
	cat <<EOF > /etc/crontab
1687
SHELL=/bin/bash
1680
SHELL=/bin/bash
1688
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1681
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1689
MAILTO=root
1682
MAILTO=root
1690
HOME=/
1683
HOME=/
1691
 
1684
 
1692
# run-parts
1685
# run-parts
1693
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1686
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1694
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1687
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1695
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1688
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1696
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1689
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1697
EOF
1690
EOF
1698
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1691
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1699
	cat <<EOF >> /etc/anacrontab
1692
	cat <<EOF >> /etc/anacrontab
1700
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1693
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1701
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1694
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1702
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1695
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1703
EOF
1696
EOF
1704
 
1697
 
1705
	cat <<EOF > /etc/cron.d/alcasar-mysql
1698
	cat <<EOF > /etc/cron.d/alcasar-mysql
1706
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1699
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1707
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1700
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1708
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1701
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1709
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1702
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1710
EOF
1703
EOF
1711
	cat <<EOF > /etc/cron.d/alcasar-archive
1704
	cat <<EOF > /etc/cron.d/alcasar-archive
1712
# Archive des logs et de la base de données (tous les lundi à 5h35)
1705
# Archive des logs et de la base de données (tous les lundi à 5h35)
1713
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1706
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1714
EOF
1707
EOF
1715
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1708
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1716
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1709
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1717
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1710
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1718
EOF
1711
EOF
1719
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1712
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1720
# mise à jour automatique de la distribution tous les jours 3h30
1713
# mise à jour automatique de la distribution tous les jours 3h30
1721
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1714
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1722
EOF
1715
EOF
1723
	#cat << EOF > /etc/cron.d/alcasar-netflow
1716
	#cat << EOF > /etc/cron.d/alcasar-netflow
1724
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1717
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1725
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1718
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1726
#EOF
1719
#EOF
1727
 
1720
 
1728
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1721
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1729
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1722
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1730
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1723
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1731
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1724
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1732
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1725
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1733
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1726
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1734
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1727
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1735
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1728
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1736
	rm -f /etc/cron.daily/freeradius-web
1729
	rm -f /etc/cron.daily/freeradius-web
1737
	rm -f /etc/cron.monthly/freeradius-web
1730
	rm -f /etc/cron.monthly/freeradius-web
1738
	cat << EOF > /etc/cron.d/freeradius-web
1731
	cat << EOF > /etc/cron.d/freeradius-web
1739
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1732
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1740
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1733
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1741
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1734
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1742
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1735
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1743
EOF
1736
EOF
1744
	cat << EOF > /etc/cron.d/alcasar-watchdog
1737
	cat << EOF > /etc/cron.d/alcasar-watchdog
1745
# activation du "chien de garde" (watchdog) toutes les 3'
1738
# activation du "chien de garde" (watchdog) toutes les 3'
1746
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1739
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1747
EOF
1740
EOF
1748
# activation du "chien de garde des services" (watchdog) toutes les 18'
1741
# activation du "chien de garde des services" (watchdog) toutes les 18'
1749
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1742
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1750
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1743
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1751
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1744
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1752
EOF
1745
EOF
1753
# suppression des crons usagers
1746
# suppression des crons usagers
1754
	rm -f /var/spool/cron/*
1747
	rm -f /var/spool/cron/*
1755
} # End cron
1748
} # End cron
1756
 
1749
 
1757
##################################################################
1750
##################################################################
1758
## 			Fonction "Fail2Ban"			##
1751
## 			Fonction "Fail2Ban"			##
1759
##- Modification de la configuration de fail2ban		##
1752
##- Modification de la configuration de fail2ban		##
1760
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1753
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1761
##################################################################
1754
##################################################################
1762
fail2ban()
1755
fail2ban()
1763
{
1756
{
1764
	$DIR_CONF/fail2ban.sh
1757
	$DIR_CONF/fail2ban.sh
1765
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1758
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1766
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1759
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1767
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1760
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1768
	chmod 644 /var/log/fail2ban.log
1761
	chmod 644 /var/log/fail2ban.log
1769
	chmod 644 /var/Save/security/watchdog.log
1762
	chmod 644 /var/Save/security/watchdog.log
1770
	/usr/bin/touch /var/log/auth.log
1763
	/usr/bin/touch /var/log/auth.log
1771
# fail2ban unit
1764
# fail2ban unit
1772
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1765
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1773
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1766
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1774
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1767
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1775
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1768
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1776
} #Fin de fail2ban_install()
1769
} #Fin de fail2ban_install()
1777
 
1770
 
1778
##################################################################
1771
##################################################################
1779
## 			Fonction "gammu_smsd"			##
1772
## 			Fonction "gammu_smsd"			##
1780
## - Creation de la base de donnée Gammu			##
1773
## - Creation de la base de donnée Gammu			##
1781
## - Creation du fichier de config: gammu_smsd_conf		##
1774
## - Creation du fichier de config: gammu_smsd_conf		##
1782
##								##
1775
##								##
1783
##################################################################
1776
##################################################################
1784
gammu_smsd()
1777
gammu_smsd()
1785
{
1778
{
1786
# Create 'gammu' databse
1779
# Create 'gammu' databse
1787
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1780
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1788
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1781
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1789
# Add a gammu database structure
1782
# Add a gammu database structure
1790
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1783
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1791
 
1784
 
1792
# config file for the daemon
1785
# config file for the daemon
1793
cat << EOF > /etc/gammu_smsd_conf
1786
cat << EOF > /etc/gammu_smsd_conf
1794
[gammu]
1787
[gammu]
1795
port = /dev/ttyUSB0
1788
port = /dev/ttyUSB0
1796
connection = at115200
1789
connection = at115200
1797
 
1790
 
1798
;########################################################
1791
;########################################################
1799
 
1792
 
1800
[smsd]
1793
[smsd]
1801
 
1794
 
1802
PIN = 1234
1795
PIN = 1234
1803
 
1796
 
1804
logfile = /var/log/gammu-smsd/gammu-smsd.log
1797
logfile = /var/log/gammu-smsd/gammu-smsd.log
1805
logformat = textall
1798
logformat = textall
1806
debuglevel = 0
1799
debuglevel = 0
1807
 
1800
 
1808
service = sql
1801
service = sql
1809
driver = native_mysql
1802
driver = native_mysql
1810
user = $DB_USER
1803
user = $DB_USER
1811
password = $radiuspwd
1804
password = $radiuspwd
1812
pc = localhost
1805
pc = localhost
1813
database = $DB_GAMMU
1806
database = $DB_GAMMU
1814
 
1807
 
1815
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1808
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1816
 
1809
 
1817
StatusFrequency = 30
1810
StatusFrequency = 30
1818
;LoopSleep = 2
1811
;LoopSleep = 2
1819
 
1812
 
1820
;ResetFrequency = 300
1813
;ResetFrequency = 300
1821
;HardResetFrequency = 120
1814
;HardResetFrequency = 120
1822
 
1815
 
1823
CheckSecurity = 1 
1816
CheckSecurity = 1 
1824
CheckSignal = 1
1817
CheckSignal = 1
1825
CheckBattery = 0
1818
CheckBattery = 0
1826
EOF
1819
EOF
1827
 
1820
 
1828
chmod 755 /etc/gammu_smsd_conf
1821
chmod 755 /etc/gammu_smsd_conf
1829
 
1822
 
1830
#Creation dossier de log Gammu-smsd
1823
#Creation dossier de log Gammu-smsd
1831
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1824
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1832
chmod 755 /var/log/gammu-smsd
1825
chmod 755 /var/log/gammu-smsd
1833
 
1826
 
1834
#Edition du script sql gammu <-> radius
1827
#Edition du script sql gammu <-> radius
1835
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1828
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1836
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1829
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1837
 
1830
 
1838
#Création de la règle udev pour les Huawei // idVendor: 12d1
1831
#Création de la règle udev pour les Huawei // idVendor: 12d1
1839
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1832
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1840
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1833
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1841
EOF
1834
EOF
1842
 
1835
 
1843
} # END gammu_smsd()
1836
} # END gammu_smsd()
1844
 
1837
 
1845
##################################################################
1838
##################################################################
1846
##			Fonction "post_install"			##
1839
##			Fonction "post_install"			##
1847
## - Modification des bannières (locales et ssh) et des prompts ##
1840
## - Modification des bannières (locales et ssh) et des prompts ##
1848
## - Installation de la structure de chiffrement pour root	##
1841
## - Installation de la structure de chiffrement pour root	##
1849
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1842
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1850
## - Mise en place du la rotation des logs			##
1843
## - Mise en place du la rotation des logs			##
1851
## - Configuration dans le cas d'une mise à jour		##
1844
## - Configuration dans le cas d'une mise à jour		##
1852
##################################################################
1845
##################################################################
1853
post_install()
1846
post_install()
1854
{
1847
{
1855
# création de la bannière locale
1848
# création de la bannière locale
1856
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1849
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1857
	cp -f $DIR_CONF/banner /etc/mageia-release
1850
	cp -f $DIR_CONF/banner /etc/mageia-release
1858
	echo " V$VERSION" >> /etc/mageia-release
1851
	echo " V$VERSION" >> /etc/mageia-release
1859
# création de la bannière SSH
1852
# création de la bannière SSH
1860
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1853
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1861
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1854
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1862
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1855
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1863
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1856
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1864
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1857
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1865
# postfix banner anonymisation
1858
# postfix banner anonymisation
1866
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1859
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1867
# sshd écoute côté LAN et WAN
1860
# sshd écoute côté LAN et WAN
1868
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1861
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1869
# sshd autorise les connections root par certificat
1862
# sshd autorise les connections root par certificat
1870
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
1863
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
1871
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1864
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1872
	echo "SSH=off" >> $CONF_FILE
1865
	echo "SSH=off" >> $CONF_FILE
1873
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
1866
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
1874
	echo "QOS=off" >> $CONF_FILE
1867
	echo "QOS=off" >> $CONF_FILE
1875
	echo "LDAP=off" >> $CONF_FILE
1868
	echo "LDAP=off" >> $CONF_FILE
1876
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1869
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1877
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1870
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1878
	echo "MULTIWAN=off" >> $CONF_FILE
1871
	echo "MULTIWAN=off" >> $CONF_FILE
1879
	echo "FAILOVER=30" >> $CONF_FILE
1872
	echo "FAILOVER=30" >> $CONF_FILE
1880
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1873
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1881
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1874
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1882
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1875
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1883
# Coloration des prompts
1876
# Coloration des prompts
1884
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1877
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1885
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1878
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1886
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1879
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1887
# Droits d'exécution pour utilisateur apache et sysadmin
1880
# Droits d'exécution pour utilisateur apache et sysadmin
1888
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1881
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1889
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1882
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1890
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1883
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1891
# Modify some logrotate files (gammu, ulogd)
1884
# Modify some logrotate files (gammu, ulogd)
1892
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1885
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1893
	chmod 644 /etc/logrotate.d/*
1886
	chmod 644 /etc/logrotate.d/*
1894
# rectification sur versions précédentes de la compression des logs
1887
# rectification sur versions précédentes de la compression des logs
1895
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1888
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1896
# actualisation des fichiers logs compressés
1889
# actualisation des fichiers logs compressés
1897
	for dir in firewall dansguardian httpd
1890
	for dir in firewall dansguardian httpd
1898
	do
1891
	do
1899
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1892
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1900
	done
1893
	done
1901
# create the alcasar-load_balancing unit
1894
# create the alcasar-load_balancing unit
1902
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1895
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1903
#  This file is part of systemd.
1896
#  This file is part of systemd.
1904
#
1897
#
1905
#  systemd is free software; you can redistribute it and/or modify it
1898
#  systemd is free software; you can redistribute it and/or modify it
1906
#  under the terms of the GNU General Public License as published by
1899
#  under the terms of the GNU General Public License as published by
1907
#  the Free Software Foundation; either version 2 of the License, or
1900
#  the Free Software Foundation; either version 2 of the License, or
1908
#  (at your option) any later version.
1901
#  (at your option) any later version.
1909
 
1902
 
1910
# This unit lauches alcasar-load-balancing.sh script.
1903
# This unit lauches alcasar-load-balancing.sh script.
1911
[Unit]
1904
[Unit]
1912
Description=alcasar-load_balancing.sh execution
1905
Description=alcasar-load_balancing.sh execution
1913
After=network.target iptables.service
1906
After=network.target iptables.service
1914
 
1907
 
1915
[Service]
1908
[Service]
1916
Type=oneshot
1909
Type=oneshot
1917
RemainAfterExit=yes
1910
RemainAfterExit=yes
1918
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1911
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1919
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1912
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1920
TimeoutSec=0
1913
TimeoutSec=0
1921
SysVStartPriority=99
1914
SysVStartPriority=99
1922
 
1915
 
1923
[Install]
1916
[Install]
1924
WantedBy=multi-user.target
1917
WantedBy=multi-user.target
1925
EOF
1918
EOF
1926
# processes launched at boot time (Systemctl)
1919
# processes launched at boot time (Systemctl)
1927
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1920
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1928
	do
1921
	do
1929
		/usr/bin/systemctl -q enable $i.service
1922
		/usr/bin/systemctl -q enable $i.service
1930
	done
1923
	done
1931
	
1924
	
1932
# disable processes at boot time (Systemctl)
1925
# disable processes at boot time (Systemctl)
1933
	for i in ulogd
1926
	for i in ulogd
1934
	do
1927
	do
1935
		/usr/bin/systemctl -q disable $i.service
1928
		/usr/bin/systemctl -q disable $i.service
1936
	done
1929
	done
1937
	
1930
	
1938
# Apply French Security Agency (ANSSI) rules
1931
# Apply French Security Agency (ANSSI) rules
1939
# ignore ICMP broadcast (smurf attack)
1932
# ignore ICMP broadcast (smurf attack)
1940
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1933
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1941
# ignore ICMP errors bogus
1934
# ignore ICMP errors bogus
1942
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1935
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1943
# remove ICMP redirects responces
1936
# remove ICMP redirects responces
1944
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1937
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1945
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1938
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1946
# enable SYN Cookies (Syn flood attacks)
1939
# enable SYN Cookies (Syn flood attacks)
1947
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1940
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1948
# enable kernel antispoofing
1941
# enable kernel antispoofing
1949
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1942
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1950
# ignore source routing
1943
# ignore source routing
1951
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1944
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1952
# set conntrack timer to 1h (3600s) instead of 5 weeks
1945
# set conntrack timer to 1h (3600s) instead of 5 weeks
1953
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1946
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1954
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1947
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1955
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1948
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1956
# remove Magic SysReq Keys
1949
# remove Magic SysReq Keys
1957
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1950
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1958
# switch to multi-users runlevel (instead of x11)
1951
# switch to multi-users runlevel (instead of x11)
1959
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1952
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1960
#	GRUB modifications (only one time)
1953
#	GRUB modifications (only one time)
1961
# limit wait time to 3s
1954
# limit wait time to 3s
1962
# create an alcasar entry instead of linux-nonfb
1955
# create an alcasar entry instead of linux-nonfb
1963
# change display to 1024*768 (vga791)
1956
# change display to 1024*768 (vga791)
1964
	grub_already_modified=`grep ALCASAR /boot/grub/menu.lst|wc -l`
1957
	grub_already_modified=`grep ALCASAR /boot/grub/menu.lst|wc -l`
1965
	if [ $grub_already_modified == 0 ]
1958
	if [ $grub_already_modified == 0 ]
1966
		then
1959
		then
1967
		$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1960
		$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1968
		$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1961
		$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1969
		$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1962
		$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1970
		$SED "/^kernel/s/$/ vga=791/" /boot/grub/menu.lst
1963
		$SED "/^kernel/s/$/ vga=791/" /boot/grub/menu.lst
1971
		$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1964
		$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1972
		$SED "/^gfxmenu/d" /boot/grub/menu.lst
1965
		$SED "/^gfxmenu/d" /boot/grub/menu.lst
1973
	fi
1966
	fi
1974
# Remove unused services and users
1967
# Remove unused services and users
1975
	for svc in sshd
1968
	for svc in sshd
1976
	do
1969
	do
1977
		/usr/bin/systemctl -q disable $svc.service
1970
		/usr/bin/systemctl -q disable $svc.service
1978
	done
1971
	done
1979
# Load and apply the previous conf file
1972
# Load and apply the previous conf file
1980
	if [ "$mode" = "update" ]
1973
	if [ "$mode" = "update" ]
1981
	then
1974
	then
1982
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
1975
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
1983
		$DIR_DEST_BIN/alcasar-conf.sh --load
1976
		$DIR_DEST_BIN/alcasar-conf.sh --load
1984
		PARENT_SCRIPT=`basename $0`
1977
		PARENT_SCRIPT=`basename $0`
1985
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1978
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1986
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1979
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1987
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1980
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1988
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1981
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1989
	fi
1982
	fi
1990
	rm -f /tmp/alcasar-conf*
1983
	rm -f /tmp/alcasar-conf*
1991
	chown -R root:apache $DIR_DEST_ETC/*
1984
	chown -R root:apache $DIR_DEST_ETC/*
1992
	chmod -R 660 $DIR_DEST_ETC/*
1985
	chmod -R 660 $DIR_DEST_ETC/*
1993
	chmod ug+x $DIR_DEST_ETC/digest
1986
	chmod ug+x $DIR_DEST_ETC/digest
1994
	cd $DIR_INSTALL
1987
	cd $DIR_INSTALL
1995
	echo ""
1988
	echo ""
1996
	echo "#############################################################################"
1989
	echo "#############################################################################"
1997
	if [ $Lang == "fr" ]
1990
	if [ $Lang == "fr" ]
1998
		then
1991
		then
1999
		echo "#                        Fin d'installation d'ALCASAR                       #"
1992
		echo "#                        Fin d'installation d'ALCASAR                       #"
2000
		echo "#                                                                           #"
1993
		echo "#                                                                           #"
2001
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1994
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2002
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1995
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2003
		echo "#                                                                           #"
1996
		echo "#                                                                           #"
2004
		echo "#############################################################################"
1997
		echo "#############################################################################"
2005
		echo
1998
		echo
2006
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1999
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2007
		echo
2000
		echo
2008
		echo "- Lisez attentivement la documentation d'exploitation"
2001
		echo "- Lisez attentivement la documentation d'exploitation"
2009
		echo
2002
		echo
2010
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
2003
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
2011
		echo
2004
		echo
2012
		echo "                   Appuyez sur 'Entrée' pour continuer"
2005
		echo "                   Appuyez sur 'Entrée' pour continuer"
2013
	else	
2006
	else	
2014
		echo "#                        Enf of ALCASAR install process                     #"
2007
		echo "#                        Enf of ALCASAR install process                     #"
2015
		echo "#                                                                           #"
2008
		echo "#                                                                           #"
2016
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2009
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2017
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2010
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2018
		echo "#                                                                           #"
2011
		echo "#                                                                           #"
2019
		echo "#############################################################################"
2012
		echo "#############################################################################"
2020
		echo
2013
		echo
2021
		echo "- The system will be rebooted in order to operate ALCASAR"
2014
		echo "- The system will be rebooted in order to operate ALCASAR"
2022
		echo
2015
		echo
2023
		echo "- Read the exploitation documentation"
2016
		echo "- Read the exploitation documentation"
2024
		echo
2017
		echo
2025
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
2018
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
2026
		echo
2019
		echo
2027
		echo "                   Hit 'Enter' to continue"
2020
		echo "                   Hit 'Enter' to continue"
2028
	fi
2021
	fi
2029
	sleep 2
2022
	sleep 2
2030
	if [ "$mode" != "update" ]
2023
	if [ "$mode" != "update" ]
2031
	then
2024
	then
2032
		read a
2025
		read a
2033
	fi
2026
	fi
2034
	clear
2027
	clear
2035
	reboot
2028
	reboot
2036
} # End post_install ()
2029
} # End post_install ()
2037
 
2030
 
2038
#################################
2031
#################################
2039
#  	Main Install loop  	#
2032
#  	Main Install loop  	#
2040
#################################
2033
#################################
2041
dir_exec=`dirname "$0"`
2034
dir_exec=`dirname "$0"`
2042
if [ $dir_exec != "." ]
2035
if [ $dir_exec != "." ]
2043
then
2036
then
2044
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2037
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2045
	echo "Launch this program from the ALCASAR archive directory"
2038
	echo "Launch this program from the ALCASAR archive directory"
2046
	exit 0
2039
	exit 0
2047
fi
2040
fi
2048
VERSION=`cat $DIR_INSTALL/VERSION`
2041
VERSION=`cat $DIR_INSTALL/VERSION`
2049
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2042
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2050
nb_args=$#
2043
nb_args=$#
2051
args=$1
2044
args=$1
2052
if [ $nb_args -eq 0 ]
2045
if [ $nb_args -eq 0 ]
2053
then
2046
then
2054
	nb_args=1
2047
	nb_args=1
2055
	args="-h"
2048
	args="-h"
2056
fi
2049
fi
2057
chmod -R u+x $DIR_SCRIPTS/*
2050
chmod -R u+x $DIR_SCRIPTS/*
2058
case $args in
2051
case $args in
2059
	-\? | -h* | --h*)
2052
	-\? | -h* | --h*)
2060
		echo "$usage"
2053
		echo "$usage"
2061
		exit 0
2054
		exit 0
2062
		;;
2055
		;;
2063
	-i | --install)
2056
	-i | --install)
2064
		header_install
2057
		header_install
2065
		license
2058
		license
2066
		header_install
2059
		header_install
2067
		testing
2060
		testing
2068
# RPMs install
2061
# RPMs install
2069
		$DIR_SCRIPTS/alcasar-urpmi.sh
2062
		$DIR_SCRIPTS/alcasar-urpmi.sh
2070
		if [ "$?" != "0" ]
2063
		if [ "$?" != "0" ]
2071
		then
2064
		then
2072
			exit 0
2065
			exit 0
2073
		fi
2066
		fi
2074
		if [ -e $CONF_FILE ]
2067
		if [ -e $CONF_FILE ]
2075
		then
2068
		then
2076
# Uninstall the running version
2069
# Uninstall the running version
2077
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2070
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2078
		fi
2071
		fi
2079
# Test if manual update	
2072
# Test if manual update	
2080
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2073
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2081
		then
2074
		then
2082
			header_install
2075
			header_install
2083
			if [ $Lang == "fr" ]
2076
			if [ $Lang == "fr" ]
2084
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2077
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2085
				else echo "The configuration file of an old version has been found";
2078
				else echo "The configuration file of an old version has been found";
2086
			fi
2079
			fi
2087
			response=0
2080
			response=0
2088
			PTN='^[oOnNyY]$'
2081
			PTN='^[oOnNyY]$'
2089
			until [[ $(expr $response : $PTN) -gt 0 ]]
2082
			until [[ $(expr $response : $PTN) -gt 0 ]]
2090
			do
2083
			do
2091
				if [ $Lang == "fr" ]
2084
				if [ $Lang == "fr" ]
2092
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2085
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2093
					else echo -n "Do you want to use it (Y/n)?";
2086
					else echo -n "Do you want to use it (Y/n)?";
2094
				 fi
2087
				 fi
2095
				read response
2088
				read response
2096
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2089
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2097
				then rm -f /tmp/alcasar-conf*
2090
				then rm -f /tmp/alcasar-conf*
2098
				fi
2091
				fi
2099
			done
2092
			done
2100
		fi
2093
		fi
2101
# Test if update
2094
# Test if update
2102
		if [ -e /tmp/alcasar-conf* ] 
2095
		if [ -e /tmp/alcasar-conf* ] 
2103
		then
2096
		then
2104
			if [ $Lang == "fr" ]
2097
			if [ $Lang == "fr" ]
2105
				then echo "#### Installation avec mise à jour ####";
2098
				then echo "#### Installation avec mise à jour ####";
2106
				else echo "#### Installation with update     ####";
2099
				else echo "#### Installation with update     ####";
2107
			fi
2100
			fi
2108
# Extract the central configuration file
2101
# Extract the central configuration file
2109
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2102
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2110
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2103
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2111
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2104
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2112
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2105
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2113
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2106
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2114
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2107
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2115
			mode="update"
2108
			mode="update"
2116
		fi
2109
		fi
2117
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd post_install
2110
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd post_install
2118
		do
2111
		do
2119
			$func
2112
			$func
2120
# echo "*** 'debug' : end of function $func ***"; read a
2113
# echo "*** 'debug' : end of function $func ***"; read a
2121
		done
2114
		done
2122
		;;
2115
		;;
2123
	-u | --uninstall)
2116
	-u | --uninstall)
2124
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2117
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2125
		then
2118
		then
2126
			if [ $Lang == "fr" ]
2119
			if [ $Lang == "fr" ]
2127
				then echo "ALCASAR n'est pas installé!";
2120
				then echo "ALCASAR n'est pas installé!";
2128
				else echo "ALCASAR isn't installed!";
2121
				else echo "ALCASAR isn't installed!";
2129
			fi
2122
			fi
2130
			exit 0
2123
			exit 0
2131
		fi
2124
		fi
2132
		response=0
2125
		response=0
2133
		PTN='^[oOnN]$'
2126
		PTN='^[oOnN]$'
2134
		until [[ $(expr $response : $PTN) -gt 0 ]]
2127
		until [[ $(expr $response : $PTN) -gt 0 ]]
2135
		do
2128
		do
2136
			if [ $Lang == "fr" ]
2129
			if [ $Lang == "fr" ]
2137
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2130
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2138
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2131
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2139
			fi
2132
			fi
2140
			read response
2133
			read response
2141
		done
2134
		done
2142
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2135
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2143
		then
2136
		then
2144
			$DIR_SCRIPTS/alcasar-conf.sh --create
2137
			$DIR_SCRIPTS/alcasar-conf.sh --create
2145
		else	
2138
		else	
2146
			rm -f /tmp/alcasar-conf*
2139
			rm -f /tmp/alcasar-conf*
2147
		fi
2140
		fi
2148
# Uninstall the running version
2141
# Uninstall the running version
2149
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2142
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2150
		;;
2143
		;;
2151
	*)
2144
	*)
2152
		echo "Argument inconnu :$1";
2145
		echo "Argument inconnu :$1";
2153
		echo "Unknown argument :$1";
2146
		echo "Unknown argument :$1";
2154
		echo "$usage"
2147
		echo "$usage"
2155
		exit 1
2148
		exit 1
2156
		;;
2149
		;;
2157
esac
2150
esac
2158
# end of script
2151
# end of script
2159
 
2152
 
2160
 
2153