Subversion Repositories ALCASAR

Rev

Rev 2432 | Rev 2438 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 2432 Rev 2433
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 2432 2017-10-22 20:56:33Z richard $ 
2
#  $Id: alcasar.sh 2433 2017-10-30 23:02:21Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
23
 
23
 
24
# Options :
24
# Options :
25
#       -i or --install
25
#       -i or --install
26
#       -u or --uninstall
26
#       -u or --uninstall
27
 
27
 
28
# Functions :
28
# Functions :
29
#	testing			: connectivity tests, free space test and mageia version test
29
#	testing			: connectivity tests, free space test and mageia version test
30
#	init			: Installation of RPM and scripts
30
#	init			: Installation of RPM and scripts
31
#	network			: Network parameters
31
#	network			: Network parameters
32
#	ACC			: ALCASAR Control Center installation
32
#	ACC			: ALCASAR Control Center installation
33
#	CA			: Certification Authority initialization
33
#	CA			: Certification Authority initialization
34
#	time_server		: NTPd configuration
34
#	time_server		: NTPd configuration
35
#	init_db			: Initilization of radius database managed with MariaDB
35
#	init_db			: Initilization of radius database managed with MariaDB
36
#	freeradius		: FreeRadius initialisation
36
#	freeradius		: FreeRadius initialisation
37
#	chilli			: coovachilli initialisation (+authentication page)
37
#	chilli			: coovachilli initialisation (+authentication page)
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	antivirus		: HAVP + libclamav configuration
39
#	antivirus		: HAVP + libclamav configuration
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	nfsen			: Configuration of Nfsen Netflow grapher 
42
#	nfsen			: Configuration of Nfsen Netflow grapher 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	vnstat			: little network stat daemon
44
#	vnstat			: little network stat daemon
45
#	BL			: Adaptation of Toulouse University BlackList : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	BL			: Adaptation of Toulouse University BlackList : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
46
#	cron			: Logs export + watchdog + connexion statistics
46
#	cron			: Logs export + watchdog + connexion statistics
47
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	fail2ban		: Fail2ban IDS installation and configuration
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
49
#	msec			: Mandriva security package configuration
49
#	msec			: Mandriva security package configuration
50
#	letsencrypt		: Let's Encrypt client
50
#	letsencrypt		: Let's Encrypt client
51
#	post_install		: Security, log rotation, etc.
51
#	post_install		: Security, log rotation, etc.
52
 
52
 
53
DATE=`date '+%d %B %Y - %Hh%M'`
53
DATE=`date '+%d %B %Y - %Hh%M'`
54
DATE_SHORT=`date '+%d/%m/%Y'`
54
DATE_SHORT=`date '+%d/%m/%Y'`
55
Lang=`echo $LANG|cut -c 1-2`
55
Lang=`echo $LANG|cut -c 1-2`
56
mode="install"
56
mode="install"
57
# ******* Files parameters - paramètres fichiers *********
57
# ******* Files parameters - paramètres fichiers *********
58
DIR_INSTALL=`pwd`				# current directory 
58
DIR_INSTALL=`pwd`				# current directory 
59
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
59
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
60
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
60
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
61
DIR_BLACKLIST="$DIR_INSTALL/blacklist"		# install directory (with blacklist files)
61
DIR_BLACKLIST="$DIR_INSTALL/blacklist"		# install directory (with blacklist files)
62
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
62
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
63
DIR_WEB="/var/www/html"				# directory of APACHE
63
DIR_WEB="/var/www/html"				# directory of APACHE
64
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
64
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
65
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
65
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
66
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
66
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
67
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
67
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
68
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
68
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
69
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
69
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
70
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
70
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
71
# ******* DBMS parameters - paramètres SGBD ********
71
# ******* DBMS parameters - paramètres SGBD ********
72
DB_RADIUS="radius"				# database name used by FreeRadius server
72
DB_RADIUS="radius"				# database name used by FreeRadius server
73
DB_USER="radius"				# user name allows to request the users database
73
DB_USER="radius"				# user name allows to request the users database
74
DB_GAMMU="gammu"				# database name used by Gammu-smsd
74
DB_GAMMU="gammu"				# database name used by Gammu-smsd
75
# ******* Network parameters - paramètres réseau *******
75
# ******* Network parameters - paramètres réseau *******
76
HOSTNAME="alcasar"				# default hostname
76
HOSTNAME="alcasar"				# default hostname
77
DOMAIN="localdomain"				# default local domain
77
DOMAIN="localdomain"				# default local domain
78
EXTIF=`/usr/sbin/ip route|grep default|head -n1|cut -d" " -f5`							# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
78
EXTIF=`/usr/sbin/ip route|grep default|head -n1|cut -d" " -f5`							# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
79
INTIF=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
79
INTIF=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
80
MTU="1500"
80
MTU="1500"
81
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
81
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
82
# ****** Paths - chemin des commandes *******
82
# ****** Paths - chemin des commandes *******
83
SED="/bin/sed -i"
83
SED="/bin/sed -i"
84
# ****************** End of global parameters *********************
84
# ****************** End of global parameters *********************
85
 
85
 
86
license ()
86
license ()
87
{
87
{
88
	if [ $Lang == "fr" ]
88
	if [ $Lang == "fr" ]
89
	then
89
	then
90
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
90
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
91
	else
91
	else
92
		cat $DIR_INSTALL/gpl-warning.txt | more
92
		cat $DIR_INSTALL/gpl-warning.txt | more
93
	fi
93
	fi
94
	response=0
94
	response=0
95
	PTN='^[oOyYnN]$'
95
	PTN='^[oOyYnN]$'
96
	until [[ $(expr $response : $PTN) -gt 0 ]]
96
	until [[ $(expr $response : $PTN) -gt 0 ]]
97
	do
97
	do
98
		if [ $Lang == "fr" ]
98
		if [ $Lang == "fr" ]
99
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
99
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
100
			else echo -n "Do you accept the terms of this license (Y/n)? : "
100
			else echo -n "Do you accept the terms of this license (Y/n)? : "
101
		fi
101
		fi
102
		read response
102
		read response
103
	done
103
	done
104
	if [ "$response" = "n" ] || [ "$response" = "N" ]
104
	if [ "$response" = "n" ] || [ "$response" = "N" ]
105
	then
105
	then
106
		exit 1
106
		exit 1
107
	fi
107
	fi
108
}
108
}
109
 
109
 
110
header_install ()
110
header_install ()
111
{
111
{
112
	clear
112
	clear
113
	echo "-----------------------------------------------------------------------------"
113
	echo "-----------------------------------------------------------------------------"
114
	echo "                     ALCASAR V$VERSION Installation"
114
	echo "                     ALCASAR V$VERSION Installation"
115
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
115
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
116
	echo "-----------------------------------------------------------------------------"
116
	echo "-----------------------------------------------------------------------------"
117
}
117
}
118
 
118
 
119
##################################################################
119
##################################################################
120
##			Function "testing"			##
120
##			Function "testing"			##
121
## - Test of Mageia version					##
121
## - Test of Mageia version					##
122
## - Test of ALCASAR version (if already installed)		##
122
## - Test of ALCASAR version (if already installed)		##
123
## - Test of free space on /var  (>10G)				##
123
## - Test of free space on /var  (>10G)				##
124
## - Test of Internet access					##
124
## - Test of Internet access					##
125
##################################################################
125
##################################################################
126
testing ()
126
testing ()
127
{
127
{
128
# Test of Mageia version
128
# Test of Mageia version
129
# extract the current Mageia version and hardware architecture (i586 ou X64)
129
# extract the current Mageia version and hardware architecture (i586 ou X64)
130
	fic=`cat /etc/product.id`
130
	fic=`cat /etc/product.id`
131
	unknown_os=0
131
	unknown_os=0
132
	old="$IFS"
132
	old="$IFS"
133
	IFS=","
133
	IFS=","
134
	set $fic
134
	set $fic
135
	for i in $*
135
	for i in $*
136
	do
136
	do
137
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
137
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
138
			then 
138
			then 
139
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
139
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
140
			unknown_os=`expr $unknown_os + 1`
140
			unknown_os=`expr $unknown_os + 1`
141
		fi
141
		fi
142
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
142
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
143
			then 
143
			then 
144
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
144
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
145
			unknown_os=`expr $unknown_os + 1`
145
			unknown_os=`expr $unknown_os + 1`
146
		fi
146
		fi
147
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
147
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
148
			then 
148
			then 
149
			ARCH=`echo $i|cut -d"=" -f2`
149
			ARCH=`echo $i|cut -d"=" -f2`
150
			unknown_os=`expr $unknown_os + 1`
150
			unknown_os=`expr $unknown_os + 1`
151
		fi
151
		fi
152
	done
152
	done
153
	if [ "$ARCH" == "i586" ]
153
	if [ "$ARCH" == "i586" ]
154
		then
154
		then
155
		if [ $Lang == "fr" ]
155
		if [ $Lang == "fr" ]
156
			then echo -n "Votre architecture matérielle doit être en 64bits"
156
			then echo -n "Votre architecture matérielle doit être en 64bits"
157
			else echo -n "You hardware architecture must be 64bits"
157
			else echo -n "You hardware architecture must be 64bits"
158
			exit 0
158
			exit 0
159
		fi
159
		fi
160
	fi
160
	fi
161
	IFS="$old"
161
	IFS="$old"
162
# Test if ALCASAR is already installed
162
# Test if ALCASAR is already installed
163
	if [ -e $CONF_FILE ]
163
	if [ -e $CONF_FILE ]
164
	then
164
	then
165
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
165
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
166
		if [ $Lang == "fr" ]
166
		if [ $Lang == "fr" ]
167
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
167
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
168
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
168
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
169
		fi
169
		fi
170
		response=0
170
		response=0
171
		PTN='^[oOnNyY]$'
171
		PTN='^[oOnNyY]$'
172
		until [[ $(expr $response : $PTN) -gt 0 ]]
172
		until [[ $(expr $response : $PTN) -gt 0 ]]
173
		do
173
		do
174
			if [ $Lang == "fr" ]
174
			if [ $Lang == "fr" ]
175
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
175
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
176
				else echo -n "Do you want to update (Y/n)?";
176
				else echo -n "Do you want to update (Y/n)?";
177
			 fi
177
			 fi
178
			read response
178
			read response
179
		done
179
		done
180
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
180
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
181
		then
181
		then
182
			rm -f /tmp/alcasar-conf*
182
			rm -f /tmp/alcasar-conf*
183
		else
183
		else
184
# Retrieve former NICname
184
# Retrieve former NICname
185
			EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`				# EXTernal InterFace
185
			EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`				# EXTernal InterFace
186
			INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`				# INTernal InterFace
186
			INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`				# INTernal InterFace
187
# Create the current conf file
187
# Create the current conf file
188
			$DIR_SCRIPTS/alcasar-conf.sh --create
188
			$DIR_SCRIPTS/alcasar-conf.sh --create
189
			mode="update"
189
			mode="update"
190
		fi
190
		fi
191
	fi
191
	fi
192
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "6" ) ]]
192
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "6" ) ]]
193
		then
193
		then
194
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
194
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
195
			then
195
			then
196
			echo
196
			echo
197
			if [ $Lang == "fr" ]
197
			if [ $Lang == "fr" ]
198
				then	
198
				then	
199
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
199
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
200
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
200
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
201
				echo "2 - Installez Linux-Mageia 6.0 (64bits) et ALCASAR (cf. doc d'installation)"
201
				echo "2 - Installez Linux-Mageia 6.0 (64bits) et ALCASAR (cf. doc d'installation)"
202
				echo "3 - Importez votre base des usagers"
202
				echo "3 - Importez votre base des usagers"
203
			else
203
			else
204
				echo "The automatic update of ALCASAR can't be performed."
204
				echo "The automatic update of ALCASAR can't be performed."
205
				echo "1 - Save your traceability files and the user database"
205
				echo "1 - Save your traceability files and the user database"
206
				echo "2 - Install Linux-Mageia 6 (64bits) & ALCASAR (cf. installation doc)"
206
				echo "2 - Install Linux-Mageia 6 (64bits) & ALCASAR (cf. installation doc)"
207
				echo "3 - Import your users database"
207
				echo "3 - Import your users database"
208
			fi
208
			fi
209
		else
209
		else
210
			if [ $Lang == "fr" ]
210
			if [ $Lang == "fr" ]
211
				then	
211
				then	
212
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
212
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
213
			else
213
			else
214
				echo "The installation of ALCASAR can't be performed."
214
				echo "The installation of ALCASAR can't be performed."
215
			fi
215
			fi
216
		fi
216
		fi
217
		echo
217
		echo
218
		if [ $Lang == "fr" ]
218
		if [ $Lang == "fr" ]
219
			then	
219
			then	
220
			echo "Le système d'exploitation doit être remplacé (Mageia6-64bits)"
220
			echo "Le système d'exploitation doit être remplacé (Mageia6-64bits)"
221
		else
221
		else
222
			echo "The OS must be replaced (Mageia6-64bits)"
222
			echo "The OS must be replaced (Mageia6-64bits)"
223
		fi
223
		fi
224
		exit 0
224
		exit 0
225
	fi
225
	fi
226
	if [ ! -d /var/log/netflow/porttracker ]
226
	if [ ! -d /var/log/netflow/porttracker ]
227
		then
227
		then
228
# Test free space on /var
228
# Test free space on /var
229
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
229
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
230
		if [ $free_space -lt 10 ]
230
		if [ $free_space -lt 10 ]
231
			then
231
			then
232
			if [ $Lang == "fr" ]
232
			if [ $Lang == "fr" ]
233
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
233
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
234
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
234
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
235
			fi
235
			fi
236
		exit 0
236
		exit 0
237
		fi
237
		fi
238
	fi
238
	fi
239
	if [ $Lang == "fr" ]
239
	if [ $Lang == "fr" ]
240
		then echo -n "Tests des paramètres réseau : "
240
		then echo -n "Tests des paramètres réseau : "
241
		else echo -n "Network parameters tests : "
241
		else echo -n "Network parameters tests : "
242
	fi
242
	fi
243
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
243
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
244
	cd /etc/sysconfig/network-scripts/
244
	cd /etc/sysconfig/network-scripts/
245
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
245
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
246
	for i in $IF_INTERFACES
246
	for i in $IF_INTERFACES
247
	do
247
	do
248
		IP_INTERFACE=`/usr/sbin/ip link|grep $i`	
248
		IP_INTERFACE=`/usr/sbin/ip link|grep $i`	
249
		if [ -z "$IP_INTERFACE" ]
249
		if [ -z "$IP_INTERFACE" ]
250
		then
250
		then
251
			rm -f ifcfg-$i
251
			rm -f ifcfg-$i
252
			
252
			
253
			if [ $Lang == "fr" ]
253
			if [ $Lang == "fr" ]
254
				then echo "Suppression : ifcfg-$i"
254
				then echo "Suppression : ifcfg-$i"
255
				else echo "Deleting : ifcfg-$i"
255
				else echo "Deleting : ifcfg-$i"
256
			fi
256
			fi
257
		fi
257
		fi
258
	done
258
	done
259
	cd $DIR_INSTALL
259
	cd $DIR_INSTALL
260
	echo -n "."
260
	echo -n "."
261
# Test Ethernet NIC links state 
261
# Test Ethernet NIC links state 
262
	DOWN_IF=`/usr/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "|grep -v "^w"`
262
	DOWN_IF=`/usr/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "|grep -v "^w"`
263
	for i in $DOWN_IF
263
	for i in $DOWN_IF
264
	do
264
	do
265
		echo $i
265
		echo $i
266
		if [ $Lang == "fr" ]
266
		if [ $Lang == "fr" ]
267
		then 
267
		then 
268
			echo "Échec"
268
			echo "Échec"
269
			echo "Le lien réseau de la carte $i n'est pas actif."
269
			echo "Le lien réseau de la carte $i n'est pas actif."
270
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
270
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
271
		else
271
		else
272
			echo "Failed"
272
			echo "Failed"
273
			echo "The link state of $i interface is down."
273
			echo "The link state of $i interface is down."
274
			echo "Make sure that this network card is connected to a switch or an A.P."
274
			echo "Make sure that this network card is connected to a switch or an A.P."
275
		fi
275
		fi
276
		exit 0
276
		exit 0
277
	done
277
	done
278
	echo -n "."
278
	echo -n "."
279
# Test EXTIF config files
279
# Test EXTIF config files
280
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
280
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
281
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
281
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
282
	PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
282
	PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
283
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
283
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
284
	then
284
	then
285
		if [ $Lang == "fr" ]
285
		if [ $Lang == "fr" ]
286
		then 
286
		then 
287
			echo "Échec"
287
			echo "Échec"
288
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
288
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
289
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
289
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
290
			echo "Appliquez les changements : 'systemctl restart network'"
290
			echo "Appliquez les changements : 'systemctl restart network'"
291
		else
291
		else
292
			echo "Failed"
292
			echo "Failed"
293
			echo "The Internet connected network card ($EXTIF) isn't well configured."
293
			echo "The Internet connected network card ($EXTIF) isn't well configured."
294
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
294
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
295
			echo "Apply the new configuration 'systemctl restart network'"
295
			echo "Apply the new configuration 'systemctl restart network'"
296
		fi
296
		fi
297
		echo "DEVICE=$EXTIF"
297
		echo "DEVICE=$EXTIF"
298
		echo "IPADDR="
298
		echo "IPADDR="
299
		echo "NETMASK="
299
		echo "NETMASK="
300
		echo "GATEWAY="
300
		echo "GATEWAY="
301
		echo "DNS1="
301
		echo "DNS1="
302
		echo "DNS2="
302
		echo "DNS2="
303
		echo "ONBOOT=yes"
303
		echo "ONBOOT=yes"
304
		exit 0
304
		exit 0
305
	fi
305
	fi
306
	echo -n "."
306
	echo -n "."
307
# Test if default GW is set on EXTIF (router or ISP provider equipment)
307
# Test if default GW is set on EXTIF (router or ISP provider equipment)
308
	if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
308
	if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
309
		if [ $Lang == "fr" ]
309
		if [ $Lang == "fr" ]
310
		then 
310
		then 
311
			echo "Échec"
311
			echo "Échec"
312
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
312
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
313
			echo "Réglez ce problème puis relancez ce script."
313
			echo "Réglez ce problème puis relancez ce script."
314
		else
314
		else
315
			echo "Failed"
315
			echo "Failed"
316
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
316
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
317
			echo "Resolv this problem, then restart this script."
317
			echo "Resolv this problem, then restart this script."
318
		fi
318
		fi
319
		exit 0
319
		exit 0
320
	fi
320
	fi
321
	echo -n "."
321
	echo -n "."
322
# Test if default GW is alive
322
# Test if default GW is alive
323
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
323
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
324
	if [ $(expr $arp_reply) -eq 0 ]
324
	if [ $(expr $arp_reply) -eq 0 ]
325
	       	then
325
	       	then
326
		if [ $Lang == "fr" ]
326
		if [ $Lang == "fr" ]
327
		then 
327
		then 
328
			echo "Échec"
328
			echo "Échec"
329
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
329
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
330
			echo "Réglez ce problème puis relancez ce script."
330
			echo "Réglez ce problème puis relancez ce script."
331
		else
331
		else
332
			echo "Failed"
332
			echo "Failed"
333
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
333
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
334
			echo "Resolv this problem, then restart this script."
334
			echo "Resolv this problem, then restart this script."
335
		fi
335
		fi
336
		exit 0
336
		exit 0
337
	fi
337
	fi
338
	echo -n "."
338
	echo -n "."
339
# Test Internet connectivity
339
# Test Internet connectivity
340
	rm -rf /tmp/con_ok.html
340
	rm -rf /tmp/con_ok.html
341
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
341
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
342
	if [ ! -e /tmp/con_ok.html ]
342
	if [ ! -e /tmp/con_ok.html ]
343
	then
343
	then
344
		if [ $Lang == "fr" ]
344
		if [ $Lang == "fr" ]
345
		then 
345
		then 
346
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
346
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
347
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
347
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
348
			echo "Vérifiez la validité des adresses IP des DNS."
348
			echo "Vérifiez la validité des adresses IP des DNS."
349
		else
349
		else
350
			echo "The Internet connection try failed (google.fr)."
350
			echo "The Internet connection try failed (google.fr)."
351
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
351
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
352
			echo "Verify the DNS IP addresses"
352
			echo "Verify the DNS IP addresses"
353
		fi
353
		fi
354
		exit 0
354
		exit 0
355
	fi
355
	fi
356
	rm -rf /tmp/con_ok.html
356
	rm -rf /tmp/con_ok.html
357
	echo ". : ok"
357
	echo ". : ok"
358
} # end of testing ()
358
} # end of testing ()
359
 
359
 
360
##################################################################
360
##################################################################
361
##			Function "init"				##
361
##			Function "init"				##
362
## - Création du fichier "/root/ALCASAR_parametres.tx		##
362
## - Création du fichier "/root/ALCASAR_parametres.tx		##
363
## - Installation et modification des scripts du portail	##
363
## - Installation et modification des scripts du portail	##
364
##################################################################
364
##################################################################
365
init ()
365
init ()
366
{
366
{
367
	if [ "$mode" != "update" ]
367
	if [ "$mode" != "update" ]
368
	then
368
	then
369
# On affecte le nom d'organisme
369
# On affecte le nom d'organisme
370
		header_install
370
		header_install
371
		ORGANISME=!
371
		ORGANISME=!
372
		PTN='^[a-zA-Z0-9-]*$'
372
		PTN='^[a-zA-Z0-9-]*$'
373
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
373
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
374
                do
374
                do
375
			if [ $Lang == "fr" ]
375
			if [ $Lang == "fr" ]
376
			       	then echo -n "Entrez le nom de votre organisme : "
376
			       	then echo -n "Entrez le nom de votre organisme : "
377
				else echo -n "Enter the name of your organism : "
377
				else echo -n "Enter the name of your organism : "
378
			fi
378
			fi
379
			read ORGANISME
379
			read ORGANISME
380
			if [ "$ORGANISME" == "" ]
380
			if [ "$ORGANISME" == "" ]
381
				then
381
				then
382
				ORGANISME=!
382
				ORGANISME=!
383
			fi
383
			fi
384
		done
384
		done
385
	fi
385
	fi
386
# On crée aléatoirement les mots de passe et les secrets partagés
386
# On crée aléatoirement les mots de passe et les secrets partagés
387
# We create random passwords and shared secrets
387
# We create random passwords and shared secrets
388
	rm -f $PASSWD_FILE
388
	rm -f $PASSWD_FILE
389
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
389
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
390
	grub2pwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
390
	grub2pwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
391
    pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
391
    pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
392
        LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
392
        LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
393
        grep -v '[eE]nter password:' | \
393
        grep -v '[eE]nter password:' | \
394
        sed -e "s/PBKDF2 hash of your password is //"`
394
        sed -e "s/PBKDF2 hash of your password is //"`
395
    echo "GRUB2_PASSWORD=$pbkdf2" > /boot/grub2/user.cfg
395
    echo "GRUB2_PASSWORD=$pbkdf2" > /boot/grub2/user.cfg
396
    [ -e /etc/grub.d/default-10_linux ] || cp /etc/grub.d/10_linux /etc/grub.d/default-10_linux
396
    [ -e /etc/grub.d/default-10_linux ] || cp /etc/grub.d/10_linux /etc/grub.d/default-10_linux
397
    cp -f $DIR_CONF/grub-10_linux /etc/grub.d/10_linux  # Request password only on menu editing attempts (not when selecting an entry)
397
    cp -f $DIR_CONF/grub-10_linux /etc/grub.d/10_linux  # Request password only on menu editing attempts (not when selecting an entry)
398
    /usr/bin/update-grub2
-
 
399
    chmod 0600 /boot/grub2/user.cfg
398
    chmod 0600 /boot/grub2/user.cfg
400
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
399
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
401
    echo "GRUB2_user=root" >> $PASSWD_FILE
400
    echo "GRUB2_user=root" >> $PASSWD_FILE
402
    echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
401
    echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
403
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
402
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
404
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
403
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
405
	echo "db_root=$mysqlpwd" >> $PASSWD_FILE
404
	echo "db_root=$mysqlpwd" >> $PASSWD_FILE
406
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
405
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
407
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
406
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
408
	echo "db_user=$DB_USER" >> $PASSWD_FILE
407
	echo "db_user=$DB_USER" >> $PASSWD_FILE
409
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
408
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
410
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
409
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
411
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
410
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
412
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
411
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
413
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
412
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
414
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
413
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
415
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
414
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
416
	chmod 640 $PASSWD_FILE
415
	chmod 640 $PASSWD_FILE
417
#  copy scripts in in /usr/local/bin
416
#  copy scripts in in /usr/local/bin
418
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
417
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
419
#  copy conf files in /usr/local/etc
418
#  copy conf files in /usr/local/etc
420
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
419
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
421
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mysql.sh
420
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mysql.sh
422
# generate central conf file
421
# generate central conf file
423
	cat <<EOF > $CONF_FILE
422
	cat <<EOF > $CONF_FILE
424
##########################################
423
##########################################
425
##                                      ##
424
##                                      ##
426
##          ALCASAR Parameters          ##
425
##          ALCASAR Parameters          ##
427
##                                      ##
426
##                                      ##
428
##########################################
427
##########################################
429
 
428
 
430
INSTALL_DATE=$DATE
429
INSTALL_DATE=$DATE
431
VERSION=$VERSION
430
VERSION=$VERSION
432
ORGANISM=$ORGANISME
431
ORGANISM=$ORGANISME
433
HOSTNAME=$HOSTNAME
432
HOSTNAME=$HOSTNAME
434
DOMAIN=$DOMAIN
433
DOMAIN=$DOMAIN
435
EOF
434
EOF
436
	chmod o-rwx $CONF_FILE
435
	chmod o-rwx $CONF_FILE
437
} # End of init ()
436
} # End of init ()
438
 
437
 
439
##################################################################
438
##################################################################
440
##			Function "network"			##
439
##			Function "network"			##
441
## - Définition du plan d'adressage du réseau de consultation	##
440
## - Définition du plan d'adressage du réseau de consultation	##
442
## - Nommage DNS du système 					##
441
## - Nommage DNS du système 					##
443
## - Configuration de l'interface INTIF (réseau de consultation)##
442
## - Configuration de l'interface INTIF (réseau de consultation)##
444
## - Modification du fichier /etc/hosts				##
443
## - Modification du fichier /etc/hosts				##
445
## - Renseignement des fichiers hosts.allow et hosts.deny	##
444
## - Renseignement des fichiers hosts.allow et hosts.deny	##
446
##################################################################
445
##################################################################
447
network ()
446
network ()
448
{
447
{
449
	header_install
448
	header_install
450
	if [ "$mode" != "update" ]
449
	if [ "$mode" != "update" ]
451
		then
450
		then
452
		if [ $Lang == "fr" ]
451
		if [ $Lang == "fr" ]
453
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
452
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
454
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
453
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
455
		fi
454
		fi
456
		response=0
455
		response=0
457
		PTN='^[oOyYnN]$'
456
		PTN='^[oOyYnN]$'
458
		until [[ $(expr $response : $PTN) -gt 0 ]]
457
		until [[ $(expr $response : $PTN) -gt 0 ]]
459
		do
458
		do
460
			if [ $Lang == "fr" ]
459
			if [ $Lang == "fr" ]
461
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
460
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
462
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
461
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
463
			fi
462
			fi
464
			read response
463
			read response
465
		done
464
		done
466
		if [ "$response" = "n" ] || [ "$response" = "N" ]
465
		if [ "$response" = "n" ] || [ "$response" = "N" ]
467
		then
466
		then
468
			PRIVATE_IP_MASK="0"
467
			PRIVATE_IP_MASK="0"
469
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
468
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
470
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
469
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
471
			do
470
			do
472
				if [ $Lang == "fr" ]
471
				if [ $Lang == "fr" ]
473
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
472
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
474
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
473
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
475
				fi
474
				fi
476
				read PRIVATE_IP_MASK
475
				read PRIVATE_IP_MASK
477
			done
476
			done
478
		else
477
		else
479
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
478
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
480
		fi
479
		fi
481
	else
480
	else
482
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= conf/etc/alcasar.conf|cut -d"=" -f2` 
481
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= conf/etc/alcasar.conf|cut -d"=" -f2` 
483
		rm -rf conf/etc/alcasar.conf
482
		rm -rf conf/etc/alcasar.conf
484
	fi
483
	fi
485
# Define LAN side global parameters
484
# Define LAN side global parameters
486
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
485
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
487
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
486
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
488
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
487
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
489
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
488
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
490
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
489
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
491
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
490
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
492
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
491
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
493
		then
492
		then
494
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
493
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
495
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
494
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
496
	fi	
495
	fi	
497
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
496
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
498
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
497
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
499
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
498
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
500
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
499
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
501
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
500
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
502
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
501
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
503
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
502
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
504
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
503
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
505
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
504
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
506
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
505
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
507
# Define Internet parameters
506
# Define Internet parameters
508
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
507
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
509
	nb_dns=`grep -c ^nameserver /etc/resolv.conf`
508
	nb_dns=`grep -c ^nameserver /etc/resolv.conf`
510
	if [ $nb_dns == 2 ]
509
	if [ $nb_dns == 2 ]
511
		then
510
		then
512
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
511
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
513
	fi
512
	fi
514
	DNS1=${DNS1:=208.67.220.220}
513
	DNS1=${DNS1:=208.67.220.220}
515
	DNS2=${DNS2:=208.67.222.222}
514
	DNS2=${DNS2:=208.67.222.222}
516
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
515
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
517
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
516
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
518
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
517
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
519
# Wrtie the conf file
518
# Wrtie the conf file
520
	echo "EXTIF=$EXTIF" >> $CONF_FILE
519
	echo "EXTIF=$EXTIF" >> $CONF_FILE
521
	echo "INTIF=$INTIF" >> $CONF_FILE
520
	echo "INTIF=$INTIF" >> $CONF_FILE
522
	######## Récupération des interfaces du ou des réseaux de consultation supplémentaires #################
521
	######## Récupération des interfaces du ou des réseaux de consultation supplémentaires #################
523
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
522
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
524
 
523
 
525
	for i in $INTERFACES
524
	for i in $INTERFACES
526
	do
525
	do
527
		SUB=`echo ${i:0:2}`
526
		SUB=`echo ${i:0:2}`
528
		if [ $SUB = "wl" ]
527
		if [ $SUB = "wl" ]
529
			then WIFIF=$i
528
			then WIFIF=$i
530
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ] 
529
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ] 
531
			then LANIF=$i
530
			then LANIF=$i
532
		fi
531
		fi
533
	done
532
	done
534
 
533
 
535
	if [ -n "$WIFIF" ]
534
	if [ -n "$WIFIF" ]
536
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
535
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
537
	elif [ -n "$LANIF" ]
536
	elif [ -n "$LANIF" ]
538
		then echo "LANIF=$LANIF" >> $CONF_FILE
537
		then echo "LANIF=$LANIF" >> $CONF_FILE
539
	fi
538
	fi
540
	#########################################################################################################	
539
	#########################################################################################################	
541
	
540
	
542
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
541
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
543
	if [ $IP_SETTING == "dhcp" ]
542
	if [ $IP_SETTING == "dhcp" ]
544
		then
543
		then
545
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
544
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
546
		echo "GW=dhcp" >> $CONF_FILE
545
		echo "GW=dhcp" >> $CONF_FILE
547
	else
546
	else
548
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
547
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
549
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
548
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
550
	fi
549
	fi
551
	echo "DNS1=$DNS1" >> $CONF_FILE
550
	echo "DNS1=$DNS1" >> $CONF_FILE
552
	echo "DNS2=$DNS2" >> $CONF_FILE
551
	echo "DNS2=$DNS2" >> $CONF_FILE
553
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
552
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
554
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
553
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
555
	echo "DHCP=on" >> $CONF_FILE
554
	echo "DHCP=on" >> $CONF_FILE
556
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
555
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
557
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
556
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
558
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
557
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
559
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
558
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
560
	echo "INT_DNS_IP=none" >> $CONF_FILE
559
	echo "INT_DNS_IP=none" >> $CONF_FILE
561
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
560
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
562
# network default
561
# network default
563
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
562
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
564
	cat <<EOF > /etc/sysconfig/network
563
	cat <<EOF > /etc/sysconfig/network
565
NETWORKING=yes
564
NETWORKING=yes
566
FORWARD_IPV4=true
565
FORWARD_IPV4=true
567
EOF
566
EOF
568
# /etc/hosts config
567
# /etc/hosts config
569
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
568
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
570
	cat <<EOF > /etc/hosts
569
	cat <<EOF > /etc/hosts
571
127.0.0.1	localhost
570
127.0.0.1	localhost
572
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME
571
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME
573
EOF
572
EOF
574
# EXTIF (Internet) config
573
# EXTIF (Internet) config
575
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
574
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
576
	if [ $IP_SETTING == "dhcp" ]
575
	if [ $IP_SETTING == "dhcp" ]
577
		then
576
		then
578
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
577
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
579
DEVICE=$EXTIF
578
DEVICE=$EXTIF
580
BOOTPROTO=dhcp
579
BOOTPROTO=dhcp
581
DNS1=127.0.0.1
580
DNS1=127.0.0.1
582
PEERDNS=no
581
PEERDNS=no
583
RESOLV_MODS=yes
582
RESOLV_MODS=yes
584
ONBOOT=yes
583
ONBOOT=yes
585
NOZEROCONF=yes
584
NOZEROCONF=yes
586
METRIC=10
585
METRIC=10
587
MII_NOT_SUPPORTED=yes
586
MII_NOT_SUPPORTED=yes
588
IPV6INIT=no
587
IPV6INIT=no
589
IPV6TO4INIT=no
588
IPV6TO4INIT=no
590
ACCOUNTING=no
589
ACCOUNTING=no
591
USERCTL=no
590
USERCTL=no
592
MTU=$MTU
591
MTU=$MTU
593
EOF
592
EOF
594
		else	
593
		else	
595
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
594
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
596
DEVICE=$EXTIF
595
DEVICE=$EXTIF
597
BOOTPROTO=static
596
BOOTPROTO=static
598
IPADDR=$PUBLIC_IP
597
IPADDR=$PUBLIC_IP
599
NETMASK=$PUBLIC_NETMASK
598
NETMASK=$PUBLIC_NETMASK
600
GATEWAY=$PUBLIC_GATEWAY
599
GATEWAY=$PUBLIC_GATEWAY
601
DNS1=127.0.0.1
600
DNS1=127.0.0.1
602
RESOLV_MODS=yes
601
RESOLV_MODS=yes
603
ONBOOT=yes
602
ONBOOT=yes
604
METRIC=10
603
METRIC=10
605
NOZEROCONF=yes
604
NOZEROCONF=yes
606
MII_NOT_SUPPORTED=yes
605
MII_NOT_SUPPORTED=yes
607
IPV6INIT=no
606
IPV6INIT=no
608
IPV6TO4INIT=no
607
IPV6TO4INIT=no
609
ACCOUNTING=no
608
ACCOUNTING=no
610
USERCTL=no
609
USERCTL=no
611
MTU=$MTU
610
MTU=$MTU
612
EOF
611
EOF
613
	fi
612
	fi
614
# Config INTIF (consultation LAN) in normal mode
613
# Config INTIF (consultation LAN) in normal mode
615
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
614
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
616
DEVICE=$INTIF
615
DEVICE=$INTIF
617
BOOTPROTO=static
616
BOOTPROTO=static
618
ONBOOT=yes
617
ONBOOT=yes
619
NOZEROCONF=yes
618
NOZEROCONF=yes
620
MII_NOT_SUPPORTED=yes
619
MII_NOT_SUPPORTED=yes
621
IPV6INIT=no
620
IPV6INIT=no
622
IPV6TO4INIT=no
621
IPV6TO4INIT=no
623
ACCOUNTING=no
622
ACCOUNTING=no
624
USERCTL=no
623
USERCTL=no
625
EOF
624
EOF
626
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
625
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
627
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
626
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
628
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
627
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
629
DEVICE=$INTIF
628
DEVICE=$INTIF
630
BOOTPROTO=static
629
BOOTPROTO=static
631
IPADDR=$PRIVATE_IP
630
IPADDR=$PRIVATE_IP
632
NETMASK=$PRIVATE_NETMASK
631
NETMASK=$PRIVATE_NETMASK
633
ONBOOT=yes
632
ONBOOT=yes
634
METRIC=10
633
METRIC=10
635
NOZEROCONF=yes
634
NOZEROCONF=yes
636
MII_NOT_SUPPORTED=yes
635
MII_NOT_SUPPORTED=yes
637
IPV6INIT=no
636
IPV6INIT=no
638
IPV6TO4INIT=no
637
IPV6TO4INIT=no
639
ACCOUNTING=no
638
ACCOUNTING=no
640
USERCTL=no
639
USERCTL=no
641
EOF
640
EOF
642
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
641
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
643
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
642
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
644
	then
643
	then
645
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
644
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
646
DEVICE=$WIFIF
645
DEVICE=$WIFIF
647
BOOTPROTO=static
646
BOOTPROTO=static
648
ONBOOT=yes
647
ONBOOT=yes
649
NOZEROCONF=yes
648
NOZEROCONF=yes
650
MII_NOT_SUPPORTED=yes
649
MII_NOT_SUPPORTED=yes
651
IPV6INIT=no
650
IPV6INIT=no
652
IPV6TO4INIT=no
651
IPV6TO4INIT=no
653
ACCOUNTING=no
652
ACCOUNTING=no
654
USERCTL=no
653
USERCTL=no
655
EOF
654
EOF
656
	elif [ -n "$LANIF" ]
655
	elif [ -n "$LANIF" ]
657
	then
656
	then
658
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
657
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
659
DEVICE=$LANIF
658
DEVICE=$LANIF
660
BOOTPROTO=static
659
BOOTPROTO=static
661
ONBOOT=yes
660
ONBOOT=yes
662
NOZEROCONF=yes
661
NOZEROCONF=yes
663
MII_NOT_SUPPORTED=yes
662
MII_NOT_SUPPORTED=yes
664
IPV6INIT=no
663
IPV6INIT=no
665
IPV6TO4INIT=no
664
IPV6TO4INIT=no
666
ACCOUNTING=no
665
ACCOUNTING=no
667
USERCTL=no
666
USERCTL=no
668
EOF
667
EOF
669
	fi
668
	fi
670
	#########################################################################################################	
669
	#########################################################################################################	
671
# Renseignement des fichiers hosts.allow et hosts.deny
670
# Renseignement des fichiers hosts.allow et hosts.deny
672
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
671
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
673
	cat <<EOF > /etc/hosts.allow
672
	cat <<EOF > /etc/hosts.allow
674
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
673
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
675
sshd: ALL
674
sshd: ALL
676
ntpd: $PRIVATE_NETWORK_SHORT
675
ntpd: $PRIVATE_NETWORK_SHORT
677
EOF
676
EOF
678
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
677
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
679
	cat <<EOF > /etc/hosts.deny
678
	cat <<EOF > /etc/hosts.deny
680
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
679
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
681
EOF
680
EOF
682
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
681
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
683
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
682
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
684
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
683
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
685
# load conntrack ftp module
684
# load conntrack ftp module
686
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
685
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
687
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
686
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
688
# load ipt_NETFLOW module
687
# load ipt_NETFLOW module
689
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
688
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
690
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
689
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
691
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
690
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
692
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
691
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
693
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
692
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
694
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
693
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
695
# 
694
# 
696
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
695
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
697
} # End of network ()
696
} # End of network ()
698
 
697
 
699
##################################################################
698
##################################################################
700
##			Function "ACC"				##
699
##			Function "ACC"				##
701
## - installation of then ALCASAR Control Center (ACC)	)	##
700
## - installation of then ALCASAR Control Center (ACC)	)	##
702
## - configuration of the web server (Apache)			##
701
## - configuration of the web server (Apache)			##
703
## - creation of the first ACC admin account 			##
702
## - creation of the first ACC admin account 			##
704
## - secure the access						##
703
## - secure the access						##
705
##################################################################
704
##################################################################
706
ACC ()
705
ACC ()
707
{
706
{
708
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
707
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
709
	mkdir $DIR_WEB
708
	mkdir $DIR_WEB
710
# Copy & adapt ACC files
709
# Copy & adapt ACC files
711
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
710
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
712
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
711
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
713
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
712
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
714
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
713
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
715
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
714
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
716
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
715
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
717
	chown -R apache:apache $DIR_WEB/*
716
	chown -R apache:apache $DIR_WEB/*
718
# copy & adapt "freeradius-web" files
717
# copy & adapt "freeradius-web" files
719
	cp -rf $DIR_CONF/freeradius-web/ /etc/
718
	cp -rf $DIR_CONF/freeradius-web/ /etc/
720
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
719
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
721
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
720
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
722
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
721
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
723
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
722
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
724
	cat <<EOF > /etc/freeradius-web/naslist.conf
723
	cat <<EOF > /etc/freeradius-web/naslist.conf
725
nas1_name: alcasar-$ORGANISME
724
nas1_name: alcasar-$ORGANISME
726
nas1_model: Network Access Controler
725
nas1_model: Network Access Controler
727
nas1_ip: $PRIVATE_IP
726
nas1_ip: $PRIVATE_IP
728
nas1_port_num: 0
727
nas1_port_num: 0
729
nas1_community: public
728
nas1_community: public
730
EOF
729
EOF
731
	chown -R apache:apache /etc/freeradius-web/
730
	chown -R apache:apache /etc/freeradius-web/
732
# create the log & backup structure :
731
# create the log & backup structure :
733
# - base = users database
732
# - base = users database
734
# - archive = tarball of "base + http firewall + netflow"
733
# - archive = tarball of "base + http firewall + netflow"
735
# - security = watchdog log
734
# - security = watchdog log
736
	for i in base archive security activity_report;
735
	for i in base archive security activity_report;
737
	do
736
	do
738
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
737
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
739
	done
738
	done
740
	chown -R root:apache $DIR_SAVE
739
	chown -R root:apache $DIR_SAVE
741
# Configuring & securing php
740
# Configuring & securing php
742
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
741
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
743
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
742
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
744
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
743
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
745
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
744
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
746
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
745
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
747
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
746
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
748
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
747
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
749
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
748
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
750
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
749
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
751
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
750
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
752
# Configuring & sécuring Apache
751
# Configuring & sécuring Apache
753
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
752
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
754
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
753
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
755
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
754
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
756
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
755
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
757
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
756
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
758
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
757
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
759
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
758
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
760
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
759
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
761
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
760
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
762
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
761
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
763
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
762
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
764
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
763
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
765
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
764
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
766
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
765
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
767
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
766
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
768
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
767
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
769
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
768
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
770
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
769
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
771
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
770
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
772
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
771
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
773
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
772
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
774
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
773
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
775
# Error page management
774
# Error page management
776
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
775
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
777
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
776
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
778
Alias /error/ "/var/www/html/"
777
Alias /error/ "/var/www/html/"
779
<Directory "/usr/share/httpd/error">
778
<Directory "/usr/share/httpd/error">
780
    AllowOverride None
779
    AllowOverride None
781
    Options IncludesNoExec
780
    Options IncludesNoExec
782
    AddOutputFilter Includes html
781
    AddOutputFilter Includes html
783
    AddHandler type-map var
782
    AddHandler type-map var
784
    Require all granted
783
    Require all granted
785
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
784
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
786
    ForceLanguagePriority Prefer Fallback
785
    ForceLanguagePriority Prefer Fallback
787
</Directory>
786
</Directory>
788
ErrorDocument 400 /error/error.php?error=400
787
ErrorDocument 400 /error/error.php?error=400
789
ErrorDocument 401 /error/error.php?error=401
788
ErrorDocument 401 /error/error.php?error=401
790
ErrorDocument 403 /error/error.php?error=403
789
ErrorDocument 403 /error/error.php?error=403
791
ErrorDocument 404 /error/index.php
790
ErrorDocument 404 /error/index.php
792
ErrorDocument 405 /error/error.php?error=405
791
ErrorDocument 405 /error/error.php?error=405
793
ErrorDocument 408 /error/error.php?error=408
792
ErrorDocument 408 /error/error.php?error=408
794
ErrorDocument 410 /error/error.php?error=410
793
ErrorDocument 410 /error/error.php?error=410
795
ErrorDocument 411 /error/error.php?error=411
794
ErrorDocument 411 /error/error.php?error=411
796
ErrorDocument 412 /error/error.php?error=412
795
ErrorDocument 412 /error/error.php?error=412
797
ErrorDocument 413 /error/error.php?error=413
796
ErrorDocument 413 /error/error.php?error=413
798
ErrorDocument 414 /error/error.php?error=414
797
ErrorDocument 414 /error/error.php?error=414
799
ErrorDocument 415 /error/error.php?error=415
798
ErrorDocument 415 /error/error.php?error=415
800
ErrorDocument 500 /error/error.php?error=500
799
ErrorDocument 500 /error/error.php?error=500
801
ErrorDocument 501 /error/error.php?error=501
800
ErrorDocument 501 /error/error.php?error=501
802
ErrorDocument 502 /error/error.php?error=502
801
ErrorDocument 502 /error/error.php?error=502
803
ErrorDocument 503 /error/error.php?error=503
802
ErrorDocument 503 /error/error.php?error=503
804
ErrorDocument 506 /error/error.php?error=506
803
ErrorDocument 506 /error/error.php?error=506
805
EOF
804
EOF
806
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
805
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
807
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
806
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
808
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
807
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
809
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
808
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
810
</body>
809
</body>
811
</html>
810
</html>
812
EOF
811
EOF
813
# Définition du premier compte lié au profil 'admin'
812
# Définition du premier compte lié au profil 'admin'
814
	if [ "$mode" = "install" ]
813
	if [ "$mode" = "install" ]
815
		then
814
		then
816
			header_install
815
			header_install
817
			admin_portal=!
816
			admin_portal=!
818
			PTN='^[a-zA-Z0-9-]*$'
817
			PTN='^[a-zA-Z0-9-]*$'
819
			until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
818
			until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
820
				do
819
				do
821
				header_install
820
				header_install
822
				if [ $Lang == "fr" ]
821
				if [ $Lang == "fr" ]
823
				then 
822
				then 
824
					echo ""
823
					echo ""
825
					echo "Définissez un premier compte d'administration d'ALCASAR :"
824
					echo "Définissez un premier compte d'administration d'ALCASAR :"
826
					echo
825
					echo
827
					echo -n "Nom : "
826
					echo -n "Nom : "
828
				else
827
				else
829
					echo ""
828
					echo ""
830
					echo "Define the first account allow to administrate ALCASAR :"
829
					echo "Define the first account allow to administrate ALCASAR :"
831
					echo
830
					echo
832
					echo -n "Account : "
831
					echo -n "Account : "
833
				fi
832
				fi
834
				read admin_portal
833
				read admin_portal
835
				if [ "$admin_portal" == "" ]
834
				if [ "$admin_portal" == "" ]
836
					then
835
					then
837
					admin_portal=!
836
					admin_portal=!
838
				fi
837
				fi
839
				done
838
				done
840
# Creation of keys file for the admin account ("admin")
839
# Creation of keys file for the admin account ("admin")
841
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
840
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
842
			mkdir -p $DIR_DEST_ETC/digest
841
			mkdir -p $DIR_DEST_ETC/digest
843
			chmod 755 $DIR_DEST_ETC/digest
842
			chmod 755 $DIR_DEST_ETC/digest
844
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
843
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
845
				do
844
				do
846
					/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin "ALCASAR Control Center (ACC)" $admin_portal
845
					/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin "ALCASAR Control Center (ACC)" $admin_portal
847
				done
846
				done
848
			$DIR_DEST_BIN/alcasar-profil.sh --list
847
			$DIR_DEST_BIN/alcasar-profil.sh --list
849
	fi
848
	fi
850
# ACC partitioning
849
# ACC partitioning
851
	rm -f /etc/httpd/conf/webapps.d/alcasar*
850
	rm -f /etc/httpd/conf/webapps.d/alcasar*
852
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
851
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
853
<Directory $DIR_WEB>
852
<Directory $DIR_WEB>
854
	AllowOverride None
853
	AllowOverride None
855
	Order deny,allow
854
	Order deny,allow
856
	Deny from all
855
	Deny from all
857
	Allow from 127.0.0.1
856
	Allow from 127.0.0.1
858
	Allow from $PRIVATE_NETWORK_MASK
857
	Allow from $PRIVATE_NETWORK_MASK
859
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
858
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
860
</Directory>
859
</Directory>
861
<Directory $DIR_WEB/certs>
860
<Directory $DIR_WEB/certs>
862
	AddType application/x-x509-ca-cert crt
861
	AddType application/x-x509-ca-cert crt
863
</Directory>
862
</Directory>
864
<Directory $DIR_ACC>
863
<Directory $DIR_ACC>
865
	SSLRequireSSL
864
	SSLRequireSSL
866
	AllowOverride None
865
	AllowOverride None
867
	Order deny,allow
866
	Order deny,allow
868
	Deny from all
867
	Deny from all
869
	Allow from 127.0.0.1
868
	Allow from 127.0.0.1
870
	Allow from $PRIVATE_NETWORK_MASK
869
	Allow from $PRIVATE_NETWORK_MASK
871
	require valid-user
870
	require valid-user
872
	AuthType digest
871
	AuthType digest
873
	AuthName "ALCASAR Control Center (ACC)" 
872
	AuthName "ALCASAR Control Center (ACC)" 
874
	AuthDigestDomain $HOSTNAME.$DOMAIN
873
	AuthDigestDomain $HOSTNAME.$DOMAIN
875
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
874
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
876
	AuthUserFile $DIR_DEST_ETC/digest/key_all
875
	AuthUserFile $DIR_DEST_ETC/digest/key_all
877
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
876
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
878
</Directory>
877
</Directory>
879
<Directory $DIR_ACC/admin>
878
<Directory $DIR_ACC/admin>
880
	SSLRequireSSL
879
	SSLRequireSSL
881
	AllowOverride None
880
	AllowOverride None
882
	Order deny,allow
881
	Order deny,allow
883
	Deny from all
882
	Deny from all
884
	Allow from 127.0.0.1
883
	Allow from 127.0.0.1
885
	Allow from $PRIVATE_NETWORK_MASK
884
	Allow from $PRIVATE_NETWORK_MASK
886
	require valid-user
885
	require valid-user
887
	AuthType digest
886
	AuthType digest
888
	AuthName "ALCASAR Control Center (ACC)" 
887
	AuthName "ALCASAR Control Center (ACC)" 
889
	AuthDigestDomain $HOSTNAME.$DOMAIN
888
	AuthDigestDomain $HOSTNAME.$DOMAIN
890
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
889
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
891
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
890
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
892
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
891
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
893
</Directory>
892
</Directory>
894
<Directory $DIR_ACC/manager>
893
<Directory $DIR_ACC/manager>
895
	SSLRequireSSL
894
	SSLRequireSSL
896
	AllowOverride None
895
	AllowOverride None
897
	Order deny,allow
896
	Order deny,allow
898
	Deny from all
897
	Deny from all
899
	Allow from 127.0.0.1
898
	Allow from 127.0.0.1
900
	Allow from $PRIVATE_NETWORK_MASK
899
	Allow from $PRIVATE_NETWORK_MASK
901
	require valid-user
900
	require valid-user
902
	AuthType digest
901
	AuthType digest
903
	AuthName "ALCASAR Control Center (ACC)" 
902
	AuthName "ALCASAR Control Center (ACC)" 
904
	AuthDigestDomain $HOSTNAME.$DOMAIN
903
	AuthDigestDomain $HOSTNAME.$DOMAIN
905
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
904
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
906
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
905
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
907
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
906
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
908
</Directory>
907
</Directory>
909
<Directory $DIR_ACC/backup>
908
<Directory $DIR_ACC/backup>
910
	SSLRequireSSL
909
	SSLRequireSSL
911
	AllowOverride None
910
	AllowOverride None
912
	Order deny,allow
911
	Order deny,allow
913
	Deny from all
912
	Deny from all
914
	Allow from 127.0.0.1
913
	Allow from 127.0.0.1
915
	Allow from $PRIVATE_NETWORK_MASK
914
	Allow from $PRIVATE_NETWORK_MASK
916
	require valid-user
915
	require valid-user
917
	AuthType digest
916
	AuthType digest
918
	AuthName "ALCASAR Control Center (ACC)" 
917
	AuthName "ALCASAR Control Center (ACC)" 
919
	AuthDigestDomain $HOSTNAME.$DOMAIN
918
	AuthDigestDomain $HOSTNAME.$DOMAIN
920
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
919
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
921
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
920
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
922
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
921
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
923
</Directory>
922
</Directory>
924
Alias /save/ "$DIR_SAVE/"
923
Alias /save/ "$DIR_SAVE/"
925
<Directory $DIR_SAVE>
924
<Directory $DIR_SAVE>
926
	SSLRequireSSL
925
	SSLRequireSSL
927
	Options Indexes
926
	Options Indexes
928
	Order deny,allow
927
	Order deny,allow
929
	Deny from all
928
	Deny from all
930
	Allow from 127.0.0.1
929
	Allow from 127.0.0.1
931
	Allow from $PRIVATE_NETWORK_MASK
930
	Allow from $PRIVATE_NETWORK_MASK
932
	require valid-user
931
	require valid-user
933
	AuthType digest
932
	AuthType digest
934
	AuthName "ALCASAR Control Center (ACC)" 
933
	AuthName "ALCASAR Control Center (ACC)" 
935
	AuthDigestDomain $HOSTNAME.$DOMAIN
934
	AuthDigestDomain $HOSTNAME.$DOMAIN
936
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
935
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
937
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
936
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
938
</Directory>
937
</Directory>
939
EOF
938
EOF
940
	# Launch after coova (in order to wait tun0 to be up)
939
	# Launch after coova (in order to wait tun0 to be up)
941
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
940
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
942
	# Log file for ACC access imputability
941
	# Log file for ACC access imputability
943
	[ -e /var/Save/security/acc_access.log ] || touch /var/Save/security/acc_access.log
942
	[ -e /var/Save/security/acc_access.log ] || touch /var/Save/security/acc_access.log
944
	chown root:apache /var/Save/security/acc_access.log
943
	chown root:apache /var/Save/security/acc_access.log
945
	chmod 664 /var/Save/security/acc_access.log
944
	chmod 664 /var/Save/security/acc_access.log
946
} # End of ACC ()
945
} # End of ACC ()
947
 
946
 
948
##########################################################################
947
##########################################################################
949
##				Fonction "CA"				##
948
##				Fonction "CA"				##
950
## - Creating the CA and the server certificate (apache)	 	##
949
## - Creating the CA and the server certificate (apache)	 	##
951
##########################################################################
950
##########################################################################
952
CA ()
951
CA ()
953
{
952
{
954
	$DIR_DEST_BIN/alcasar-CA.sh
953
	$DIR_DEST_BIN/alcasar-CA.sh
955
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
954
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
956
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
955
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
957
	cat <<EOF > $FIC_VIRTUAL_SSL
956
	cat <<EOF > $FIC_VIRTUAL_SSL
958
# default SSL virtual host, used for all HTTPS requests that do not
957
# default SSL virtual host, used for all HTTPS requests that do not
959
# match a ServerName or ServerAlias in any <VirtualHost> block.
958
# match a ServerName or ServerAlias in any <VirtualHost> block.
960
 
959
 
961
<VirtualHost _default_:443>
960
<VirtualHost _default_:443>
962
# general configuration
961
# general configuration
963
    ServerAdmin root@localhost
962
    ServerAdmin root@localhost
964
    ServerName $HOSTNAME.$DOMAIN
963
    ServerName $HOSTNAME.$DOMAIN
965
 
964
 
966
# SSL configuration
965
# SSL configuration
967
    SSLEngine on
966
    SSLEngine on
968
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
967
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
969
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
968
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
970
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
969
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
971
    CustomLog logs/ssl_request_log \
970
    CustomLog logs/ssl_request_log \
972
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
971
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
973
    ErrorLog logs/ssl_error_log
972
    ErrorLog logs/ssl_error_log
974
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
973
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
975
</VirtualHost>
974
</VirtualHost>
976
EOF
975
EOF
977
	chown -R root:apache /etc/pki
976
	chown -R root:apache /etc/pki
978
	chmod -R 750 /etc/pki
977
	chmod -R 750 /etc/pki
979
} # End of CA ()
978
} # End of CA ()
980
 
979
 
981
##################################################################
980
##################################################################
982
##			Function "time_server"			##
981
##			Function "time_server"			##
983
## - Configuring NTP server					##
982
## - Configuring NTP server					##
984
##################################################################
983
##################################################################
985
time_server ()
984
time_server ()
986
{
985
{
987
# Set the Internet time server
986
# Set the Internet time server
988
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
987
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
989
	cat <<EOF > /etc/ntp/step-tickers
988
	cat <<EOF > /etc/ntp/step-tickers
990
0.fr.pool.ntp.org	# adapt to your country
989
0.fr.pool.ntp.org	# adapt to your country
991
1.fr.pool.ntp.org
990
1.fr.pool.ntp.org
992
2.fr.pool.ntp.org
991
2.fr.pool.ntp.org
993
EOF
992
EOF
994
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
993
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
995
	cat <<EOF > /etc/ntp.conf
994
	cat <<EOF > /etc/ntp.conf
996
server 0.fr.pool.ntp.org	# adapt to your country
995
server 0.fr.pool.ntp.org	# adapt to your country
997
server 1.fr.pool.ntp.org
996
server 1.fr.pool.ntp.org
998
server 2.fr.pool.ntp.org
997
server 2.fr.pool.ntp.org
999
server 127.127.1.0   		# local clock si NTP internet indisponible ...
998
server 127.127.1.0   		# local clock si NTP internet indisponible ...
1000
fudge 127.127.1.0 stratum 10
999
fudge 127.127.1.0 stratum 10
1001
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
1000
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
1002
restrict 127.0.0.1
1001
restrict 127.0.0.1
1003
driftfile /var/lib/ntp/drift
1002
driftfile /var/lib/ntp/drift
1004
logfile /var/log/ntp.log
1003
logfile /var/log/ntp.log
1005
disable monitor
1004
disable monitor
1006
EOF
1005
EOF
1007
	chown -R ntp:ntp /var/lib/ntp
1006
	chown -R ntp:ntp /var/lib/ntp
1008
# Synchronize now
1007
# Synchronize now
1009
	ntpd -q -g &
1008
	ntpd -q -g &
1010
} # End of time_server ()
1009
} # End of time_server ()
1011
 
1010
 
1012
##########################################################################################
1011
##########################################################################################
1013
##			Fonction "init_db"						##
1012
##			Fonction "init_db"						##
1014
## - Initialisation de la base Mysql							##
1013
## - Initialisation de la base Mysql							##
1015
## - Affectation du mot de passe de l'administrateur (root)				##
1014
## - Affectation du mot de passe de l'administrateur (root)				##
1016
## - Suppression des bases et des utilisateurs superflus				##
1015
## - Suppression des bases et des utilisateurs superflus				##
1017
## - Création de la base 'radius'							##
1016
## - Création de la base 'radius'							##
1018
## - Installation du schéma de cette base						##
1017
## - Installation du schéma de cette base						##
1019
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
1018
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
1020
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
1019
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
1021
##########################################################################################
1020
##########################################################################################
1022
init_db ()
1021
init_db ()
1023
{
1022
{
1024
	if [ `systemctl is-active mysqld` == "active" ]
1023
	if [ `systemctl is-active mysqld` == "active" ]
1025
	then
1024
	then
1026
		systemctl stop mysqld
1025
		systemctl stop mysqld
1027
	fi
1026
	fi
1028
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1027
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1029
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1028
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1030
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
1029
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
1031
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
1030
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
1032
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf
1031
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf
1033
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf  # accentuated user names are allowed
1032
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf  # accentuated user names are allowed
1034
	$SED "s?^plugin-load.*?#&?g" /etc/my.cnf.d/feedback.cnf # remove the feedback plugin (ALCASAR doesn't report anything !)
1033
	$SED "s?^plugin-load.*?#&?g" /etc/my.cnf.d/feedback.cnf # remove the feedback plugin (ALCASAR doesn't report anything !)
1035
	/usr/sbin/mysqld-prepare-db-dir > /dev/null 2>&1
1034
	/usr/sbin/mysqld-prepare-db-dir > /dev/null 2>&1
1036
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
1035
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
1037
	/usr/bin/systemctl start mysqld
1036
	/usr/bin/systemctl start mysqld
1038
	nb_round=1
1037
	nb_round=1
1039
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1038
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1040
	do
1039
	do
1041
		nb_round=`expr $nb_round + 1`
1040
		nb_round=`expr $nb_round + 1`
1042
		sleep 2
1041
		sleep 2
1043
	done
1042
	done
1044
	if [ ! -S /var/lib/mysql/mysql.sock ]
1043
	if [ ! -S /var/lib/mysql/mysql.sock ]
1045
	then
1044
	then
1046
		echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1045
		echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1047
		exit
1046
		exit
1048
	fi
1047
	fi
1049
	MYSQL="/usr/bin/mysql --execute"
1048
	MYSQL="/usr/bin/mysql --execute"
1050
# Secure the server
1049
# Secure the server
1051
	$MYSQL="GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$mysqlpwd';"
1050
	$MYSQL="GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$mysqlpwd';"
1052
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1051
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1053
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1052
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1054
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
1053
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
1055
# Create 'radius' database
1054
# Create 'radius' database
1056
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
1055
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
1057
# Add an empty radius database structure
1056
# Add an empty radius database structure
1058
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
1057
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
1059
# modify the start script in order to close accounting connexion when the system is comming down or up
1058
# modify the start script in order to close accounting connexion when the system is comming down or up
1060
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
1059
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
1061
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
1060
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
1062
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
1061
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
1063
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
1062
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
1064
	/usr/bin/systemctl daemon-reload
1063
	/usr/bin/systemctl daemon-reload
1065
} # End of init_db ()
1064
} # End of init_db ()
1066
 
1065
 
1067
###################################################################
1066
###################################################################
1068
##                       Function "freeradius"                   ##
1067
##                       Function "freeradius"                   ##
1069
## - Set the configuration files                                 ##
1068
## - Set the configuration files                                 ##
1070
## - Set the shared secret between coova-chilli and freeradius   ##
1069
## - Set the shared secret between coova-chilli and freeradius   ##
1071
## - Adapt the Mysql conf file and counters                      ##
1070
## - Adapt the Mysql conf file and counters                      ##
1072
###################################################################
1071
###################################################################
1073
freeradius ()
1072
freeradius ()
1074
{
1073
{
1075
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1074
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1076
	chown -R radius:radius /etc/raddb
1075
	chown -R radius:radius /etc/raddb
1077
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
1076
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
1078
# Set radius global parameters (radius.conf)
1077
# Set radius global parameters (radius.conf)
1079
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1078
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1080
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1079
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1081
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
1080
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
1082
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1081
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1083
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
1082
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
1084
 
1083
 
1085
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1084
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1086
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1085
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1087
	cat << EOF > /etc/raddb/clients.conf
1086
	cat << EOF > /etc/raddb/clients.conf
1088
client 127.0.0.1 {
1087
client 127.0.0.1 {
1089
	secret = $secretradius
1088
	secret = $secretradius
1090
	shortname = coova
1089
	shortname = coova
1091
}
1090
}
1092
EOF
1091
EOF
1093
# Set Virtual server (remvove all except "alcasar virtual site")
1092
# Set Virtual server (remvove all except "alcasar virtual site")
1094
	rm -f /etc/raddb/sites-enabled/*
1093
	rm -f /etc/raddb/sites-enabled/*
1095
    cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
1094
    cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
1096
	chown radius:apache /etc/raddb/sites-available/alcasar
1095
	chown radius:apache /etc/raddb/sites-available/alcasar
1097
	chmod 660 /etc/raddb/sites-available/alcasar
1096
	chmod 660 /etc/raddb/sites-available/alcasar
1098
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
1097
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
1099
# INFO : To connect from outside (EAP), add the EAP virtual server (link in sites-enabled) and inner-tunnel modules (link in mods-enabled) 
1098
# INFO : To connect from outside (EAP), add the EAP virtual server (link in sites-enabled) and inner-tunnel modules (link in mods-enabled) 
1100
 
1099
 
1101
# Set modules 
1100
# Set modules 
1102
# Set only usefull modules for ALCASAR (ldap is enabled only via ACC)
1101
# Set only usefull modules for ALCASAR (ldap is enabled only via ACC)
1103
    rm -rf  /etc/raddb/mods-enabled/*
1102
    rm -rf  /etc/raddb/mods-enabled/*
1104
    for mods in sql sqlcounter attr_filter expiration logintime pap 
1103
    for mods in sql sqlcounter attr_filter expiration logintime pap 
1105
        do
1104
        do
1106
        ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1105
        ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1107
        done
1106
        done
1108
# Configure SQL mod
1107
# Configure SQL mod
1109
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
1108
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
1110
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1109
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1111
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
1110
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
1112
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
1111
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
1113
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1112
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1114
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1113
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1115
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1114
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1116
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
1115
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
1117
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc. 
1116
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc. 
1118
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1117
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1119
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1118
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1120
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
1119
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
1121
# sqlcounter modifications
1120
# sqlcounter modifications
1122
	[ -e /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default
1121
	[ -e /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default
1123
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf
1122
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf
1124
query = "\
1123
query = "\
1125
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)),0)) \
1124
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)),0)) \
1126
    FROM radacct \
1125
    FROM radacct \
1127
    WHERE username = '%{\${key}}' \
1126
    WHERE username = '%{\${key}}' \
1128
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1127
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1129
EOF
1128
EOF
1130
	[ -e /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default
1129
	[ -e /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default
1131
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf
1130
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf
1132
query = "\
1131
query = "\
1133
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)), 0)) \
1132
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)), 0)) \
1134
    FROM radacct \
1133
    FROM radacct \
1135
    WHERE username='%{\${key}}' \
1134
    WHERE username='%{\${key}}' \
1136
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1135
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1137
EOF
1136
EOF
1138
	[ -e /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default
1137
	[ -e /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default
1139
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf
1138
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf
1140
# This is the query modified for ALCASAR needs (thanks to Daniel Laliberte --> authorized period after the first connection)
1139
# This is the query modified for ALCASAR needs (thanks to Daniel Laliberte --> authorized period after the first connection)
1141
query = "\
1140
query = "\
1142
    SELECT IFNULL((SELECT TIME_TO_SEC(TIMEDIFF(NOW(), acctstarttime)) \
1141
    SELECT IFNULL((SELECT TIME_TO_SEC(TIMEDIFF(NOW(), acctstarttime)) \
1143
    FROM radacct \
1142
    FROM radacct \
1144
    WHERE UserName='%{\${key}}' \
1143
    WHERE UserName='%{\${key}}' \
1145
    ORDER BY acctstarttime \
1144
    ORDER BY acctstarttime \
1146
    LIMIT 1),0)"
1145
    LIMIT 1),0)"
1147
EOF
1146
EOF
1148
# make certain that mysql is up before freeradius start
1147
# make certain that mysql is up before freeradius start
1149
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
1148
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
1150
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
1149
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
1151
	/usr/bin/systemctl daemon-reload
1150
	/usr/bin/systemctl daemon-reload
1152
 # Allow apache to change some conf files (ie : ldap on/off)
1151
 # Allow apache to change some conf files (ie : ldap on/off)
1153
 chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
1152
 chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
1154
	
1153
	
1155
} # End freeradius ()
1154
} # End freeradius ()
1156
 
1155
 
1157
#############################################################################
1156
#############################################################################
1158
##                              Fonction "chilli"                          ##
1157
##                              Fonction "chilli"                          ##
1159
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1158
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1160
## - Adapt the authentication web page (intercept.php)                     ##
1159
## - Adapt the authentication web page (intercept.php)                     ##
1161
#############################################################################
1160
#############################################################################
1162
chilli ()
1161
chilli ()
1163
{
1162
{
1164
# chilli unit for systemd
1163
# chilli unit for systemd
1165
	cat << EOF > /lib/systemd/system/chilli.service
1164
	cat << EOF > /lib/systemd/system/chilli.service
1166
#  This file is part of systemd.
1165
#  This file is part of systemd.
1167
#
1166
#
1168
#  systemd is free software; you can redistribute it and/or modify it
1167
#  systemd is free software; you can redistribute it and/or modify it
1169
#  under the terms of the GNU General Public License as published by
1168
#  under the terms of the GNU General Public License as published by
1170
#  the Free Software Foundation; either version 2 of the License, or
1169
#  the Free Software Foundation; either version 2 of the License, or
1171
#  (at your option) any later version.
1170
#  (at your option) any later version.
1172
[Unit]
1171
[Unit]
1173
Description=chilli is a captive portal daemon
1172
Description=chilli is a captive portal daemon
1174
After=network.target
1173
After=network.target
1175
 
1174
 
1176
[Service]
1175
[Service]
1177
Type=forking
1176
Type=forking
1178
ExecStart=/usr/libexec/chilli start
1177
ExecStart=/usr/libexec/chilli start
1179
ExecStop=/usr/libexec/chilli stop
1178
ExecStop=/usr/libexec/chilli stop
1180
ExecReload=/usr/libexec/chilli reload
1179
ExecReload=/usr/libexec/chilli reload
1181
PIDFile=/var/run/chilli.pid
1180
PIDFile=/var/run/chilli.pid
1182
 
1181
 
1183
[Install]
1182
[Install]
1184
WantedBy=multi-user.target
1183
WantedBy=multi-user.target
1185
EOF
1184
EOF
1186
# init file creation
1185
# init file creation
1187
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1186
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1188
	cat <<EOF > /etc/init.d/chilli
1187
	cat <<EOF > /etc/init.d/chilli
1189
#!/bin/sh
1188
#!/bin/sh
1190
#
1189
#
1191
# chilli CoovaChilli init
1190
# chilli CoovaChilli init
1192
#
1191
#
1193
# chkconfig: 2345 65 35
1192
# chkconfig: 2345 65 35
1194
# description: CoovaChilli
1193
# description: CoovaChilli
1195
### BEGIN INIT INFO
1194
### BEGIN INIT INFO
1196
# Provides:       chilli
1195
# Provides:       chilli
1197
# Required-Start: network 
1196
# Required-Start: network 
1198
# Should-Start: 
1197
# Should-Start: 
1199
# Required-Stop:  network
1198
# Required-Stop:  network
1200
# Should-Stop: 
1199
# Should-Stop: 
1201
# Default-Start:  2 3 5
1200
# Default-Start:  2 3 5
1202
# Default-Stop:
1201
# Default-Stop:
1203
# Description:    CoovaChilli access controller
1202
# Description:    CoovaChilli access controller
1204
### END INIT INFO
1203
### END INIT INFO
1205
 
1204
 
1206
[ -f /usr/sbin/chilli ] || exit 0
1205
[ -f /usr/sbin/chilli ] || exit 0
1207
. /etc/init.d/functions
1206
. /etc/init.d/functions
1208
CONFIG=/etc/chilli.conf
1207
CONFIG=/etc/chilli.conf
1209
pidfile=/var/run/chilli.pid
1208
pidfile=/var/run/chilli.pid
1210
[ -f \$CONFIG ] || {
1209
[ -f \$CONFIG ] || {
1211
	echo "\$CONFIG Not found"
1210
	echo "\$CONFIG Not found"
1212
	exit 0
1211
	exit 0
1213
}
1212
}
1214
current_users_file="/var/tmp/havp/current_users.txt"	# file containing active users
1213
current_users_file="/var/tmp/havp/current_users.txt"	# file containing active users
1215
RETVAL=0
1214
RETVAL=0
1216
prog="chilli"
1215
prog="chilli"
1217
case \$1 in
1216
case \$1 in
1218
	start)
1217
	start)
1219
		if [ -f \$pidfile ] ; then 
1218
		if [ -f \$pidfile ] ; then 
1220
			gprintf "chilli is already running"
1219
			gprintf "chilli is already running"
1221
		else
1220
		else
1222
			gprintf "Starting \$prog: "
1221
			gprintf "Starting \$prog: "
1223
			echo '' > \$current_users_file && chown apache:apache \$current_users_file
1222
			echo '' > \$current_users_file && chown apache:apache \$current_users_file
1224
			rm -f /var/run/chilli* # cleaning
1223
			rm -f /var/run/chilli* # cleaning
1225
			/usr/sbin/modprobe tun >/dev/null 2>&1
1224
			/usr/sbin/modprobe tun >/dev/null 2>&1
1226
			echo 1 > /proc/sys/net/ipv4/ip_forward
1225
			echo 1 > /proc/sys/net/ipv4/ip_forward
1227
			[ -e /dev/net/tun ] || {
1226
			[ -e /dev/net/tun ] || {
1228
				(cd /dev; 
1227
				(cd /dev; 
1229
				mkdir net; 
1228
				mkdir net; 
1230
				cd net; 
1229
				cd net; 
1231
				mknod tun c 10 200)
1230
				mknod tun c 10 200)
1232
			}
1231
			}
1233
			ifconfig $INTIF 0.0.0.0
1232
			ifconfig $INTIF 0.0.0.0
1234
			/usr/sbin/ethtool -K $INTIF gro off
1233
			/usr/sbin/ethtool -K $INTIF gro off
1235
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1234
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1236
			RETVAL=\$?
1235
			RETVAL=\$?
1237
		fi
1236
		fi
1238
		;;
1237
		;;
1239
 
1238
 
1240
	reload)
1239
	reload)
1241
		killall -HUP chilli
1240
		killall -HUP chilli
1242
		;;
1241
		;;
1243
 
1242
 
1244
	restart)
1243
	restart)
1245
		\$0 stop
1244
		\$0 stop
1246
		sleep 2
1245
		sleep 2
1247
		\$0 start
1246
		\$0 start
1248
		;;
1247
		;;
1249
 
1248
 
1250
	status)
1249
	status)
1251
		status chilli
1250
		status chilli
1252
		RETVAL=0
1251
		RETVAL=0
1253
		;;
1252
		;;
1254
 
1253
 
1255
	stop)
1254
	stop)
1256
		if [ -f \$pidfile ] ; then  
1255
		if [ -f \$pidfile ] ; then  
1257
			gprintf "Shutting down \$prog: "
1256
			gprintf "Shutting down \$prog: "
1258
			killproc /usr/sbin/chilli
1257
			killproc /usr/sbin/chilli
1259
			RETVAL=\$?
1258
			RETVAL=\$?
1260
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1259
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1261
			[ -e \$current_users_file ] && rm -f \$current_users_file
1260
			[ -e \$current_users_file ] && rm -f \$current_users_file
1262
		else	
1261
		else	
1263
			gprintf "chilli is not running"
1262
			gprintf "chilli is not running"
1264
		fi
1263
		fi
1265
		;;
1264
		;;
1266
 
1265
 
1267
	*)
1266
	*)
1268
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1267
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1269
		exit 1
1268
		exit 1
1270
esac
1269
esac
1271
echo
1270
echo
1272
EOF
1271
EOF
1273
	chmod a+x /etc/init.d/chilli
1272
	chmod a+x /etc/init.d/chilli
1274
	ln -s /etc/init.d/chilli /usr/libexec/chilli
1273
	ln -s /etc/init.d/chilli /usr/libexec/chilli
1275
# conf file creation
1274
# conf file creation
1276
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1275
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1277
	#NTP Option configuration for DHCP
1276
	#NTP Option configuration for DHCP
1278
	#DHCP Options : rfc2132
1277
	#DHCP Options : rfc2132
1279
		#dhcp option value will be convert in hexa.
1278
		#dhcp option value will be convert in hexa.
1280
		#NTP option (or 'option 42') is like :
1279
		#NTP option (or 'option 42') is like :
1281
		#			
1280
		#			
1282
		#    Code   Len         Address 1               Address 2
1281
		#    Code   Len         Address 1               Address 2
1283
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1282
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1284
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1283
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1285
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1284
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1286
		#
1285
		#
1287
		#Code : 42 => 2a
1286
		#Code : 42 => 2a
1288
		#Len : 4 => 04
1287
		#Len : 4 => 04
1289
	PRIVATE_IP_HEXA=$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f1))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f2))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f3))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f4))
1288
	PRIVATE_IP_HEXA=$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f1))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f2))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f3))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f4))
1290
	cat <<EOF > /etc/chilli.conf
1289
	cat <<EOF > /etc/chilli.conf
1291
# coova config for ALCASAR
1290
# coova config for ALCASAR
1292
cmdsocket	/var/run/chilli.sock
1291
cmdsocket	/var/run/chilli.sock
1293
unixipc		chilli.$INTIF.ipc
1292
unixipc		chilli.$INTIF.ipc
1294
pidfile		/var/run/chilli.pid
1293
pidfile		/var/run/chilli.pid
1295
net		$PRIVATE_NETWORK_MASK
1294
net		$PRIVATE_NETWORK_MASK
1296
dhcpif		$INTIF
1295
dhcpif		$INTIF
1297
ethers		$DIR_DEST_ETC/alcasar-ethers
1296
ethers		$DIR_DEST_ETC/alcasar-ethers
1298
#nodynip
1297
#nodynip
1299
#statip
1298
#statip
1300
dynip		$PRIVATE_NETWORK_MASK
1299
dynip		$PRIVATE_NETWORK_MASK
1301
domain		$DOMAIN
1300
domain		$DOMAIN
1302
dns1		$PRIVATE_IP
1301
dns1		$PRIVATE_IP
1303
dns2		$PRIVATE_IP
1302
dns2		$PRIVATE_IP
1304
uamlisten	$PRIVATE_IP
1303
uamlisten	$PRIVATE_IP
1305
uamport		3990
1304
uamport		3990
1306
uamuiport	3991
1305
uamuiport	3991
1307
macauth
1306
macauth
1308
macpasswd	password
1307
macpasswd	password
1309
strictmacauth
1308
strictmacauth
1310
locationname	$HOSTNAME.$DOMAIN
1309
locationname	$HOSTNAME.$DOMAIN
1311
radiusserver1	127.0.0.1
1310
radiusserver1	127.0.0.1
1312
radiusserver2	127.0.0.1
1311
radiusserver2	127.0.0.1
1313
radiussecret	$secretradius
1312
radiussecret	$secretradius
1314
radiusauthport	1812
1313
radiusauthport	1812
1315
radiusacctport	1813
1314
radiusacctport	1813
1316
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1315
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1317
redirurl
1316
redirurl
1318
radiusnasid	$HOSTNAME.$DOMAIN
1317
radiusnasid	$HOSTNAME.$DOMAIN
1319
uamsecret	$secretuam
1318
uamsecret	$secretuam
1320
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1319
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1321
coaport		3799
1320
coaport		3799
1322
conup		$DIR_DEST_BIN/alcasar-conup.sh
1321
conup		$DIR_DEST_BIN/alcasar-conup.sh
1323
condown		$DIR_DEST_BIN/alcasar-condown.sh
1322
condown		$DIR_DEST_BIN/alcasar-condown.sh
1324
include		$DIR_DEST_ETC/alcasar-uamallowed
1323
include		$DIR_DEST_ETC/alcasar-uamallowed
1325
include		$DIR_DEST_ETC/alcasar-uamdomain
1324
include		$DIR_DEST_ETC/alcasar-uamdomain
1326
dhcpopt		2a04$PRIVATE_IP_HEXA
1325
dhcpopt		2a04$PRIVATE_IP_HEXA
1327
#dhcpgateway		none
1326
#dhcpgateway		none
1328
#dhcprelayagent		none
1327
#dhcprelayagent		none
1329
#dhcpgatewayport	none
1328
#dhcpgatewayport	none
1330
sslkeyfile	/etc/pki/tls/private/alcasar.key
1329
sslkeyfile	/etc/pki/tls/private/alcasar.key
1331
sslcertfile	/etc/pki/tls/certs/alcasar.crt
1330
sslcertfile	/etc/pki/tls/certs/alcasar.crt
1332
redirssl
1331
redirssl
1333
uamuissl
1332
uamuissl
1334
EOF
1333
EOF
1335
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
1334
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
1336
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1335
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1337
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
1336
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
1338
# create files for trusted domains and urls
1337
# create files for trusted domains and urls
1339
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1338
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1340
	chown root:apache $DIR_DEST_ETC/alcasar-*
1339
	chown root:apache $DIR_DEST_ETC/alcasar-*
1341
	chmod 660 $DIR_DEST_ETC/alcasar-*
1340
	chmod 660 $DIR_DEST_ETC/alcasar-*
1342
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1341
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1343
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1342
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1344
# user 'chilli' creation (in order to run conup/off and up/down scripts
1343
# user 'chilli' creation (in order to run conup/off and up/down scripts
1345
	chilli_exist=`grep -c ^chilli: /etc/passwd`
1344
	chilli_exist=`grep -c ^chilli: /etc/passwd`
1346
	if [ "$chilli_exist" == "1" ]
1345
	if [ "$chilli_exist" == "1" ]
1347
	then
1346
	then
1348
	      userdel -r chilli 2>/dev/null
1347
	      userdel -r chilli 2>/dev/null
1349
	fi
1348
	fi
1350
	groupadd -f chilli
1349
	groupadd -f chilli
1351
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1350
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1352
}  # End of chilli ()
1351
}  # End of chilli ()
1353
 
1352
 
1354
##################################################################
1353
##################################################################
1355
##		Fonction "dansguardian"				##
1354
##		Fonction "dansguardian"				##
1356
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1355
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1357
##################################################################
1356
##################################################################
1358
dansguardian ()
1357
dansguardian ()
1359
{
1358
{
1360
	mkdir -p /var/dansguardian /var/log/dansguardian
1359
	mkdir -p /var/dansguardian /var/log/dansguardian
1361
	chown -R dansguardian /var/dansguardian /var/log/dansguardian
1360
	chown -R dansguardian /var/dansguardian /var/log/dansguardian
1362
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1361
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1363
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1362
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1364
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1363
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1365
# By default the filter is off 
1364
# By default the filter is off 
1366
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1365
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1367
# French deny HTML page
1366
# French deny HTML page
1368
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1367
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1369
# Listen only on LAN side
1368
# Listen only on LAN side
1370
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1369
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1371
# DG send its flow to HAVP
1370
# DG send its flow to HAVP
1372
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1371
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1373
# replace the default deny HTML page
1372
# replace the default deny HTML page
1374
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1373
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1375
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1374
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1376
# Don't log
1375
# Don't log
1377
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1376
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1378
# on désactive par défaut le controle de contenu des pages html
1377
# on désactive par défaut le controle de contenu des pages html
1379
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1378
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1380
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1379
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1381
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1380
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1382
# on désactive par défaut le contrôle d'URL par expressions régulières
1381
# on désactive par défaut le contrôle d'URL par expressions régulières
1383
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1382
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1384
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1383
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1385
 
1384
 
1386
# Configure Dansguardian for large site
1385
# Configure Dansguardian for large site
1387
# Minimum number of processus to handle connections
1386
# Minimum number of processus to handle connections
1388
	$SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1387
	$SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1389
# Maximum number of processus to handle connections
1388
# Maximum number of processus to handle connections
1390
	$SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1389
	$SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1391
# Run at least 8 daemons
1390
# Run at least 8 daemons
1392
	$SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1391
	$SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1393
# minimum number of processes to spawn
1392
# minimum number of processes to spawn
1394
	$SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1393
	$SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1395
# maximum age of a child process before it croaks it
1394
# maximum age of a child process before it croaks it
1396
	$SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
1395
	$SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
1397
	
1396
	
1398
# on désactive par défaut le contrôle de téléchargement de fichiers
1397
# on désactive par défaut le contrôle de téléchargement de fichiers
1399
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1398
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1400
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1399
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1401
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1400
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1402
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1401
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1403
	touch $DIR_DG/lists/bannedextensionlist
1402
	touch $DIR_DG/lists/bannedextensionlist
1404
	touch $DIR_DG/lists/bannedmimetypelist
1403
	touch $DIR_DG/lists/bannedmimetypelist
1405
# 'Safesearch' regex actualisation
1404
# 'Safesearch' regex actualisation
1406
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1405
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1407
# empty LAN IP list that won't be WEB filtered
1406
# empty LAN IP list that won't be WEB filtered
1408
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1407
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1409
	touch $DIR_DG/lists/exceptioniplist
1408
	touch $DIR_DG/lists/exceptioniplist
1410
# Keep a copy of URL & domain filter configuration files
1409
# Keep a copy of URL & domain filter configuration files
1411
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1410
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1412
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1411
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1413
} # End of dansguardian ()
1412
} # End of dansguardian ()
1414
 
1413
 
1415
##################################################################
1414
##################################################################
1416
##			Fonction "antivirus"			##
1415
##			Fonction "antivirus"			##
1417
## - configuration of havp, libclamav and freshclam		##
1416
## - configuration of havp, libclamav and freshclam		##
1418
##################################################################
1417
##################################################################
1419
antivirus ()		
1418
antivirus ()		
1420
{
1419
{
1421
# create 'havp' user
1420
# create 'havp' user
1422
	havp_exist=`grep -c ^havp: /etc/passwd`
1421
	havp_exist=`grep -c ^havp: /etc/passwd`
1423
	if [ "$havp_exist" == "1" ]
1422
	if [ "$havp_exist" == "1" ]
1424
	then
1423
	then
1425
	      userdel -r havp 2>/dev/null
1424
	      userdel -r havp 2>/dev/null
1426
	      groupdel havp 2>/dev/null
1425
	      groupdel havp 2>/dev/null
1427
	fi
1426
	fi
1428
	groupadd -f havp
1427
	groupadd -f havp
1429
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1428
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1430
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp /var/log/clamav /var/lib/clamav
1429
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp /var/log/clamav /var/lib/clamav
1431
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1430
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1432
	chown -R clamav:clamav /var/log/clamav /var/lib/clamav
1431
	chown -R clamav:clamav /var/log/clamav /var/lib/clamav
1433
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1432
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1434
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1433
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1435
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1434
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1436
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1435
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1437
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1436
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1438
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1437
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1439
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1438
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1440
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1439
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1441
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1440
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1442
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1441
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1443
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1442
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1444
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1443
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1445
# skip checking of youtube flow (too heavy load / risk too low)
1444
# skip checking of youtube flow (too heavy load / risk too low)
1446
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1445
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1447
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1446
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1448
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1447
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1449
# adapt init script and systemd unit
1448
# adapt init script and systemd unit
1450
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1449
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1451
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1450
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1452
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1451
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1453
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1452
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1454
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1453
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1455
# replace of the intercept page (template)
1454
# replace of the intercept page (template)
1456
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1455
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1457
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1456
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1458
# update virus database every 4 hours (24h/6)
1457
# update virus database every 4 hours (24h/6)
1459
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1458
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1460
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1459
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1461
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1460
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1462
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1461
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1463
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1462
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1464
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1463
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1465
# update now
1464
# update now
1466
	/usr/bin/freshclam --no-warnings
1465
	/usr/bin/freshclam --no-warnings
1467
} # End of antivirus ()
1466
} # End of antivirus ()
1468
 
1467
 
1469
##########################################################################
1468
##########################################################################
1470
##			Fonction "tinyproxy"				##
1469
##			Fonction "tinyproxy"				##
1471
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1470
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1472
##########################################################################
1471
##########################################################################
1473
tinyproxy ()		
1472
tinyproxy ()		
1474
{
1473
{
1475
	tinyproxy_exist=`grep -c ^tinyproxy: /etc/passwd`
1474
	tinyproxy_exist=`grep -c ^tinyproxy: /etc/passwd`
1476
	if [ "$tinyproxy_exist" == "1" ]
1475
	if [ "$tinyproxy_exist" == "1" ]
1477
	then
1476
	then
1478
	      userdel -r tinyproxy 2>/dev/null
1477
	      userdel -r tinyproxy 2>/dev/null
1479
	      groupdel tinyproxy 2>/dev/null
1478
	      groupdel tinyproxy 2>/dev/null
1480
	fi
1479
	fi
1481
	groupadd -f tinyproxy
1480
	groupadd -f tinyproxy
1482
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1481
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1483
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1482
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1484
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1483
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1485
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1484
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1486
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1485
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1487
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1486
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1488
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1487
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1489
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1488
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1490
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1489
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1491
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1490
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1492
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1491
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1493
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1492
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1494
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1493
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1495
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1494
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1496
# Create the systemd unit
1495
# Create the systemd unit
1497
cat << EOF > /lib/systemd/system/tinyproxy.service
1496
cat << EOF > /lib/systemd/system/tinyproxy.service
1498
#  This file is part of systemd.
1497
#  This file is part of systemd.
1499
#
1498
#
1500
#  systemd is free software; you can redistribute it and/or modify it
1499
#  systemd is free software; you can redistribute it and/or modify it
1501
#  under the terms of the GNU General Public License as published by
1500
#  under the terms of the GNU General Public License as published by
1502
#  the Free Software Foundation; either version 2 of the License, or
1501
#  the Free Software Foundation; either version 2 of the License, or
1503
#  (at your option) any later version.
1502
#  (at your option) any later version.
1504
 
1503
 
1505
# This unit launches tinyproxy (a very light proxy).
1504
# This unit launches tinyproxy (a very light proxy).
1506
# The "sleep 2" is needed because the pid file isn't ready for systemd
1505
# The "sleep 2" is needed because the pid file isn't ready for systemd
1507
[Unit]
1506
[Unit]
1508
Description=Tinyproxy Web Proxy Server
1507
Description=Tinyproxy Web Proxy Server
1509
After=network.target iptables.service
1508
After=network.target iptables.service
1510
 
1509
 
1511
[Service]
1510
[Service]
1512
Type=forking
1511
Type=forking
1513
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1512
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1514
ExecStartPre=/bin/sleep 2
1513
ExecStartPre=/bin/sleep 2
1515
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1514
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1516
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1515
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1517
 
1516
 
1518
[Install]
1517
[Install]
1519
WantedBy=multi-user.target
1518
WantedBy=multi-user.target
1520
EOF
1519
EOF
1521
 
1520
 
1522
} # end of tinyproxy
1521
} # end of tinyproxy
1523
##################################################################################
1522
##################################################################################
1524
##			function "ulogd"					##
1523
##			function "ulogd"					##
1525
## - Ulog config for multi-log files 						##
1524
## - Ulog config for multi-log files 						##
1526
##################################################################################
1525
##################################################################################
1527
ulogd ()
1526
ulogd ()
1528
{
1527
{
1529
# Three instances of ulogd (three different logfiles)
1528
# Three instances of ulogd (three different logfiles)
1530
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1529
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1531
	nl=1
1530
	nl=1
1532
	for log_type in traceability ssh ext-access
1531
	for log_type in traceability ssh ext-access
1533
	do
1532
	do
1534
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1533
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1535
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1534
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1536
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1535
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1537
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
1536
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
1538
		cat << EOF >> /etc/ulogd-$log_type.conf
1537
		cat << EOF >> /etc/ulogd-$log_type.conf
1539
[emu1]
1538
[emu1]
1540
file="/var/log/firewall/$log_type.log"
1539
file="/var/log/firewall/$log_type.log"
1541
sync=1
1540
sync=1
1542
EOF
1541
EOF
1543
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1542
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1544
		nl=`expr $nl + 1`
1543
		nl=`expr $nl + 1`
1545
	done
1544
	done
1546
	chown -R root:apache /var/log/firewall
1545
	chown -R root:apache /var/log/firewall
1547
	chmod 750 /var/log/firewall
1546
	chmod 750 /var/log/firewall
1548
	chmod 640 /var/log/firewall/*
1547
	chmod 640 /var/log/firewall/*
1549
}  # End of ulogd ()
1548
}  # End of ulogd ()
1550
 
1549
 
1551
 
1550
 
1552
##########################################################
1551
##########################################################
1553
##              Function "nfsen"			##
1552
##              Function "nfsen"			##
1554
## - install the nfsen grapher				##
1553
## - install the nfsen grapher				##
1555
## - install the two plugins porttracker & surfmap	##
1554
## - install the two plugins porttracker & surfmap	##
1556
##########################################################
1555
##########################################################
1557
nfsen()
1556
nfsen()
1558
{
1557
{
1559
	tar xzf ./conf/nfsen/nfsen-*.tar.gz -C /tmp/
1558
	tar xzf ./conf/nfsen/nfsen-*.tar.gz -C /tmp/
1560
# Add PortTracker plugin
1559
# Add PortTracker plugin
1561
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1560
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1562
	do
1561
	do
1563
		[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1562
		[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1564
	done
1563
	done
1565
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-*/contrib/PortTracker/PortTracker.pm
1564
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-*/contrib/PortTracker/PortTracker.pm
1566
# use of our conf file and init unit
1565
# use of our conf file and init unit
1567
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-*/etc/
1566
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-*/etc/
1568
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1567
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1569
	DirTmp=$(pwd)
1568
	DirTmp=$(pwd)
1570
	cd /tmp/nfsen-*/
1569
	cd /tmp/nfsen-*/
1571
	/usr/bin/perl install.pl etc/nfsen.conf
1570
	/usr/bin/perl install.pl etc/nfsen.conf
1572
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1571
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1573
# Create RRD DB for porttracker (only in it still doesn't exist)
1572
# Create RRD DB for porttracker (only in it still doesn't exist)
1574
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1573
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1575
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1574
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1576
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1575
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1577
	chmod -R 770 /var/log/netflow/porttracker
1576
	chmod -R 770 /var/log/netflow/porttracker
1578
# nfsen unit for systemd
1577
# nfsen unit for systemd
1579
	cat << EOF > /lib/systemd/system/nfsen.service
1578
	cat << EOF > /lib/systemd/system/nfsen.service
1580
#  This file is part of systemd.
1579
#  This file is part of systemd.
1581
#
1580
#
1582
#  systemd is free software; you can redistribute it and/or modify it
1581
#  systemd is free software; you can redistribute it and/or modify it
1583
#  under the terms of the GNU General Public License as published by
1582
#  under the terms of the GNU General Public License as published by
1584
#  the Free Software Foundation; either version 2 of the License, or
1583
#  the Free Software Foundation; either version 2 of the License, or
1585
#  (at your option) any later version.
1584
#  (at your option) any later version.
1586
 
1585
 
1587
# This unit launches nfsen (a Netflow grapher).
1586
# This unit launches nfsen (a Netflow grapher).
1588
[Unit]
1587
[Unit]
1589
Description= NfSen init script
1588
Description= NfSen init script
1590
After=network.target iptables.service
1589
After=network.target iptables.service
1591
 
1590
 
1592
[Service]
1591
[Service]
1593
Type=oneshot
1592
Type=oneshot
1594
RemainAfterExit=yes
1593
RemainAfterExit=yes
1595
PIDFile=/var/run/nfsen/nfsen.pid
1594
PIDFile=/var/run/nfsen/nfsen.pid
1596
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1595
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1597
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1596
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1598
ExecStart=/usr/bin/nfsen start 
1597
ExecStart=/usr/bin/nfsen start 
1599
ExecStop=/usr/bin/nfsen stop
1598
ExecStop=/usr/bin/nfsen stop
1600
ExecReload=/usr/bin/nfsen restart
1599
ExecReload=/usr/bin/nfsen restart
1601
TimeoutSec=0
1600
TimeoutSec=0
1602
 
1601
 
1603
[Install]
1602
[Install]
1604
WantedBy=multi-user.target
1603
WantedBy=multi-user.target
1605
EOF
1604
EOF
1606
# Add the listen port to collect netflow packet (nfcapd)
1605
# Add the listen port to collect netflow packet (nfcapd)
1607
	$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1606
	$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1608
# expire delay for the profile "live"
1607
# expire delay for the profile "live"
1609
	/usr/bin/systemctl start nfsen
1608
	/usr/bin/systemctl start nfsen
1610
	/bin/nfsen -m live -e 62d 2>/dev/null
1609
	/bin/nfsen -m live -e 62d 2>/dev/null
1611
# add SURFmap plugin
1610
# add SURFmap plugin
1612
	cp $DIR_CONF/nfsen/SURFmap_*.tar.gz /tmp/
1611
	cp $DIR_CONF/nfsen/SURFmap_*.tar.gz /tmp/
1613
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1612
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1614
	tar xzf /tmp/SURFmap_*.tar.gz -C /tmp/
1613
	tar xzf /tmp/SURFmap_*.tar.gz -C /tmp/
1615
	cd /tmp/
1614
	cd /tmp/
1616
	/usr/bin/sh SURFmap/install.sh
1615
	/usr/bin/sh SURFmap/install.sh
1617
	chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1616
	chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1618
# clear the installation
1617
# clear the installation
1619
	cd $DirTmp
1618
	cd $DirTmp
1620
	rm -rf /tmp/nfsen-*
1619
	rm -rf /tmp/nfsen-*
1621
	rm -rf /tmp/SURFmap*
1620
	rm -rf /tmp/SURFmap*
1622
} # End of nfsen ()
1621
} # End of nfsen ()
1623
 
1622
 
1624
##################################################
1623
##################################################
1625
##		Function "vnstat"		##
1624
##		Function "vnstat"		##
1626
## Initialization of Vnstat and vnstat phpFE    ##
1625
## Initialization of Vnstat and vnstat phpFE    ##
1627
##################################################
1626
##################################################
1628
vnstat ()
1627
vnstat ()
1629
{
1628
{
1630
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1629
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1631
	$SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1630
	$SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1632
	[ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1631
	[ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1633
	$SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?" $DIR_ACC/manager/stats/config.php
1632
	$SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?" $DIR_ACC/manager/stats/config.php
1634
	$SED "s?\$iface_title\['.*?\$iface_title\['$EXTIF'\] = \$title;?" $DIR_ACC/manager/stats/config.php
1633
	$SED "s?\$iface_title\['.*?\$iface_title\['$EXTIF'\] = \$title;?" $DIR_ACC/manager/stats/config.php
1635
	/usr/bin/vnstat -u -i $EXTIF
1634
	/usr/bin/vnstat -u -i $EXTIF
1636
} # End of vnstat
1635
} # End of vnstat
1637
 
1636
 
1638
##################################################
1637
##################################################
1639
##		Function "dnsmasq"		##
1638
##		Function "dnsmasq"		##
1640
##################################################
1639
##################################################
1641
dnsmasq ()
1640
dnsmasq ()
1642
{
1641
{
1643
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1642
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1644
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1643
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1645
	cat << EOF > /etc/dnsmasq.conf
1644
	cat << EOF > /etc/dnsmasq.conf
1646
# Configuration file for "dnsmasq in forward mode"
1645
# Configuration file for "dnsmasq in forward mode"
1647
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1646
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1648
listen-address=$PRIVATE_IP
1647
listen-address=$PRIVATE_IP
1649
pid-file=/var/run/dnsmasq.pid
1648
pid-file=/var/run/dnsmasq.pid
1650
listen-address=127.0.0.1
1649
listen-address=127.0.0.1
1651
no-dhcp-interface=$INTIF
1650
no-dhcp-interface=$INTIF
1652
no-dhcp-interface=tun0
1651
no-dhcp-interface=tun0
1653
no-dhcp-interface=lo
1652
no-dhcp-interface=lo
1654
bind-interfaces
1653
bind-interfaces
1655
cache-size=2048
1654
cache-size=2048
1656
domain-needed
1655
domain-needed
1657
expand-hosts
1656
expand-hosts
1658
bogus-priv
1657
bogus-priv
1659
filterwin2k
1658
filterwin2k
1660
server=$DNS1
1659
server=$DNS1
1661
server=$DNS2
1660
server=$DNS2
1662
# DHCP service is configured. It will be enabled in "bypass" mode
1661
# DHCP service is configured. It will be enabled in "bypass" mode
1663
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1662
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1664
#dhcp-option=option:router,$PRIVATE_IP
1663
#dhcp-option=option:router,$PRIVATE_IP
1665
#dhcp-option=option:ntp-server,$PRIVATE_IP
1664
#dhcp-option=option:ntp-server,$PRIVATE_IP
1666
#domain=$DOMAIN
1665
#domain=$DOMAIN
1667
 
1666
 
1668
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1667
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1669
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1668
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1670
EOF
1669
EOF
1671
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1670
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1672
	cat << EOF > /etc/dnsmasq-blacklist.conf
1671
	cat << EOF > /etc/dnsmasq-blacklist.conf
1673
# Configuration file for "dnsmasq with blacklist"
1672
# Configuration file for "dnsmasq with blacklist"
1674
# Add Toulouse University blacklist domains
1673
# Add Toulouse University blacklist domains
1675
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1674
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1676
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1675
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1677
pid-file=/var/run/dnsmasq-blacklist.pid
1676
pid-file=/var/run/dnsmasq-blacklist.pid
1678
listen-address=$PRIVATE_IP
1677
listen-address=$PRIVATE_IP
1679
port=54
1678
port=54
1680
no-dhcp-interface=$INTIF
1679
no-dhcp-interface=$INTIF
1681
no-dhcp-interface=tun0
1680
no-dhcp-interface=tun0
1682
no-dhcp-interface=lo
1681
no-dhcp-interface=lo
1683
bind-interfaces
1682
bind-interfaces
1684
cache-size=2048
1683
cache-size=2048
1685
domain-needed
1684
domain-needed
1686
expand-hosts
1685
expand-hosts
1687
bogus-priv
1686
bogus-priv
1688
filterwin2k
1687
filterwin2k
1689
log-queries
1688
log-queries
1690
log-facility=/var/log/dnsmasq/dnsmasq-blacklist.log
1689
log-facility=/var/log/dnsmasq/dnsmasq-blacklist.log
1691
server=$DNS1
1690
server=$DNS1
1692
server=$DNS2
1691
server=$DNS2
1693
EOF
1692
EOF
1694
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1693
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1695
	cat << EOF > /etc/dnsmasq-whitelist.conf
1694
	cat << EOF > /etc/dnsmasq-whitelist.conf
1696
# Configuration file for "dnsmasq with whitelist"
1695
# Configuration file for "dnsmasq with whitelist"
1697
# ADD Toulouse university whitelist domains
1696
# ADD Toulouse university whitelist domains
1698
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1697
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1699
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1698
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1700
pid-file=/var/run/dnsmasq-whitelist.pid
1699
pid-file=/var/run/dnsmasq-whitelist.pid
1701
listen-address=$PRIVATE_IP
1700
listen-address=$PRIVATE_IP
1702
port=55
1701
port=55
1703
no-dhcp-interface=$INTIF
1702
no-dhcp-interface=$INTIF
1704
no-dhcp-interface=tun0
1703
no-dhcp-interface=tun0
1705
no-dhcp-interface=lo
1704
no-dhcp-interface=lo
1706
bind-interfaces
1705
bind-interfaces
1707
cache-size=1024
1706
cache-size=1024
1708
domain-needed
1707
domain-needed
1709
expand-hosts
1708
expand-hosts
1710
bogus-priv
1709
bogus-priv
1711
filterwin2k
1710
filterwin2k
1712
ipset=/#/wl_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1711
ipset=/#/wl_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1713
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1712
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1714
EOF
1713
EOF
1715
# 4th dnsmasq listen on udp 56 ("blackhole")
1714
# 4th dnsmasq listen on udp 56 ("blackhole")
1716
	cat << EOF > /etc/dnsmasq-blackhole.conf
1715
	cat << EOF > /etc/dnsmasq-blackhole.conf
1717
# Configuration file for "dnsmasq as a blackhole"
1716
# Configuration file for "dnsmasq as a blackhole"
1718
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1717
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1719
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1718
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1720
pid-file=/var/run/dnsmasq-blackhole.pid
1719
pid-file=/var/run/dnsmasq-blackhole.pid
1721
listen-address=$PRIVATE_IP
1720
listen-address=$PRIVATE_IP
1722
port=56
1721
port=56
1723
no-dhcp-interface=$INTIF
1722
no-dhcp-interface=$INTIF
1724
no-dhcp-interface=tun0
1723
no-dhcp-interface=tun0
1725
no-dhcp-interface=lo
1724
no-dhcp-interface=lo
1726
bind-interfaces
1725
bind-interfaces
1727
cache-size=256
1726
cache-size=256
1728
domain-needed
1727
domain-needed
1729
expand-hosts
1728
expand-hosts
1730
bogus-priv
1729
bogus-priv
1731
filterwin2k
1730
filterwin2k
1732
EOF
1731
EOF
1733
 
1732
 
1734
# the main instance should start after network and chilli (which create tun0)
1733
# the main instance should start after network and chilli (which create tun0)
1735
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1734
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1736
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1735
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1737
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1736
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1738
	for list in blacklist whitelist blackhole
1737
	for list in blacklist whitelist blackhole
1739
	do
1738
	do
1740
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1739
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1741
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1740
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1742
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1741
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1743
	done
1742
	done
1744
} # End dnsmasq
1743
} # End dnsmasq
1745
 
1744
 
1746
##########################################################
1745
##########################################################
1747
##		Fonction "BL"				##
1746
##		Fonction "BL"				##
1748
##########################################################
1747
##########################################################
1749
BL ()
1748
BL ()
1750
{
1749
{
1751
	# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
1750
	# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
1752
	rm -rf $DIR_DG/lists/blacklists
1751
	rm -rf $DIR_DG/lists/blacklists
1753
	mkdir -p /tmp/blacklists
1752
	mkdir -p /tmp/blacklists
1754
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
1753
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
1755
# creation of file for the rehabilited domains and urls
1754
# creation of file for the rehabilited domains and urls
1756
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1755
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1757
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1756
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1758
	touch $DIR_DG/lists/exceptionsitelist
1757
	touch $DIR_DG/lists/exceptionsitelist
1759
	touch $DIR_DG/lists/exceptionurllist
1758
	touch $DIR_DG/lists/exceptionurllist
1760
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1759
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1761
	cat <<EOF > $DIR_DG/lists/bannedurllist
1760
	cat <<EOF > $DIR_DG/lists/bannedurllist
1762
# Dansguardian filter config for ALCASAR
1761
# Dansguardian filter config for ALCASAR
1763
EOF
1762
EOF
1764
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1763
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1765
# Dansguardian domain filter config for ALCASAR
1764
# Dansguardian domain filter config for ALCASAR
1766
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1765
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1767
#**
1766
#**
1768
# block all SSL and CONNECT tunnels
1767
# block all SSL and CONNECT tunnels
1769
**s
1768
**s
1770
# block all SSL and CONNECT tunnels specified only as an IP
1769
# block all SSL and CONNECT tunnels specified only as an IP
1771
*ips
1770
*ips
1772
# block all sites specified only by an IP
1771
# block all sites specified only by an IP
1773
*ip
1772
*ip
1774
EOF
1773
EOF
1775
# Add Bing to the safesearch url regext list (parental control)
1774
# Add Bing to the safesearch url regext list (parental control)
1776
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1775
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1777
# Bing - add 'adlt=strict'
1776
# Bing - add 'adlt=strict'
1778
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1777
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1779
EOF
1778
EOF
1780
# change the google safesearch ("safe=strict" instead of "safe=vss")
1779
# change the google safesearch ("safe=strict" instead of "safe=vss")
1781
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1780
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1782
# creation of the custom BL and WL categorie named "ossi" (for domain names & ip only)
1781
# creation of the custom BL and WL categorie named "ossi" (for domain names & ip only)
1783
	mkdir -p $DIR_DG/lists/blacklists/ossi-bl
1782
	mkdir -p $DIR_DG/lists/blacklists/ossi-bl
1784
	touch $DIR_DG/lists/blacklists/ossi-bl/domains
1783
	touch $DIR_DG/lists/blacklists/ossi-bl/domains
1785
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1784
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1786
	mkdir -p $DIR_DG/lists/blacklists/ossi-wl
1785
	mkdir -p $DIR_DG/lists/blacklists/ossi-wl
1787
	touch $DIR_DG/lists/blacklists/ossi-wl/domains
1786
	touch $DIR_DG/lists/blacklists/ossi-wl/domains
1788
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
1787
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
1789
# add custom ALCASAR BL files
1788
# add custom ALCASAR BL files
1790
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklist")
1789
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklist")
1791
	do
1790
	do
1792
		mkdir $DIR_DG/lists/blacklists/ossi-bl-$x
1791
		mkdir $DIR_DG/lists/blacklists/ossi-bl-$x
1793
		cp $DIR_BLACKLIST/$x  $DIR_DG/lists/blacklists/ossi-bl-$x/domains
1792
		cp $DIR_BLACKLIST/$x  $DIR_DG/lists/blacklists/ossi-bl-$x/domains
1794
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1793
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1795
	done
1794
	done
1796
	chown -R dansguardian:apache $DIR_DG
1795
	chown -R dansguardian:apache $DIR_DG
1797
	chown -R root:apache $DIR_DEST_SHARE
1796
	chown -R root:apache $DIR_DEST_SHARE
1798
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1797
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1799
# adapt the Toulouse BL to ALCASAR architecture
1798
# adapt the Toulouse BL to ALCASAR architecture
1800
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1799
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1801
# enable the default categories
1800
# enable the default categories
1802
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
1801
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
1803
} # End BL()
1802
} # End BL()
1804
 
1803
 
1805
##########################################################
1804
##########################################################
1806
##		Fonction "cron"				##
1805
##		Fonction "cron"				##
1807
## - Mise en place des différents fichiers de cron	##
1806
## - Mise en place des différents fichiers de cron	##
1808
##########################################################
1807
##########################################################
1809
cron ()
1808
cron ()
1810
{
1809
{
1811
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1810
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1812
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1811
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1813
	cat <<EOF > /etc/crontab
1812
	cat <<EOF > /etc/crontab
1814
SHELL=/usr/bin/bash
1813
SHELL=/usr/bin/bash
1815
PATH=/usr/sbin:/usr/bin
1814
PATH=/usr/sbin:/usr/bin
1816
MAILTO=root
1815
MAILTO=root
1817
HOME=/
1816
HOME=/
1818
 
1817
 
1819
# run-parts
1818
# run-parts
1820
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1819
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1821
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1820
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1822
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1821
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1823
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1822
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1824
EOF
1823
EOF
1825
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1824
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1826
	cat <<EOF >> /etc/anacrontab
1825
	cat <<EOF >> /etc/anacrontab
1827
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1826
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1828
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1827
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1829
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1828
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1830
EOF
1829
EOF
1831
 
1830
 
1832
	cat <<EOF > /etc/cron.d/alcasar-mysql
1831
	cat <<EOF > /etc/cron.d/alcasar-mysql
1833
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1832
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1834
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mysql.sh --dump
1833
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mysql.sh --dump
1835
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1834
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1836
40 4 * * * root $DIR_DEST_BIN/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1835
40 4 * * * root $DIR_DEST_BIN/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1837
EOF
1836
EOF
1838
	cat <<EOF > /etc/cron.d/alcasar-archive
1837
	cat <<EOF > /etc/cron.d/alcasar-archive
1839
# Archive des logs et de la base de données (tous les lundi à 5h35)
1838
# Archive des logs et de la base de données (tous les lundi à 5h35)
1840
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1839
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1841
EOF
1840
EOF
1842
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1841
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1843
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1842
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1844
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1843
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1845
EOF
1844
EOF
1846
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1845
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1847
# mise à jour automatique de la distribution tous les jours 3h30
1846
# mise à jour automatique de la distribution tous les jours 3h30
1848
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1847
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1849
EOF
1848
EOF
1850
 
1849
 
1851
	cat << EOF > /etc/cron.d/alcasar-connections-stats
1850
	cat << EOF > /etc/cron.d/alcasar-connections-stats
1852
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
1851
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
1853
# 'alcasar-tot_stats' (everyday at 01h01 pm) : aggregating the daily connections of users (write in the table 'totacct')
1852
# 'alcasar-tot_stats' (everyday at 01h01 pm) : aggregating the daily connections of users (write in the table 'totacct')
1854
# 'alcasar-monthly_tot_stat' (everyday at 01h05 pm) : aggregating the monthly connections of users (write in table 'mtotacct')
1853
# 'alcasar-monthly_tot_stat' (everyday at 01h05 pm) : aggregating the monthly connections of users (write in table 'mtotacct')
1855
# 'alcasar-truncate_raddact' (every month, the first at 01h10 pm) : removing the log sessions of users older than 365 days
1854
# 'alcasar-truncate_raddact' (every month, the first at 01h10 pm) : removing the log sessions of users older than 365 days
1856
# 'alcasar-clean_radacct' (every month, the first at 01h15 pm) : closing the sessions openned for more than 30 days
1855
# 'alcasar-clean_radacct' (every month, the first at 01h15 pm) : closing the sessions openned for more than 30 days
1857
# 'alcasar-activity_report.sh' (every sunday at 5h35 pm) : generate an activity report in PDF
1856
# 'alcasar-activity_report.sh' (every sunday at 5h35 pm) : generate an activity report in PDF
1858
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1857
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1859
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1858
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1860
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1859
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1861
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
1860
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
1862
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1861
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1863
EOF
1862
EOF
1864
	cat << EOF > /etc/cron.d/alcasar-watchdog
1863
	cat << EOF > /etc/cron.d/alcasar-watchdog
1865
# run the "watchdog" every 3'
1864
# run the "watchdog" every 3'
1866
# empty the IPSET of the whitelisted IP (loaded dynamically with dnsmasq-whitelist) when every whitelisted users are logged out (every sunday at 0h05
1865
# empty the IPSET of the whitelisted IP (loaded dynamically with dnsmasq-whitelist) when every whitelisted users are logged out (every sunday at 0h05
1867
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1866
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1868
0 5 * * 0 root $DIR_DEST_BIN/alcasar-flush_ipset_wl.sh > /dev/null 2>&1
1867
0 5 * * 0 root $DIR_DEST_BIN/alcasar-flush_ipset_wl.sh > /dev/null 2>&1
1869
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1868
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1870
EOF
1869
EOF
1871
# Enabling the watchdog every 18'
1870
# Enabling the watchdog every 18'
1872
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1871
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1873
# activate  the daemon-watchdog after boot process
1872
# activate  the daemon-watchdog after boot process
1874
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1873
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1875
# activate the daemon-watchdog every 18'
1874
# activate the daemon-watchdog every 18'
1876
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1875
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1877
EOF
1876
EOF
1878
 
1877
 
1879
# Enabling category update from rsync
1878
# Enabling category update from rsync
1880
	cat << EOF > /etc/cron.d/alcasar-rsync-bl
1879
	cat << EOF > /etc/cron.d/alcasar-rsync-bl
1881
# Automatic update of BL via rsync every 12 hours. The categories are listed in the file '/usr/local/etc/update_cat.conf' (no sync if empty). 
1880
# Automatic update of BL via rsync every 12 hours. The categories are listed in the file '/usr/local/etc/update_cat.conf' (no sync if empty). 
1882
0 */12 * * * root $DIR_DEST_BIN/alcasar-bl.sh --update_cat > /dev/null 2>&1
1881
0 */12 * * * root $DIR_DEST_BIN/alcasar-bl.sh --update_cat > /dev/null 2>&1
1883
EOF
1882
EOF
1884
 
1883
 
1885
# Renew the Let's Encrypt certificate
1884
# Renew the Let's Encrypt certificate
1886
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
1885
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
1887
# Automatic renew of the Let's Encrypt certificate
1886
# Automatic renew of the Let's Encrypt certificate
1888
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1887
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1889
EOF
1888
EOF
1890
 
1889
 
1891
# removing the users crons
1890
# removing the users crons
1892
	rm -f /var/spool/cron/*
1891
	rm -f /var/spool/cron/*
1893
} # End cron()
1892
} # End cron()
1894
 
1893
 
1895
##################################################################
1894
##################################################################
1896
## 			Fonction "Fail2Ban"			##
1895
## 			Fonction "Fail2Ban"			##
1897
##- Modification de la configuration de fail2ban		##
1896
##- Modification de la configuration de fail2ban		##
1898
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1897
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1899
##################################################################
1898
##################################################################
1900
fail2ban()
1899
fail2ban()
1901
{
1900
{
1902
	/usr/bin/sh $DIR_CONF/fail2ban.sh
1901
	/usr/bin/sh $DIR_CONF/fail2ban.sh
1903
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1902
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1904
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1903
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1905
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1904
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1906
	chmod 644 /var/log/fail2ban.log
1905
	chmod 644 /var/log/fail2ban.log
1907
	chmod 644 /var/Save/security/watchdog.log
1906
	chmod 644 /var/Save/security/watchdog.log
1908
	/usr/bin/touch /var/log/auth.log
1907
	/usr/bin/touch /var/log/auth.log
1909
# fail2ban unit
1908
# fail2ban unit
1910
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1909
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1911
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1910
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1912
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1911
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1913
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1912
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1914
} # End fail2ban()
1913
} # End fail2ban()
1915
 
1914
 
1916
##################################################################
1915
##################################################################
1917
## 			Fonction "gammu_smsd"			##
1916
## 			Fonction "gammu_smsd"			##
1918
## - Creation de la base de donnée Gammu			##
1917
## - Creation de la base de donnée Gammu			##
1919
## - Creation du fichier de config: gammu_smsd_conf		##
1918
## - Creation du fichier de config: gammu_smsd_conf		##
1920
##################################################################
1919
##################################################################
1921
gammu_smsd()
1920
gammu_smsd()
1922
{
1921
{
1923
# Create 'gammu' databse
1922
# Create 'gammu' databse
1924
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1923
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1925
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1924
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1926
# Add a gammu database structure
1925
# Add a gammu database structure
1927
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1926
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1928
 
1927
 
1929
# Config file for the daemon
1928
# Config file for the daemon
1930
cat << EOF > /etc/gammu_smsd_conf
1929
cat << EOF > /etc/gammu_smsd_conf
1931
[gammu]
1930
[gammu]
1932
port = /dev/ttyUSB0
1931
port = /dev/ttyUSB0
1933
connection = at115200
1932
connection = at115200
1934
 
1933
 
1935
;########################################################
1934
;########################################################
1936
 
1935
 
1937
[smsd]
1936
[smsd]
1938
 
1937
 
1939
PIN = 1234
1938
PIN = 1234
1940
 
1939
 
1941
logfile = /var/log/gammu-smsd/gammu-smsd.log
1940
logfile = /var/log/gammu-smsd/gammu-smsd.log
1942
logformat = textall
1941
logformat = textall
1943
debuglevel = 0
1942
debuglevel = 0
1944
 
1943
 
1945
service = sql
1944
service = sql
1946
driver = native_mysql
1945
driver = native_mysql
1947
user = $DB_USER
1946
user = $DB_USER
1948
password = $radiuspwd
1947
password = $radiuspwd
1949
pc = localhost
1948
pc = localhost
1950
database = $DB_GAMMU
1949
database = $DB_GAMMU
1951
 
1950
 
1952
RunOnReceive = $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1951
RunOnReceive = $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1953
 
1952
 
1954
StatusFrequency = 30
1953
StatusFrequency = 30
1955
;LoopSleep = 2
1954
;LoopSleep = 2
1956
 
1955
 
1957
;ResetFrequency = 300
1956
;ResetFrequency = 300
1958
;HardResetFrequency = 120
1957
;HardResetFrequency = 120
1959
 
1958
 
1960
CheckSecurity = 1 
1959
CheckSecurity = 1 
1961
CheckSignal = 1
1960
CheckSignal = 1
1962
CheckBattery = 0
1961
CheckBattery = 0
1963
EOF
1962
EOF
1964
 
1963
 
1965
chmod 755 /etc/gammu_smsd_conf
1964
chmod 755 /etc/gammu_smsd_conf
1966
 
1965
 
1967
# Log folder for gammu-smsd
1966
# Log folder for gammu-smsd
1968
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1967
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1969
chmod 755 /var/log/gammu-smsd
1968
chmod 755 /var/log/gammu-smsd
1970
 
1969
 
1971
# Write radius credentials in the gammu script
1970
# Write radius credentials in the gammu script
1972
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1971
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1973
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1972
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1974
 
1973
 
1975
# Udev rule for Huawei GSM MODEM (idVendor: 12d1) --> run "modeswitch" to switch from "mass_storage" mode to "ttyUSB" (modem) mode
1974
# Udev rule for Huawei GSM MODEM (idVendor: 12d1) --> run "modeswitch" to switch from "mass_storage" mode to "ttyUSB" (modem) mode
1976
cat << EOF > /lib/udev/rules.d/66-huawei.rules
1975
cat << EOF > /lib/udev/rules.d/66-huawei.rules
1977
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
1976
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
1978
EOF
1977
EOF
1979
 
1978
 
1980
} # End gammu_smsd()
1979
} # End gammu_smsd()
1981
 
1980
 
1982
 
1981
 
1983
##################################################################
1982
##################################################################
1984
##			Fonction "msec"				##
1983
##			Fonction "msec"				##
1985
## - Apply the "fileserver" security level			##
1984
## - Apply the "fileserver" security level			##
1986
## - remove the "system request" for rebboting			##
1985
## - remove the "system request" for rebboting			##
1987
## - Fix several file permissions				##
1986
## - Fix several file permissions				##
1988
##################################################################
1987
##################################################################
1989
msec()
1988
msec()
1990
{
1989
{
1991
 
1990
 
1992
# Apply fileserver security level
1991
# Apply fileserver security level
1993
[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
1992
[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
1994
echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
1993
echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
1995
 
1994
 
1996
# Set permissions monitoring and enforcement
1995
# Set permissions monitoring and enforcement
1997
cat <<EOF > /etc/security/msec/perm.local
1996
cat <<EOF > /etc/security/msec/perm.local
1998
/var/log/firefwall/                     root.apache     750
1997
/var/log/firefwall/                     root.apache     750
1999
/var/log/firewall/*                     root.apache     640
1998
/var/log/firewall/*                     root.apache     640
2000
/etc/security/msec/perm.local           root.root       640
1999
/etc/security/msec/perm.local           root.root       640
2001
/etc/security/msec/level.local          root.root       640
2000
/etc/security/msec/level.local          root.root       640
2002
/etc/freeradius-web                     root.apache     750
2001
/etc/freeradius-web                     root.apache     750
2003
/etc/freeradius-web/admin.conf          root.apache     640
2002
/etc/freeradius-web/admin.conf          root.apache     640
2004
/etc/raddb/client.conf                  radius.radius   640
2003
/etc/raddb/client.conf                  radius.radius   640
2005
/etc/raddb/radius.conf                  radius.radius   640
2004
/etc/raddb/radius.conf                  radius.radius   640
2006
/etc/raddb/mods-available/ldap          radius.apache   660
2005
/etc/raddb/mods-available/ldap          radius.apache   660
2007
/etc/raddb/sites-available/alcasar      radius.apache   660
2006
/etc/raddb/sites-available/alcasar      radius.apache   660
2008
/etc/pki/*                              root.apache     750
2007
/etc/pki/*                              root.apache     750
2009
/var/log/netflow/porttracker            root.apache     770
2008
/var/log/netflow/porttracker            root.apache     770
2010
/var/log/netflow/porttracker/*          root.apache     660
2009
/var/log/netflow/porttracker/*          root.apache     660
2011
EOF
2010
EOF
2012
# apply now hourly & daily checks 
2011
# apply now hourly & daily checks 
2013
/usr/sbin/msec
2012
/usr/sbin/msec
2014
/etc/cron.weekly/msec
2013
/etc/cron.weekly/msec
2015
 
2014
 
2016
} # End msec()
2015
} # End msec()
2017
 
2016
 
2018
 
2017
 
2019
##################################################################
2018
##################################################################
2020
##			Fonction "letsencrypt"			##
2019
##			Fonction "letsencrypt"			##
2021
## - Install Let's Encrypt client				##
2020
## - Install Let's Encrypt client				##
2022
## - Prepare Let's Encrypt ALCASAR configuration file		##
2021
## - Prepare Let's Encrypt ALCASAR configuration file		##
2023
##################################################################
2022
##################################################################
2024
letsencrypt()
2023
letsencrypt()
2025
{
2024
{
2026
	echo "Installing Let's Encrypt client..."
2025
	echo "Installing Let's Encrypt client..."
2027
 
2026
 
2028
	# Extract acme.sh
2027
	# Extract acme.sh
2029
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2028
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2030
 
2029
 
2031
	pwdInstall=$(pwd)
2030
	pwdInstall=$(pwd)
2032
	cd /tmp/acme.sh-*
2031
	cd /tmp/acme.sh-*
2033
 
2032
 
2034
	acmesh_installDir="/opt/acme.sh"
2033
	acmesh_installDir="/opt/acme.sh"
2035
	acmesh_confDir="/usr/local/etc/letsencrypt"
2034
	acmesh_confDir="/usr/local/etc/letsencrypt"
2036
	acmesh_userAgent="ALCASAR"
2035
	acmesh_userAgent="ALCASAR"
2037
 
2036
 
2038
	# Install acme.sh
2037
	# Install acme.sh
2039
	./acme.sh --install \
2038
	./acme.sh --install \
2040
		--home $acmesh_installDir \
2039
		--home $acmesh_installDir \
2041
		--config-home $acmesh_confDir/data \
2040
		--config-home $acmesh_confDir/data \
2042
		--certhome $acmesh_confDir/certs \
2041
		--certhome $acmesh_confDir/certs \
2043
		--accountkey $acmesh_confDir/ca/account.key \
2042
		--accountkey $acmesh_confDir/ca/account.key \
2044
		--accountconf $acmesh_confDir/data/account.conf \
2043
		--accountconf $acmesh_confDir/data/account.conf \
2045
		--useragent $acmesh_userAgent \
2044
		--useragent $acmesh_userAgent \
2046
		--nocron \
2045
		--nocron \
2047
		> /dev/null
2046
		> /dev/null
2048
 
2047
 
2049
	if [ $? -ne 0 ]; then
2048
	if [ $? -ne 0 ]; then
2050
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2049
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2051
	fi
2050
	fi
2052
 
2051
 
2053
	# Create configuration file
2052
	# Create configuration file
2054
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2053
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2055
email=
2054
email=
2056
dateIssueRequest=
2055
dateIssueRequest=
2057
domainRequest=
2056
domainRequest=
2058
challenge=
2057
challenge=
2059
dateIssued=
2058
dateIssued=
2060
dnsapi=
2059
dnsapi=
2061
dateNextRenewal=
2060
dateNextRenewal=
2062
EOF
2061
EOF
2063
 
2062
 
2064
	cd $pwdInstall
2063
	cd $pwdInstall
2065
	rm -rf /tmp/acme.sh-*
2064
	rm -rf /tmp/acme.sh-*
2066
 
2065
 
2067
} # END letsencrypt()
2066
} # END letsencrypt()
2068
 
2067
 
2069
##################################################################
2068
##################################################################
2070
##		Fonction "post_install"			##
2069
##		Fonction "post_install"			##
2071
## - Modifying banners (locals et ssh) & prompts	##
2070
## - Modifying banners (locals et ssh) & prompts	##
2072
## - SSH config						##
2071
## - SSH config						##
2073
## - sudoers config & files security			##
2072
## - sudoers config & files security			##
2074
## - log rotate & ANSSI security parameters		##
2073
## - log rotate & ANSSI security parameters		##
2075
## - Apply former conf in case of an update		##
2074
## - Apply former conf in case of an update		##
2076
##########################################################
2075
##########################################################
2077
post_install()
2076
post_install()
2078
{
2077
{
2079
# change the SSH banner
2078
# change the SSH banner
2080
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
2079
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
2081
	echo " V$VERSION" >> /etc/ssh/alcasar-banner-ssh
2080
	echo " V$VERSION" >> /etc/ssh/alcasar-banner-ssh
2082
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
2081
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
2083
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2082
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2084
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2083
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2085
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2084
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2086
# postfix banner anonymisation
2085
# postfix banner anonymisation
2087
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
2086
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
2088
	chown -R postfix:postfix /var/lib/postfix
2087
	chown -R postfix:postfix /var/lib/postfix
2089
# sshd liste on EXTIF & INTIF
2088
# sshd liste on EXTIF & INTIF
2090
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2089
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2091
# sshd authorized certificate for root login
2090
# sshd authorized certificate for root login
2092
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2091
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2093
# ALCASAR conf file
2092
# ALCASAR conf file
2094
	echo "HTTPS_LOGIN=on" >> $CONF_FILE
2093
	echo "HTTPS_LOGIN=on" >> $CONF_FILE
2095
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
2094
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
2096
	echo "SSH=on" >> $CONF_FILE
2095
	echo "SSH=on" >> $CONF_FILE
2097
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
2096
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
2098
	echo "LDAP=off" >> $CONF_FILE
2097
	echo "LDAP=off" >> $CONF_FILE
2099
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
2098
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
2100
	echo "MULTIWAN=off" >> $CONF_FILE
2099
	echo "MULTIWAN=off" >> $CONF_FILE
2101
	echo "FAILOVER=30" >> $CONF_FILE
2100
	echo "FAILOVER=30" >> $CONF_FILE
2102
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
2101
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
2103
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
2102
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
2104
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
2103
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
2105
# Prompt customisation (colors)
2104
# Prompt customisation (colors)
2106
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
2105
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
2107
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
2106
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
2108
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2107
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2109
# sudoers configuration for "apache" & "sysadmin"
2108
# sudoers configuration for "apache" & "sysadmin"
2110
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2109
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2111
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
2110
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
2112
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
2111
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
2113
# Modify some logrotate files (gammu, ulogd)
2112
# Modify some logrotate files (gammu, ulogd)
2114
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2113
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2115
	chmod 644 /etc/logrotate.d/*
2114
	chmod 644 /etc/logrotate.d/*
2116
# Log compression
2115
# Log compression
2117
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2116
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2118
# actualisation des fichiers logs compressés
2117
# actualisation des fichiers logs compressés
2119
	for dir in firewall dansguardian httpd
2118
	for dir in firewall dansguardian httpd
2120
	do
2119
	do
2121
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
2120
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
2122
	done
2121
	done
2123
# create the alcasar-load_balancing unit
2122
# create the alcasar-load_balancing unit
2124
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
2123
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
2125
#  This file is part of systemd.
2124
#  This file is part of systemd.
2126
#
2125
#
2127
#  systemd is free software; you can redistribute it and/or modify it
2126
#  systemd is free software; you can redistribute it and/or modify it
2128
#  under the terms of the GNU General Public License as published by
2127
#  under the terms of the GNU General Public License as published by
2129
#  the Free Software Foundation; either version 2 of the License, or
2128
#  the Free Software Foundation; either version 2 of the License, or
2130
#  (at your option) any later version.
2129
#  (at your option) any later version.
2131
 
2130
 
2132
# This unit lauches alcasar-load-balancing.sh script.
2131
# This unit lauches alcasar-load-balancing.sh script.
2133
[Unit]
2132
[Unit]
2134
Description=alcasar-load_balancing.sh execution
2133
Description=alcasar-load_balancing.sh execution
2135
After=network.target iptables.service
2134
After=network.target iptables.service
2136
 
2135
 
2137
[Service]
2136
[Service]
2138
Type=oneshot
2137
Type=oneshot
2139
RemainAfterExit=yes
2138
RemainAfterExit=yes
2140
ExecStart=$DIR_DEST_BIN/alcasar-load_balancing.sh start
2139
ExecStart=$DIR_DEST_BIN/alcasar-load_balancing.sh start
2141
ExecStop=$DIR_DEST_BIN/alcasar-load_balancing.sh stop
2140
ExecStop=$DIR_DEST_BIN/alcasar-load_balancing.sh stop
2142
TimeoutSec=0
2141
TimeoutSec=0
2143
SysVStartPriority=99
2142
SysVStartPriority=99
2144
 
2143
 
2145
[Install]
2144
[Install]
2146
WantedBy=multi-user.target
2145
WantedBy=multi-user.target
2147
EOF
2146
EOF
2148
# processes launched at boot time (Systemctl)
2147
# processes launched at boot time (Systemctl)
2149
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat sshd
2148
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat sshd
2150
	do
2149
	do
2151
		/usr/bin/systemctl -q enable $i.service
2150
		/usr/bin/systemctl -q enable $i.service
2152
	done
2151
	done
2153
	
2152
	
2154
# disable processes at boot time (Systemctl)
2153
# disable processes at boot time (Systemctl)
2155
	for i in ulogd gpm
2154
	for i in ulogd gpm
2156
	do
2155
	do
2157
		/usr/bin/systemctl -q disable $i.service
2156
		/usr/bin/systemctl -q disable $i.service
2158
	done
2157
	done
2159
	
2158
	
2160
# Apply French Security Agency (ANSSI) rules
2159
# Apply French Security Agency (ANSSI) rules
2161
# ignore ICMP broadcast (smurf attack)
2160
# ignore ICMP broadcast (smurf attack)
2162
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2161
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2163
# ignore ICMP errors bogus
2162
# ignore ICMP errors bogus
2164
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2163
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2165
# remove ICMP redirects responces
2164
# remove ICMP redirects responces
2166
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2165
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2167
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2166
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2168
# enable SYN Cookies (Syn flood attacks)
2167
# enable SYN Cookies (Syn flood attacks)
2169
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2168
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2170
# enable kernel antispoofing
2169
# enable kernel antispoofing
2171
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2170
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2172
# ignore source routing
2171
# ignore source routing
2173
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2172
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2174
# set conntrack timer to 1h (3600s) instead of 5 weeks
2173
# set conntrack timer to 1h (3600s) instead of 5 weeks
2175
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2174
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2176
# disable log_martians (ALCASAR is often installed between two private network addresses) 
2175
# disable log_martians (ALCASAR is often installed between two private network addresses) 
2177
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
2176
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
2178
# disable iptables_helpers
2177
# disable iptables_helpers
2179
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
2178
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
2180
# Switch to the router mode
2179
# Switch to the router mode
2181
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
2180
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
2182
# Remove unused service ipv6
2181
# Remove unused service ipv6
2183
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2182
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2184
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2183
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2185
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2184
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2186
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2185
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2187
# switch to multi-users runlevel (instead of x11)
2186
# switch to multi-users runlevel (instead of x11)
2188
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2187
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2189
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
2188
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
2190
	[ -e /etc/default/grub.default ]  || cp /etc/default/grub /etc/default/grub.default
2189
	[ -e /etc/default/grub.default ]  || cp /etc/default/grub /etc/default/grub.default
2191
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2190
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2192
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR (on Mageia)?g" /etc/default/grub/
2191
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR?g" /etc/default/grub
2193
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
2192
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
2194
	vm_vga=`lsmod | egrep -c "virtio|vmwgfx"` # test if in VM
2193
	vm_vga=`lsmod | egrep -c "virtio|vmwgfx"` # test if in VM
2195
	if [ $vm_vga == 0 ] # is not a VM 
2194
	if [ $vm_vga == 0 ] # is not a VM 
2196
	then
2195
	then
2197
        cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2196
        cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2198
        echo >> /etc/mageia-release
2197
        echo >> /etc/mageia-release
2199
        $SED "s?ĜRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
2198
        $SED "s?^GRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
2200
    fi
2199
    fi
2201
    if [ $Lang == "fr" ]
2200
    if [ $Lang == "fr" ]
2202
    then
2201
    then
2203
            echo "Bienvenue sur ALCASAR V$VERSION" >> /etc/mageia-release
2202
            echo "Bienvenue sur ALCASAR V$VERSION" >> /etc/mageia-release
2204
            echo "Connectez-vous à l'URL 'http://alcasar.localdomain/acc'" >> /etc/mageia-release
2203
            echo "Connectez-vous à l'URL 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2205
    else
2204
    else
2206
            echo "Welcome on ALCASAR V$VERSION" >> /etc/mageia-release
2205
            echo "Welcome on ALCASAR V$VERSION" >> /etc/mageia-release
2207
            echo "Connect to 'http://alcasar.localdomain/acc'" >> /etc/mageia-release
2206
            echo "Connect to 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2208
    fi
2207
    fi
-
 
2208
    /usr/bin/update-grub2
2209
# Load and apply the previous conf file
2209
# Load and apply the previous conf file
2210
	if [ "$mode" = "update" ]
2210
	if [ "$mode" = "update" ]
2211
	then
2211
	then
2212
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
2212
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
2213
		$DIR_DEST_BIN/alcasar-conf.sh --load
2213
		$DIR_DEST_BIN/alcasar-conf.sh --load
2214
		PARENT_SCRIPT=`basename $0`
2214
		PARENT_SCRIPT=`basename $0`
2215
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2215
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2216
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2216
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2217
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf 
2217
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf 
2218
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2218
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2219
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
2219
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
2220
	fi
2220
	fi
2221
	rm -f /tmp/alcasar-conf*
2221
	rm -f /tmp/alcasar-conf*
2222
	chown -R root:apache $DIR_DEST_ETC/*
2222
	chown -R root:apache $DIR_DEST_ETC/*
2223
	chmod -R 660 $DIR_DEST_ETC/*
2223
	chmod -R 660 $DIR_DEST_ETC/*
2224
	chmod ug+x $DIR_DEST_ETC/digest
2224
	chmod ug+x $DIR_DEST_ETC/digest
2225
	cd $DIR_INSTALL
2225
	cd $DIR_INSTALL
2226
	echo ""
2226
	echo ""
2227
	echo "#############################################################################"
2227
	echo "#############################################################################"
2228
	if [ $Lang == "fr" ]
2228
	if [ $Lang == "fr" ]
2229
		then
2229
		then
2230
		echo "#                        Fin d'installation d'ALCASAR                       #"
2230
		echo "#                        Fin d'installation d'ALCASAR                       #"
2231
		echo "#                                                                           #"
2231
		echo "#                                                                           #"
2232
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2232
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2233
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2233
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2234
		echo "#                                                                           #"
2234
		echo "#                                                                           #"
2235
		echo "#############################################################################"
2235
		echo "#############################################################################"
2236
		echo
2236
		echo
2237
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2237
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2238
		echo
2238
		echo
2239
		echo "- Lisez attentivement la documentation d'exploitation"
2239
		echo "- Lisez attentivement la documentation d'exploitation"
2240
		echo
2240
		echo
2241
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar.localdomain"
2241
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar.localdomain"
2242
		echo
2242
		echo
2243
		echo "                   Appuyez sur 'Entrée' pour continuer"
2243
		echo "                   Appuyez sur 'Entrée' pour continuer"
2244
	else	
2244
	else	
2245
		echo "#                        End of ALCASAR install process                     #"
2245
		echo "#                        End of ALCASAR install process                     #"
2246
		echo "#                                                                           #"
2246
		echo "#                                                                           #"
2247
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2247
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2248
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2248
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2249
		echo "#                                                                           #"
2249
		echo "#                                                                           #"
2250
		echo "#############################################################################"
2250
		echo "#############################################################################"
2251
		echo
2251
		echo
2252
		echo "- The system will be rebooted in order to operate ALCASAR"
2252
		echo "- The system will be rebooted in order to operate ALCASAR"
2253
		echo
2253
		echo
2254
		echo "- Read the exploitation documentation"
2254
		echo "- Read the exploitation documentation"
2255
		echo
2255
		echo
2256
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar.localdomain"
2256
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar.localdomain"
2257
		echo
2257
		echo
2258
		echo "                   Hit 'Enter' to continue"
2258
		echo "                   Hit 'Enter' to continue"
2259
	fi
2259
	fi
2260
	sleep 2
2260
	sleep 2
2261
	if [ "$mode" != "update" ]
2261
	if [ "$mode" != "update" ]
2262
	then
2262
	then
2263
		read a
2263
		read a
2264
	fi
2264
	fi
2265
	clear
2265
	clear
2266
	reboot
2266
	reboot
2267
} # End post_install ()
2267
} # End post_install ()
2268
 
2268
 
2269
#################################
2269
#################################
2270
#  	Main Install loop  	#
2270
#  	Main Install loop  	#
2271
#################################
2271
#################################
2272
dir_exec=`dirname "$0"`
2272
dir_exec=`dirname "$0"`
2273
if [ $dir_exec != "." ]
2273
if [ $dir_exec != "." ]
2274
then
2274
then
2275
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2275
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2276
	echo "Launch this program from the ALCASAR archive directory"
2276
	echo "Launch this program from the ALCASAR archive directory"
2277
	exit 0
2277
	exit 0
2278
fi
2278
fi
2279
if [[ $EUID > 0 ]]
2279
if [[ $EUID > 0 ]]
2280
then
2280
then
2281
	echo "Vous devez être "root" pour installer ALCASAR (commande 'su')"
2281
	echo "Vous devez être "root" pour installer ALCASAR (commande 'su')"
2282
	echo "You must be "root" to install ALCASAR ('su' command)"
2282
	echo "You must be "root" to install ALCASAR ('su' command)"
2283
	exit 0
2283
	exit 0
2284
fi
2284
fi
2285
VERSION=`cat $DIR_INSTALL/VERSION`
2285
VERSION=`cat $DIR_INSTALL/VERSION`
2286
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2286
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2287
nb_args=$#
2287
nb_args=$#
2288
args=$1
2288
args=$1
2289
if [ $nb_args -eq 0 ]
2289
if [ $nb_args -eq 0 ]
2290
then
2290
then
2291
	nb_args=1
2291
	nb_args=1
2292
	args="-h"
2292
	args="-h"
2293
fi
2293
fi
2294
chmod -R u+x $DIR_SCRIPTS/*
2294
chmod -R u+x $DIR_SCRIPTS/*
2295
case $args in
2295
case $args in
2296
	-\? | -h* | --h*)
2296
	-\? | -h* | --h*)
2297
		echo "$usage"
2297
		echo "$usage"
2298
		exit 0
2298
		exit 0
2299
		;;
2299
		;;
2300
	-i | --install)
2300
	-i | --install)
2301
		header_install
2301
		header_install
2302
		license
2302
		license
2303
		header_install
2303
		header_install
2304
		testing
2304
		testing
2305
# RPMs install
2305
# RPMs install
2306
		$DIR_SCRIPTS/alcasar-urpmi.sh
2306
		$DIR_SCRIPTS/alcasar-urpmi.sh
2307
		if [ "$?" != "0" ]
2307
		if [ "$?" != "0" ]
2308
		then
2308
		then
2309
			exit 0
2309
			exit 0
2310
		fi
2310
		fi
2311
		if [ -e $CONF_FILE ]
2311
		if [ -e $CONF_FILE ]
2312
		then
2312
		then
2313
# Uninstall the running version
2313
# Uninstall the running version
2314
			$DIR_SCRIPTS/alcasar-uninstall.sh -update
2314
			$DIR_SCRIPTS/alcasar-uninstall.sh -update
2315
		fi
2315
		fi
2316
# Test if manual update	
2316
# Test if manual update	
2317
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2317
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2318
		then
2318
		then
2319
			header_install
2319
			header_install
2320
			if [ $Lang == "fr" ]
2320
			if [ $Lang == "fr" ]
2321
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2321
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2322
				else echo "The configuration file of an old version has been found";
2322
				else echo "The configuration file of an old version has been found";
2323
			fi
2323
			fi
2324
			response=0
2324
			response=0
2325
			PTN='^[oOnNyY]$'
2325
			PTN='^[oOnNyY]$'
2326
			until [[ $(expr $response : $PTN) -gt 0 ]]
2326
			until [[ $(expr $response : $PTN) -gt 0 ]]
2327
			do
2327
			do
2328
				if [ $Lang == "fr" ]
2328
				if [ $Lang == "fr" ]
2329
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2329
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2330
					else echo -n "Do you want to use it (Y/n)?";
2330
					else echo -n "Do you want to use it (Y/n)?";
2331
				 fi
2331
				 fi
2332
				read response
2332
				read response
2333
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2333
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2334
				then rm -f /tmp/alcasar-conf*
2334
				then rm -f /tmp/alcasar-conf*
2335
				fi
2335
				fi
2336
			done
2336
			done
2337
		fi
2337
		fi
2338
# Test if update
2338
# Test if update
2339
		if [ -e /tmp/alcasar-conf* ] 
2339
		if [ -e /tmp/alcasar-conf* ] 
2340
		then
2340
		then
2341
			if [ $Lang == "fr" ]
2341
			if [ $Lang == "fr" ]
2342
				then echo "#### Installation avec mise à jour ####";
2342
				then echo "#### Installation avec mise à jour ####";
2343
				else echo "#### Installation with update     ####";
2343
				else echo "#### Installation with update     ####";
2344
			fi
2344
			fi
2345
# Extract the central configuration file
2345
# Extract the central configuration file
2346
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2346
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2347
			ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2347
			ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2348
			PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2348
			PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2349
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2349
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2350
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2350
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2351
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2351
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2352
			mode="update"
2352
			mode="update"
2353
		fi
2353
		fi
2354
		for func in init network ACC CA time_server init_db freeradius chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd msec letsencrypt post_install
2354
		for func in init network ACC CA time_server init_db freeradius chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd msec letsencrypt post_install
2355
		do
2355
		do
2356
			$func
2356
			$func
2357
# echo "*** 'debug' : end of function $func ***"; read a
2357
# echo "*** 'debug' : end of function $func ***"; read a
2358
		done
2358
		done
2359
		;;
2359
		;;
2360
	-u | --uninstall)
2360
	-u | --uninstall)
2361
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
2361
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
2362
		then
2362
		then
2363
			if [ $Lang == "fr" ]
2363
			if [ $Lang == "fr" ]
2364
				then echo "ALCASAR n'est pas installé!";
2364
				then echo "ALCASAR n'est pas installé!";
2365
				else echo "ALCASAR isn't installed!";
2365
				else echo "ALCASAR isn't installed!";
2366
			fi
2366
			fi
2367
			exit 0
2367
			exit 0
2368
		fi
2368
		fi
2369
		response=0
2369
		response=0
2370
		PTN='^[oOnN]$'
2370
		PTN='^[oOnN]$'
2371
		until [[ $(expr $response : $PTN) -gt 0 ]]
2371
		until [[ $(expr $response : $PTN) -gt 0 ]]
2372
		do
2372
		do
2373
			if [ $Lang == "fr" ]
2373
			if [ $Lang == "fr" ]
2374
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2374
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2375
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2375
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2376
			fi
2376
			fi
2377
			read response
2377
			read response
2378
		done
2378
		done
2379
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2379
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2380
		then
2380
		then
2381
			$DIR_SCRIPTS/alcasar-conf.sh --create
2381
			$DIR_SCRIPTS/alcasar-conf.sh --create
2382
		else	
2382
		else	
2383
			rm -f /tmp/alcasar-conf*
2383
			rm -f /tmp/alcasar-conf*
2384
		fi
2384
		fi
2385
# Uninstall the running version
2385
# Uninstall the running version
2386
		$DIR_SCRIPTS/alcasar-uninstall.sh -full
2386
		$DIR_SCRIPTS/alcasar-uninstall.sh -full
2387
		;;
2387
		;;
2388
	*)
2388
	*)
2389
		echo "Argument inconnu :$1";
2389
		echo "Argument inconnu :$1";
2390
		echo "Unknown argument :$1";
2390
		echo "Unknown argument :$1";
2391
		echo "$usage"
2391
		echo "$usage"
2392
		exit 1
2392
		exit 1
2393
		;;
2393
		;;
2394
esac
2394
esac
2395
# end of script
2395
# end of script
2396
 
2396
 
2397
 
2397