Subversion Repositories ALCASAR

Rev

Rev 2433 | Rev 2444 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 2433 Rev 2438
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 2433 2017-10-30 23:02:21Z richard $ 
2
#  $Id: alcasar.sh 2438 2017-11-12 23:19:57Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
23
 
23
 
24
# Options :
24
# Options :
25
#       -i or --install
25
#       -i or --install
26
#       -u or --uninstall
26
#       -u or --uninstall
27
 
27
 
28
# Functions :
28
# Functions :
29
#	testing			: connectivity tests, free space test and mageia version test
29
#	testing			: connectivity tests, free space test and mageia version test
30
#	init			: Installation of RPM and scripts
30
#	init			: Installation of RPM and scripts
31
#	network			: Network parameters
31
#	network			: Network parameters
32
#	ACC			: ALCASAR Control Center installation
32
#	ACC			: ALCASAR Control Center installation
33
#	CA			: Certification Authority initialization
33
#	CA			: Certification Authority initialization
34
#	time_server		: NTPd configuration
34
#	time_server		: NTPd configuration
35
#	init_db			: Initilization of radius database managed with MariaDB
35
#	init_db			: Initilization of radius database managed with MariaDB
36
#	freeradius		: FreeRadius initialisation
36
#	freeradius		: FreeRadius initialisation
37
#	chilli			: coovachilli initialisation (+authentication page)
37
#	chilli			: coovachilli initialisation (+authentication page)
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	antivirus		: HAVP + libclamav configuration
39
#	antivirus		: HAVP + libclamav configuration
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	nfsen			: Configuration of Nfsen Netflow grapher 
42
#	nfsen			: Configuration of Nfsen Netflow grapher 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	vnstat			: little network stat daemon
44
#	vnstat			: little network stat daemon
45
#	BL			: Adaptation of Toulouse University BlackList : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	BL			: Adaptation of Toulouse University BlackList : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
46
#	cron			: Logs export + watchdog + connexion statistics
46
#	cron			: Logs export + watchdog + connexion statistics
47
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	fail2ban		: Fail2ban IDS installation and configuration
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
49
#	msec			: Mandriva security package configuration
49
#	msec			: Mandriva security package configuration
50
#	letsencrypt		: Let's Encrypt client
50
#	letsencrypt		: Let's Encrypt client
51
#	post_install		: Security, log rotation, etc.
51
#	post_install		: Security, log rotation, etc.
52
 
52
 
53
DATE=`date '+%d %B %Y - %Hh%M'`
53
DATE=`date '+%d %B %Y - %Hh%M'`
54
DATE_SHORT=`date '+%d/%m/%Y'`
54
DATE_SHORT=`date '+%d/%m/%Y'`
55
Lang=`echo $LANG|cut -c 1-2`
55
Lang=`echo $LANG|cut -c 1-2`
56
mode="install"
56
mode="install"
57
# ******* Files parameters - paramètres fichiers *********
57
# ******* Files parameters - paramètres fichiers *********
58
DIR_INSTALL=`pwd`				# current directory 
58
DIR_INSTALL=`pwd`				# current directory 
59
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
59
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
60
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
60
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
61
DIR_BLACKLIST="$DIR_INSTALL/blacklist"		# install directory (with blacklist files)
61
DIR_BLACKLIST="$DIR_INSTALL/blacklist"		# install directory (with blacklist files)
62
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
62
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
63
DIR_WEB="/var/www/html"				# directory of APACHE
63
DIR_WEB="/var/www/html"				# directory of APACHE
64
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
64
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
65
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
65
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
66
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
66
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
67
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
67
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
68
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
68
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
69
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
69
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
70
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
70
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
71
# ******* DBMS parameters - paramètres SGBD ********
71
# ******* DBMS parameters - paramètres SGBD ********
72
DB_RADIUS="radius"				# database name used by FreeRadius server
72
DB_RADIUS="radius"				# database name used by FreeRadius server
73
DB_USER="radius"				# user name allows to request the users database
73
DB_USER="radius"				# user name allows to request the users database
74
DB_GAMMU="gammu"				# database name used by Gammu-smsd
74
DB_GAMMU="gammu"				# database name used by Gammu-smsd
75
# ******* Network parameters - paramètres réseau *******
75
# ******* Network parameters - paramètres réseau *******
76
HOSTNAME="alcasar"				# default hostname
76
HOSTNAME="alcasar"				# default hostname
77
DOMAIN="localdomain"				# default local domain
77
DOMAIN="localdomain"				# default local domain
78
EXTIF=`/usr/sbin/ip route|grep default|head -n1|cut -d" " -f5`							# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
78
EXTIF=`/usr/sbin/ip route|grep default|head -n1|cut -d" " -f5`							# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
79
INTIF=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
79
INTIF=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
80
MTU="1500"
80
MTU="1500"
81
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
81
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
82
# ****** Paths - chemin des commandes *******
82
# ****** Paths - chemin des commandes *******
83
SED="/bin/sed -i"
83
SED="/bin/sed -i"
84
# ****************** End of global parameters *********************
84
# ****************** End of global parameters *********************
85
 
85
 
86
license ()
86
license ()
87
{
87
{
88
	if [ $Lang == "fr" ]
88
	if [ $Lang == "fr" ]
89
	then
89
	then
90
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
90
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
91
	else
91
	else
92
		cat $DIR_INSTALL/gpl-warning.txt | more
92
		cat $DIR_INSTALL/gpl-warning.txt | more
93
	fi
93
	fi
94
	response=0
94
	response=0
95
	PTN='^[oOyYnN]$'
95
	PTN='^[oOyYnN]$'
96
	until [[ $(expr $response : $PTN) -gt 0 ]]
96
	until [[ $(expr $response : $PTN) -gt 0 ]]
97
	do
97
	do
98
		if [ $Lang == "fr" ]
98
		if [ $Lang == "fr" ]
99
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
99
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
100
			else echo -n "Do you accept the terms of this license (Y/n)? : "
100
			else echo -n "Do you accept the terms of this license (Y/n)? : "
101
		fi
101
		fi
102
		read response
102
		read response
103
	done
103
	done
104
	if [ "$response" = "n" ] || [ "$response" = "N" ]
104
	if [ "$response" = "n" ] || [ "$response" = "N" ]
105
	then
105
	then
106
		exit 1
106
		exit 1
107
	fi
107
	fi
108
}
108
}
109
 
109
 
110
header_install ()
110
header_install ()
111
{
111
{
112
	clear
112
	clear
113
	echo "-----------------------------------------------------------------------------"
113
	echo "-----------------------------------------------------------------------------"
114
	echo "                     ALCASAR V$VERSION Installation"
114
	echo "                     ALCASAR V$VERSION Installation"
115
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
115
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
116
	echo "-----------------------------------------------------------------------------"
116
	echo "-----------------------------------------------------------------------------"
117
}
117
}
118
 
118
 
119
##################################################################
119
##################################################################
120
##			Function "testing"			##
120
##			Function "testing"			##
121
## - Test of Mageia version					##
121
## - Test of Mageia version					##
122
## - Test of ALCASAR version (if already installed)		##
122
## - Test of ALCASAR version (if already installed)		##
123
## - Test of free space on /var  (>10G)				##
123
## - Test of free space on /var  (>10G)				##
124
## - Test of Internet access					##
124
## - Test of Internet access					##
125
##################################################################
125
##################################################################
126
testing ()
126
testing ()
127
{
127
{
128
# Test of Mageia version
128
# Test of Mageia version
129
# extract the current Mageia version and hardware architecture (i586 ou X64)
129
# extract the current Mageia version and hardware architecture (i586 ou X64)
130
	fic=`cat /etc/product.id`
130
	fic=`cat /etc/product.id`
131
	unknown_os=0
131
	unknown_os=0
132
	old="$IFS"
132
	old="$IFS"
133
	IFS=","
133
	IFS=","
134
	set $fic
134
	set $fic
135
	for i in $*
135
	for i in $*
136
	do
136
	do
137
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
137
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
138
			then 
138
			then 
139
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
139
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
140
			unknown_os=`expr $unknown_os + 1`
140
			unknown_os=`expr $unknown_os + 1`
141
		fi
141
		fi
142
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
142
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
143
			then 
143
			then 
144
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
144
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
145
			unknown_os=`expr $unknown_os + 1`
145
			unknown_os=`expr $unknown_os + 1`
146
		fi
146
		fi
147
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
147
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
148
			then 
148
			then 
149
			ARCH=`echo $i|cut -d"=" -f2`
149
			ARCH=`echo $i|cut -d"=" -f2`
150
			unknown_os=`expr $unknown_os + 1`
150
			unknown_os=`expr $unknown_os + 1`
151
		fi
151
		fi
152
	done
152
	done
153
	if [ "$ARCH" == "i586" ]
153
	if [ "$ARCH" == "i586" ]
154
		then
154
		then
155
		if [ $Lang == "fr" ]
155
		if [ $Lang == "fr" ]
156
			then echo -n "Votre architecture matérielle doit être en 64bits"
156
			then echo -n "Votre architecture matérielle doit être en 64bits"
157
			else echo -n "You hardware architecture must be 64bits"
157
			else echo -n "You hardware architecture must be 64bits"
158
			exit 0
158
			exit 0
159
		fi
159
		fi
160
	fi
160
	fi
161
	IFS="$old"
161
	IFS="$old"
162
# Test if ALCASAR is already installed
162
# Test if ALCASAR is already installed
163
	if [ -e $CONF_FILE ]
163
	if [ -e $CONF_FILE ]
164
	then
164
	then
165
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
165
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
166
		if [ $Lang == "fr" ]
166
		if [ $Lang == "fr" ]
167
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
167
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
168
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
168
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
169
		fi
169
		fi
170
		response=0
170
		response=0
171
		PTN='^[oOnNyY]$'
171
		PTN='^[oOnNyY]$'
172
		until [[ $(expr $response : $PTN) -gt 0 ]]
172
		until [[ $(expr $response : $PTN) -gt 0 ]]
173
		do
173
		do
174
			if [ $Lang == "fr" ]
174
			if [ $Lang == "fr" ]
175
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
175
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
176
				else echo -n "Do you want to update (Y/n)?";
176
				else echo -n "Do you want to update (Y/n)?";
177
			 fi
177
			 fi
178
			read response
178
			read response
179
		done
179
		done
180
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
180
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
181
		then
181
		then
182
			rm -f /tmp/alcasar-conf*
182
			rm -f /tmp/alcasar-conf*
183
		else
183
		else
184
# Retrieve former NICname
184
# Retrieve former NICname
185
			EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`				# EXTernal InterFace
185
			EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`				# EXTernal InterFace
186
			INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`				# INTernal InterFace
186
			INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`				# INTernal InterFace
187
# Create the current conf file
187
# Create the current conf file
188
			$DIR_SCRIPTS/alcasar-conf.sh --create
188
			$DIR_SCRIPTS/alcasar-conf.sh --create
189
			mode="update"
189
			mode="update"
190
		fi
190
		fi
191
	fi
191
	fi
192
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "6" ) ]]
192
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "6" ) ]]
193
		then
193
		then
194
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
194
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
195
			then
195
			then
196
			echo
196
			echo
197
			if [ $Lang == "fr" ]
197
			if [ $Lang == "fr" ]
198
				then	
198
				then	
199
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
199
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
200
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
200
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
201
				echo "2 - Installez Linux-Mageia 6.0 (64bits) et ALCASAR (cf. doc d'installation)"
201
				echo "2 - Installez Linux-Mageia 6.0 (64bits) et ALCASAR (cf. doc d'installation)"
202
				echo "3 - Importez votre base des usagers"
202
				echo "3 - Importez votre base des usagers"
203
			else
203
			else
204
				echo "The automatic update of ALCASAR can't be performed."
204
				echo "The automatic update of ALCASAR can't be performed."
205
				echo "1 - Save your traceability files and the user database"
205
				echo "1 - Save your traceability files and the user database"
206
				echo "2 - Install Linux-Mageia 6 (64bits) & ALCASAR (cf. installation doc)"
206
				echo "2 - Install Linux-Mageia 6 (64bits) & ALCASAR (cf. installation doc)"
207
				echo "3 - Import your users database"
207
				echo "3 - Import your users database"
208
			fi
208
			fi
209
		else
209
		else
210
			if [ $Lang == "fr" ]
210
			if [ $Lang == "fr" ]
211
				then	
211
				then	
212
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
212
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
213
			else
213
			else
214
				echo "The installation of ALCASAR can't be performed."
214
				echo "The installation of ALCASAR can't be performed."
215
			fi
215
			fi
216
		fi
216
		fi
217
		echo
217
		echo
218
		if [ $Lang == "fr" ]
218
		if [ $Lang == "fr" ]
219
			then	
219
			then	
220
			echo "Le système d'exploitation doit être remplacé (Mageia6-64bits)"
220
			echo "Le système d'exploitation doit être remplacé (Mageia6-64bits)"
221
		else
221
		else
222
			echo "The OS must be replaced (Mageia6-64bits)"
222
			echo "The OS must be replaced (Mageia6-64bits)"
223
		fi
223
		fi
224
		exit 0
224
		exit 0
225
	fi
225
	fi
226
	if [ ! -d /var/log/netflow/porttracker ]
226
	if [ ! -d /var/log/netflow/porttracker ]
227
		then
227
		then
228
# Test free space on /var
228
# Test free space on /var
229
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
229
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
230
		if [ $free_space -lt 10 ]
230
		if [ $free_space -lt 10 ]
231
			then
231
			then
232
			if [ $Lang == "fr" ]
232
			if [ $Lang == "fr" ]
233
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
233
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
234
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
234
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
235
			fi
235
			fi
236
		exit 0
236
		exit 0
237
		fi
237
		fi
238
	fi
238
	fi
239
	if [ $Lang == "fr" ]
239
	if [ $Lang == "fr" ]
240
		then echo -n "Tests des paramètres réseau : "
240
		then echo -n "Tests des paramètres réseau : "
241
		else echo -n "Network parameters tests : "
241
		else echo -n "Network parameters tests : "
242
	fi
242
	fi
243
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
243
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
244
	cd /etc/sysconfig/network-scripts/
244
	cd /etc/sysconfig/network-scripts/
245
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
245
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
246
	for i in $IF_INTERFACES
246
	for i in $IF_INTERFACES
247
	do
247
	do
248
		IP_INTERFACE=`/usr/sbin/ip link|grep $i`	
248
		IP_INTERFACE=`/usr/sbin/ip link|grep $i`	
249
		if [ -z "$IP_INTERFACE" ]
249
		if [ -z "$IP_INTERFACE" ]
250
		then
250
		then
251
			rm -f ifcfg-$i
251
			rm -f ifcfg-$i
252
			
252
			
253
			if [ $Lang == "fr" ]
253
			if [ $Lang == "fr" ]
254
				then echo "Suppression : ifcfg-$i"
254
				then echo "Suppression : ifcfg-$i"
255
				else echo "Deleting : ifcfg-$i"
255
				else echo "Deleting : ifcfg-$i"
256
			fi
256
			fi
257
		fi
257
		fi
258
	done
258
	done
259
	cd $DIR_INSTALL
259
	cd $DIR_INSTALL
260
	echo -n "."
260
	echo -n "."
261
# Test Ethernet NIC links state 
261
# Test Ethernet NIC links state 
262
	DOWN_IF=`/usr/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "|grep -v "^w"`
262
	DOWN_IF=`/usr/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "|grep -v "^w"`
263
	for i in $DOWN_IF
263
	for i in $DOWN_IF
264
	do
264
	do
265
		echo $i
265
		echo $i
266
		if [ $Lang == "fr" ]
266
		if [ $Lang == "fr" ]
267
		then 
267
		then 
268
			echo "Échec"
268
			echo "Échec"
269
			echo "Le lien réseau de la carte $i n'est pas actif."
269
			echo "Le lien réseau de la carte $i n'est pas actif."
270
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
270
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
271
		else
271
		else
272
			echo "Failed"
272
			echo "Failed"
273
			echo "The link state of $i interface is down."
273
			echo "The link state of $i interface is down."
274
			echo "Make sure that this network card is connected to a switch or an A.P."
274
			echo "Make sure that this network card is connected to a switch or an A.P."
275
		fi
275
		fi
276
		exit 0
276
		exit 0
277
	done
277
	done
278
	echo -n "."
278
	echo -n "."
279
# Test EXTIF config files
279
# Test EXTIF config files
280
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
280
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
281
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
281
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
282
	PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
282
	PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
283
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
283
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
284
	then
284
	then
285
		if [ $Lang == "fr" ]
285
		if [ $Lang == "fr" ]
286
		then 
286
		then 
287
			echo "Échec"
287
			echo "Échec"
288
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
288
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
289
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
289
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
290
			echo "Appliquez les changements : 'systemctl restart network'"
290
			echo "Appliquez les changements : 'systemctl restart network'"
291
		else
291
		else
292
			echo "Failed"
292
			echo "Failed"
293
			echo "The Internet connected network card ($EXTIF) isn't well configured."
293
			echo "The Internet connected network card ($EXTIF) isn't well configured."
294
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
294
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
295
			echo "Apply the new configuration 'systemctl restart network'"
295
			echo "Apply the new configuration 'systemctl restart network'"
296
		fi
296
		fi
297
		echo "DEVICE=$EXTIF"
297
		echo "DEVICE=$EXTIF"
298
		echo "IPADDR="
298
		echo "IPADDR="
299
		echo "NETMASK="
299
		echo "NETMASK="
300
		echo "GATEWAY="
300
		echo "GATEWAY="
301
		echo "DNS1="
301
		echo "DNS1="
302
		echo "DNS2="
302
		echo "DNS2="
303
		echo "ONBOOT=yes"
303
		echo "ONBOOT=yes"
304
		exit 0
304
		exit 0
305
	fi
305
	fi
306
	echo -n "."
306
	echo -n "."
307
# Test if default GW is set on EXTIF (router or ISP provider equipment)
307
# Test if default GW is set on EXTIF (router or ISP provider equipment)
308
	if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
308
	if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
309
		if [ $Lang == "fr" ]
309
		if [ $Lang == "fr" ]
310
		then 
310
		then 
311
			echo "Échec"
311
			echo "Échec"
312
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
312
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
313
			echo "Réglez ce problème puis relancez ce script."
313
			echo "Réglez ce problème puis relancez ce script."
314
		else
314
		else
315
			echo "Failed"
315
			echo "Failed"
316
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
316
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
317
			echo "Resolv this problem, then restart this script."
317
			echo "Resolv this problem, then restart this script."
318
		fi
318
		fi
319
		exit 0
319
		exit 0
320
	fi
320
	fi
321
	echo -n "."
321
	echo -n "."
322
# Test if default GW is alive
322
# Test if default GW is alive
323
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
323
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
324
	if [ $(expr $arp_reply) -eq 0 ]
324
	if [ $(expr $arp_reply) -eq 0 ]
325
	       	then
325
	       	then
326
		if [ $Lang == "fr" ]
326
		if [ $Lang == "fr" ]
327
		then 
327
		then 
328
			echo "Échec"
328
			echo "Échec"
329
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
329
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
330
			echo "Réglez ce problème puis relancez ce script."
330
			echo "Réglez ce problème puis relancez ce script."
331
		else
331
		else
332
			echo "Failed"
332
			echo "Failed"
333
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
333
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
334
			echo "Resolv this problem, then restart this script."
334
			echo "Resolv this problem, then restart this script."
335
		fi
335
		fi
336
		exit 0
336
		exit 0
337
	fi
337
	fi
338
	echo -n "."
338
	echo -n "."
339
# Test Internet connectivity
339
# Test Internet connectivity
340
	rm -rf /tmp/con_ok.html
340
	rm -rf /tmp/con_ok.html
341
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
341
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
342
	if [ ! -e /tmp/con_ok.html ]
342
	if [ ! -e /tmp/con_ok.html ]
343
	then
343
	then
344
		if [ $Lang == "fr" ]
344
		if [ $Lang == "fr" ]
345
		then 
345
		then 
346
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
346
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
347
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
347
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
348
			echo "Vérifiez la validité des adresses IP des DNS."
348
			echo "Vérifiez la validité des adresses IP des DNS."
349
		else
349
		else
350
			echo "The Internet connection try failed (google.fr)."
350
			echo "The Internet connection try failed (google.fr)."
351
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
351
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
352
			echo "Verify the DNS IP addresses"
352
			echo "Verify the DNS IP addresses"
353
		fi
353
		fi
354
		exit 0
354
		exit 0
355
	fi
355
	fi
356
	rm -rf /tmp/con_ok.html
356
	rm -rf /tmp/con_ok.html
357
	echo ". : ok"
357
	echo ". : ok"
358
} # end of testing ()
358
} # end of testing ()
359
 
359
 
360
##################################################################
360
##################################################################
361
##			Function "init"				##
361
##			Function "init"				##
362
## - Création du fichier "/root/ALCASAR_parametres.tx		##
362
## - Création du fichier "/root/ALCASAR_parametres.tx		##
363
## - Installation et modification des scripts du portail	##
363
## - Installation et modification des scripts du portail	##
364
##################################################################
364
##################################################################
365
init ()
365
init ()
366
{
366
{
367
	if [ "$mode" != "update" ]
367
	if [ "$mode" != "update" ]
368
	then
368
	then
369
# On affecte le nom d'organisme
369
# On affecte le nom d'organisme
370
		header_install
370
		header_install
371
		ORGANISME=!
371
		ORGANISME=!
372
		PTN='^[a-zA-Z0-9-]*$'
372
		PTN='^[a-zA-Z0-9-]*$'
373
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
373
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
374
                do
374
                do
375
			if [ $Lang == "fr" ]
375
			if [ $Lang == "fr" ]
376
			       	then echo -n "Entrez le nom de votre organisme : "
376
			       	then echo -n "Entrez le nom de votre organisme : "
377
				else echo -n "Enter the name of your organism : "
377
				else echo -n "Enter the name of your organism : "
378
			fi
378
			fi
379
			read ORGANISME
379
			read ORGANISME
380
			if [ "$ORGANISME" == "" ]
380
			if [ "$ORGANISME" == "" ]
381
				then
381
				then
382
				ORGANISME=!
382
				ORGANISME=!
383
			fi
383
			fi
384
		done
384
		done
385
	fi
385
	fi
386
# On crée aléatoirement les mots de passe et les secrets partagés
386
# On crée aléatoirement les mots de passe et les secrets partagés
387
# We create random passwords and shared secrets
387
# We create random passwords and shared secrets
388
	rm -f $PASSWD_FILE
388
	rm -f $PASSWD_FILE
389
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
389
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
390
	grub2pwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
390
	grub2pwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
391
    pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
391
    pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
392
        LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
392
        LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
393
        grep -v '[eE]nter password:' | \
393
        grep -v '[eE]nter password:' | \
394
        sed -e "s/PBKDF2 hash of your password is //"`
394
        sed -e "s/PBKDF2 hash of your password is //"`
395
    echo "GRUB2_PASSWORD=$pbkdf2" > /boot/grub2/user.cfg
395
    echo "GRUB2_PASSWORD=$pbkdf2" > /boot/grub2/user.cfg
396
    [ -e /etc/grub.d/default-10_linux ] || cp /etc/grub.d/10_linux /etc/grub.d/default-10_linux
396
    [ -e /etc/grub.d/default-10_linux ] || cp /etc/grub.d/10_linux /etc/grub.d/default-10_linux
397
    cp -f $DIR_CONF/grub-10_linux /etc/grub.d/10_linux  # Request password only on menu editing attempts (not when selecting an entry)
397
    cp -f $DIR_CONF/grub-10_linux /etc/grub.d/10_linux  # Request password only on menu editing attempts (not when selecting an entry)
398
    chmod 0600 /boot/grub2/user.cfg
398
    chmod 0600 /boot/grub2/user.cfg
399
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
399
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
400
    echo "GRUB2_user=root" >> $PASSWD_FILE
400
    echo "GRUB2_user=root" >> $PASSWD_FILE
401
    echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
401
    echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
402
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
402
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
403
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
403
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
404
	echo "db_root=$mysqlpwd" >> $PASSWD_FILE
404
	echo "db_root=$mysqlpwd" >> $PASSWD_FILE
405
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
405
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
406
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
406
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
407
	echo "db_user=$DB_USER" >> $PASSWD_FILE
407
	echo "db_user=$DB_USER" >> $PASSWD_FILE
408
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
408
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
409
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
409
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
410
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
410
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
411
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
411
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
412
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
412
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
413
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
413
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
414
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
414
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
415
	chmod 640 $PASSWD_FILE
415
	chmod 640 $PASSWD_FILE
416
#  copy scripts in in /usr/local/bin
416
#  copy scripts in in /usr/local/bin
417
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
417
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
418
#  copy conf files in /usr/local/etc
418
#  copy conf files in /usr/local/etc
419
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
419
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
420
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mysql.sh
420
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mysql.sh
421
# generate central conf file
421
# generate central conf file
422
	cat <<EOF > $CONF_FILE
422
	cat <<EOF > $CONF_FILE
423
##########################################
423
##########################################
424
##                                      ##
424
##                                      ##
425
##          ALCASAR Parameters          ##
425
##          ALCASAR Parameters          ##
426
##                                      ##
426
##                                      ##
427
##########################################
427
##########################################
428
 
428
 
429
INSTALL_DATE=$DATE
429
INSTALL_DATE=$DATE
430
VERSION=$VERSION
430
VERSION=$VERSION
431
ORGANISM=$ORGANISME
431
ORGANISM=$ORGANISME
432
HOSTNAME=$HOSTNAME
432
HOSTNAME=$HOSTNAME
433
DOMAIN=$DOMAIN
433
DOMAIN=$DOMAIN
434
EOF
434
EOF
435
	chmod o-rwx $CONF_FILE
435
	chmod o-rwx $CONF_FILE
436
} # End of init ()
436
} # End of init ()
437
 
437
 
438
##################################################################
438
##################################################################
439
##			Function "network"			##
439
##			Function "network"			##
440
## - Définition du plan d'adressage du réseau de consultation	##
440
## - Définition du plan d'adressage du réseau de consultation	##
441
## - Nommage DNS du système 					##
441
## - Nommage DNS du système 					##
442
## - Configuration de l'interface INTIF (réseau de consultation)##
442
## - Configuration de l'interface INTIF (réseau de consultation)##
443
## - Modification du fichier /etc/hosts				##
443
## - Modification du fichier /etc/hosts				##
444
## - Renseignement des fichiers hosts.allow et hosts.deny	##
444
## - Renseignement des fichiers hosts.allow et hosts.deny	##
445
##################################################################
445
##################################################################
446
network ()
446
network ()
447
{
447
{
448
	header_install
448
	header_install
449
	if [ "$mode" != "update" ]
449
	if [ "$mode" != "update" ]
450
		then
450
		then
451
		if [ $Lang == "fr" ]
451
		if [ $Lang == "fr" ]
452
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
452
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
453
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
453
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
454
		fi
454
		fi
455
		response=0
455
		response=0
456
		PTN='^[oOyYnN]$'
456
		PTN='^[oOyYnN]$'
457
		until [[ $(expr $response : $PTN) -gt 0 ]]
457
		until [[ $(expr $response : $PTN) -gt 0 ]]
458
		do
458
		do
459
			if [ $Lang == "fr" ]
459
			if [ $Lang == "fr" ]
460
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
460
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
461
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
461
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
462
			fi
462
			fi
463
			read response
463
			read response
464
		done
464
		done
465
		if [ "$response" = "n" ] || [ "$response" = "N" ]
465
		if [ "$response" = "n" ] || [ "$response" = "N" ]
466
		then
466
		then
467
			PRIVATE_IP_MASK="0"
467
			PRIVATE_IP_MASK="0"
468
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
468
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
469
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
469
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
470
			do
470
			do
471
				if [ $Lang == "fr" ]
471
				if [ $Lang == "fr" ]
472
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
472
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
473
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
473
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
474
				fi
474
				fi
475
				read PRIVATE_IP_MASK
475
				read PRIVATE_IP_MASK
476
			done
476
			done
477
		else
477
		else
478
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
478
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
479
		fi
479
		fi
480
	else
480
	else
481
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= conf/etc/alcasar.conf|cut -d"=" -f2` 
481
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= conf/etc/alcasar.conf|cut -d"=" -f2` 
482
		rm -rf conf/etc/alcasar.conf
482
		rm -rf conf/etc/alcasar.conf
483
	fi
483
	fi
484
# Define LAN side global parameters
484
# Define LAN side global parameters
485
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
485
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
486
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
486
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
487
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
487
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
488
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
488
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
489
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
489
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
490
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
490
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
491
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
491
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
492
		then
492
		then
493
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
493
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
494
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
494
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
495
	fi	
495
	fi	
496
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
496
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
497
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
497
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
498
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
498
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
499
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
499
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
500
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
500
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
501
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
501
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
502
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
502
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
503
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
503
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
504
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
504
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
505
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
505
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
506
# Define Internet parameters
506
# Define Internet parameters
507
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
507
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
508
	nb_dns=`grep -c ^nameserver /etc/resolv.conf`
508
	nb_dns=`grep -c ^nameserver /etc/resolv.conf`
509
	if [ $nb_dns == 2 ]
509
	if [ $nb_dns == 2 ]
510
		then
510
		then
511
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
511
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
512
	fi
512
	fi
513
	DNS1=${DNS1:=208.67.220.220}
513
	DNS1=${DNS1:=208.67.220.220}
514
	DNS2=${DNS2:=208.67.222.222}
514
	DNS2=${DNS2:=208.67.222.222}
515
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
515
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
516
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
516
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
517
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
517
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
518
# Wrtie the conf file
518
# Wrtie the conf file
519
	echo "EXTIF=$EXTIF" >> $CONF_FILE
519
	echo "EXTIF=$EXTIF" >> $CONF_FILE
520
	echo "INTIF=$INTIF" >> $CONF_FILE
520
	echo "INTIF=$INTIF" >> $CONF_FILE
521
	######## Récupération des interfaces du ou des réseaux de consultation supplémentaires #################
521
	######## Récupération des interfaces du ou des réseaux de consultation supplémentaires #################
522
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
522
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
523
 
523
 
524
	for i in $INTERFACES
524
	for i in $INTERFACES
525
	do
525
	do
526
		SUB=`echo ${i:0:2}`
526
		SUB=`echo ${i:0:2}`
527
		if [ $SUB = "wl" ]
527
		if [ $SUB = "wl" ]
528
			then WIFIF=$i
528
			then WIFIF=$i
529
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ] 
529
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ] 
530
			then LANIF=$i
530
			then LANIF=$i
531
		fi
531
		fi
532
	done
532
	done
533
 
533
 
534
	if [ -n "$WIFIF" ]
534
	if [ -n "$WIFIF" ]
535
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
535
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
536
	elif [ -n "$LANIF" ]
536
	elif [ -n "$LANIF" ]
537
		then echo "LANIF=$LANIF" >> $CONF_FILE
537
		then echo "LANIF=$LANIF" >> $CONF_FILE
538
	fi
538
	fi
539
	#########################################################################################################	
539
	#########################################################################################################	
540
	
540
	
541
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
541
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
542
	if [ $IP_SETTING == "dhcp" ]
542
	if [ $IP_SETTING == "dhcp" ]
543
		then
543
		then
544
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
544
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
545
		echo "GW=dhcp" >> $CONF_FILE
545
		echo "GW=dhcp" >> $CONF_FILE
546
	else
546
	else
547
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
547
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
548
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
548
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
549
	fi
549
	fi
550
	echo "DNS1=$DNS1" >> $CONF_FILE
550
	echo "DNS1=$DNS1" >> $CONF_FILE
551
	echo "DNS2=$DNS2" >> $CONF_FILE
551
	echo "DNS2=$DNS2" >> $CONF_FILE
552
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
552
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
553
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
553
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
554
	echo "DHCP=on" >> $CONF_FILE
554
	echo "DHCP=on" >> $CONF_FILE
555
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
555
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
556
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
556
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
557
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
557
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
558
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
558
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
559
	echo "INT_DNS_IP=none" >> $CONF_FILE
559
	echo "INT_DNS_IP=none" >> $CONF_FILE
560
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
560
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
561
# network default
561
# network default
562
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
562
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
563
	cat <<EOF > /etc/sysconfig/network
563
	cat <<EOF > /etc/sysconfig/network
564
NETWORKING=yes
564
NETWORKING=yes
565
FORWARD_IPV4=true
565
FORWARD_IPV4=true
566
EOF
566
EOF
567
# /etc/hosts config
567
# /etc/hosts config
568
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
568
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
569
	cat <<EOF > /etc/hosts
569
	cat <<EOF > /etc/hosts
570
127.0.0.1	localhost
570
127.0.0.1	localhost
571
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME
571
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME
572
EOF
572
EOF
573
# EXTIF (Internet) config
573
# EXTIF (Internet) config
574
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
574
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
575
	if [ $IP_SETTING == "dhcp" ]
575
	if [ $IP_SETTING == "dhcp" ]
576
		then
576
		then
577
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
577
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
578
DEVICE=$EXTIF
578
DEVICE=$EXTIF
579
BOOTPROTO=dhcp
579
BOOTPROTO=dhcp
580
DNS1=127.0.0.1
580
DNS1=127.0.0.1
581
PEERDNS=no
581
PEERDNS=no
582
RESOLV_MODS=yes
582
RESOLV_MODS=yes
583
ONBOOT=yes
583
ONBOOT=yes
584
NOZEROCONF=yes
584
NOZEROCONF=yes
585
METRIC=10
585
METRIC=10
586
MII_NOT_SUPPORTED=yes
586
MII_NOT_SUPPORTED=yes
587
IPV6INIT=no
587
IPV6INIT=no
588
IPV6TO4INIT=no
588
IPV6TO4INIT=no
589
ACCOUNTING=no
589
ACCOUNTING=no
590
USERCTL=no
590
USERCTL=no
591
MTU=$MTU
591
MTU=$MTU
592
EOF
592
EOF
593
		else	
593
		else	
594
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
594
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
595
DEVICE=$EXTIF
595
DEVICE=$EXTIF
596
BOOTPROTO=static
596
BOOTPROTO=static
597
IPADDR=$PUBLIC_IP
597
IPADDR=$PUBLIC_IP
598
NETMASK=$PUBLIC_NETMASK
598
NETMASK=$PUBLIC_NETMASK
599
GATEWAY=$PUBLIC_GATEWAY
599
GATEWAY=$PUBLIC_GATEWAY
600
DNS1=127.0.0.1
600
DNS1=127.0.0.1
601
RESOLV_MODS=yes
601
RESOLV_MODS=yes
602
ONBOOT=yes
602
ONBOOT=yes
603
METRIC=10
603
METRIC=10
604
NOZEROCONF=yes
604
NOZEROCONF=yes
605
MII_NOT_SUPPORTED=yes
605
MII_NOT_SUPPORTED=yes
606
IPV6INIT=no
606
IPV6INIT=no
607
IPV6TO4INIT=no
607
IPV6TO4INIT=no
608
ACCOUNTING=no
608
ACCOUNTING=no
609
USERCTL=no
609
USERCTL=no
610
MTU=$MTU
610
MTU=$MTU
611
EOF
611
EOF
612
	fi
612
	fi
613
# Config INTIF (consultation LAN) in normal mode
613
# Config INTIF (consultation LAN) in normal mode
614
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
614
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
615
DEVICE=$INTIF
615
DEVICE=$INTIF
616
BOOTPROTO=static
616
BOOTPROTO=static
617
ONBOOT=yes
617
ONBOOT=yes
618
NOZEROCONF=yes
618
NOZEROCONF=yes
619
MII_NOT_SUPPORTED=yes
619
MII_NOT_SUPPORTED=yes
620
IPV6INIT=no
620
IPV6INIT=no
621
IPV6TO4INIT=no
621
IPV6TO4INIT=no
622
ACCOUNTING=no
622
ACCOUNTING=no
623
USERCTL=no
623
USERCTL=no
624
EOF
624
EOF
625
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
625
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
626
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
626
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
627
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
627
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
628
DEVICE=$INTIF
628
DEVICE=$INTIF
629
BOOTPROTO=static
629
BOOTPROTO=static
630
IPADDR=$PRIVATE_IP
630
IPADDR=$PRIVATE_IP
631
NETMASK=$PRIVATE_NETMASK
631
NETMASK=$PRIVATE_NETMASK
632
ONBOOT=yes
632
ONBOOT=yes
633
METRIC=10
633
METRIC=10
634
NOZEROCONF=yes
634
NOZEROCONF=yes
635
MII_NOT_SUPPORTED=yes
635
MII_NOT_SUPPORTED=yes
636
IPV6INIT=no
636
IPV6INIT=no
637
IPV6TO4INIT=no
637
IPV6TO4INIT=no
638
ACCOUNTING=no
638
ACCOUNTING=no
639
USERCTL=no
639
USERCTL=no
640
EOF
640
EOF
641
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
641
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
642
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
642
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
643
	then
643
	then
644
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
644
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
645
DEVICE=$WIFIF
645
DEVICE=$WIFIF
646
BOOTPROTO=static
646
BOOTPROTO=static
647
ONBOOT=yes
647
ONBOOT=yes
648
NOZEROCONF=yes
648
NOZEROCONF=yes
649
MII_NOT_SUPPORTED=yes
649
MII_NOT_SUPPORTED=yes
650
IPV6INIT=no
650
IPV6INIT=no
651
IPV6TO4INIT=no
651
IPV6TO4INIT=no
652
ACCOUNTING=no
652
ACCOUNTING=no
653
USERCTL=no
653
USERCTL=no
654
EOF
654
EOF
655
	elif [ -n "$LANIF" ]
655
	elif [ -n "$LANIF" ]
656
	then
656
	then
657
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
657
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
658
DEVICE=$LANIF
658
DEVICE=$LANIF
659
BOOTPROTO=static
659
BOOTPROTO=static
660
ONBOOT=yes
660
ONBOOT=yes
661
NOZEROCONF=yes
661
NOZEROCONF=yes
662
MII_NOT_SUPPORTED=yes
662
MII_NOT_SUPPORTED=yes
663
IPV6INIT=no
663
IPV6INIT=no
664
IPV6TO4INIT=no
664
IPV6TO4INIT=no
665
ACCOUNTING=no
665
ACCOUNTING=no
666
USERCTL=no
666
USERCTL=no
667
EOF
667
EOF
668
	fi
668
	fi
669
	#########################################################################################################	
669
	#########################################################################################################	
670
# Renseignement des fichiers hosts.allow et hosts.deny
670
# Renseignement des fichiers hosts.allow et hosts.deny
671
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
671
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
672
	cat <<EOF > /etc/hosts.allow
672
	cat <<EOF > /etc/hosts.allow
673
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
673
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
674
sshd: ALL
674
sshd: ALL
675
ntpd: $PRIVATE_NETWORK_SHORT
675
ntpd: $PRIVATE_NETWORK_SHORT
676
EOF
676
EOF
677
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
677
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
678
	cat <<EOF > /etc/hosts.deny
678
	cat <<EOF > /etc/hosts.deny
679
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
679
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
680
EOF
680
EOF
681
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
681
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
682
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
682
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
683
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
683
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
684
# load conntrack ftp module
684
# load conntrack ftp module
685
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
685
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
686
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
686
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
687
# load ipt_NETFLOW module
687
# load ipt_NETFLOW module
688
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
688
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
689
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
689
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
690
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
690
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
691
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
691
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
692
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
692
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
693
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
693
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
694
# 
694
# 
695
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
695
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
696
} # End of network ()
696
} # End of network ()
697
 
697
 
698
##################################################################
698
##################################################################
699
##			Function "ACC"				##
699
##			Function "ACC"				##
700
## - installation of then ALCASAR Control Center (ACC)	)	##
700
## - installation of then ALCASAR Control Center (ACC)	)	##
701
## - configuration of the web server (Apache)			##
701
## - configuration of the web server (Apache)			##
702
## - creation of the first ACC admin account 			##
702
## - creation of the first ACC admin account 			##
703
## - secure the access						##
703
## - secure the access						##
704
##################################################################
704
##################################################################
705
ACC ()
705
ACC ()
706
{
706
{
707
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
707
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
708
	mkdir $DIR_WEB
708
	mkdir $DIR_WEB
709
# Copy & adapt ACC files
709
# Copy & adapt ACC files
710
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
710
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
711
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
711
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
712
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
712
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
713
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
713
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
714
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
714
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
715
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
715
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
716
	chown -R apache:apache $DIR_WEB/*
716
	chown -R apache:apache $DIR_WEB/*
717
# copy & adapt "freeradius-web" files
717
# copy & adapt "freeradius-web" files
718
	cp -rf $DIR_CONF/freeradius-web/ /etc/
718
	cp -rf $DIR_CONF/freeradius-web/ /etc/
719
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
719
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
720
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
720
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
721
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
721
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
722
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
722
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
723
	cat <<EOF > /etc/freeradius-web/naslist.conf
723
	cat <<EOF > /etc/freeradius-web/naslist.conf
724
nas1_name: alcasar-$ORGANISME
724
nas1_name: alcasar-$ORGANISME
725
nas1_model: Network Access Controler
725
nas1_model: Network Access Controler
726
nas1_ip: $PRIVATE_IP
726
nas1_ip: $PRIVATE_IP
727
nas1_port_num: 0
727
nas1_port_num: 0
728
nas1_community: public
728
nas1_community: public
729
EOF
729
EOF
730
	chown -R apache:apache /etc/freeradius-web/
730
	chown -R apache:apache /etc/freeradius-web/
731
# create the log & backup structure :
731
# create the log & backup structure :
732
# - base = users database
732
# - base = users database
733
# - archive = tarball of "base + http firewall + netflow"
733
# - archive = tarball of "base + http firewall + netflow"
734
# - security = watchdog log
734
# - security = watchdog log
735
	for i in base archive security activity_report;
735
	for i in base archive security activity_report;
736
	do
736
	do
737
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
737
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
738
	done
738
	done
739
	chown -R root:apache $DIR_SAVE
739
	chown -R root:apache $DIR_SAVE
740
# Configuring & securing php
740
# Configuring & securing php
741
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
741
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
742
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
742
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
743
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
743
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
744
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
744
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
745
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
745
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
746
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
746
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
747
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
747
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
748
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
748
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
749
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
749
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
750
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
750
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
751
# Configuring & sécuring Apache
751
# Configuring & sécuring Apache
752
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
752
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
753
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
753
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
754
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
754
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
755
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
755
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
756
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
756
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
757
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
757
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
758
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
758
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
759
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
759
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
760
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
760
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
761
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
761
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
762
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
762
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
763
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
763
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
764
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
764
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
765
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
765
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
766
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
766
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
767
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
767
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
768
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
768
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
769
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
769
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
770
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
770
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
771
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
771
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
772
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
772
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
773
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
773
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
774
# Error page management
774
# Error page management
775
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
775
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
776
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
776
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
777
Alias /error/ "/var/www/html/"
777
Alias /error/ "/var/www/html/"
778
<Directory "/usr/share/httpd/error">
778
<Directory "/usr/share/httpd/error">
779
    AllowOverride None
779
    AllowOverride None
780
    Options IncludesNoExec
780
    Options IncludesNoExec
781
    AddOutputFilter Includes html
781
    AddOutputFilter Includes html
782
    AddHandler type-map var
782
    AddHandler type-map var
783
    Require all granted
783
    Require all granted
784
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
784
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
785
    ForceLanguagePriority Prefer Fallback
785
    ForceLanguagePriority Prefer Fallback
786
</Directory>
786
</Directory>
787
ErrorDocument 400 /error/error.php?error=400
787
ErrorDocument 400 /error/error.php?error=400
788
ErrorDocument 401 /error/error.php?error=401
788
ErrorDocument 401 /error/error.php?error=401
789
ErrorDocument 403 /error/error.php?error=403
789
ErrorDocument 403 /error/error.php?error=403
790
ErrorDocument 404 /error/index.php
790
ErrorDocument 404 /error/index.php
791
ErrorDocument 405 /error/error.php?error=405
791
ErrorDocument 405 /error/error.php?error=405
792
ErrorDocument 408 /error/error.php?error=408
792
ErrorDocument 408 /error/error.php?error=408
793
ErrorDocument 410 /error/error.php?error=410
793
ErrorDocument 410 /error/error.php?error=410
794
ErrorDocument 411 /error/error.php?error=411
794
ErrorDocument 411 /error/error.php?error=411
795
ErrorDocument 412 /error/error.php?error=412
795
ErrorDocument 412 /error/error.php?error=412
796
ErrorDocument 413 /error/error.php?error=413
796
ErrorDocument 413 /error/error.php?error=413
797
ErrorDocument 414 /error/error.php?error=414
797
ErrorDocument 414 /error/error.php?error=414
798
ErrorDocument 415 /error/error.php?error=415
798
ErrorDocument 415 /error/error.php?error=415
799
ErrorDocument 500 /error/error.php?error=500
799
ErrorDocument 500 /error/error.php?error=500
800
ErrorDocument 501 /error/error.php?error=501
800
ErrorDocument 501 /error/error.php?error=501
801
ErrorDocument 502 /error/error.php?error=502
801
ErrorDocument 502 /error/error.php?error=502
802
ErrorDocument 503 /error/error.php?error=503
802
ErrorDocument 503 /error/error.php?error=503
803
ErrorDocument 506 /error/error.php?error=506
803
ErrorDocument 506 /error/error.php?error=506
804
EOF
804
EOF
805
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
805
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
806
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
806
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
807
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
807
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
808
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
808
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
809
</body>
809
</body>
810
</html>
810
</html>
811
EOF
811
EOF
812
# Définition du premier compte lié au profil 'admin'
812
# Définition du premier compte lié au profil 'admin'
813
	if [ "$mode" = "install" ]
813
	if [ "$mode" = "install" ]
814
		then
814
		then
815
			header_install
815
			header_install
816
			admin_portal=!
816
			admin_portal=!
817
			PTN='^[a-zA-Z0-9-]*$'
817
			PTN='^[a-zA-Z0-9-]*$'
818
			until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
818
			until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
819
				do
819
				do
820
				header_install
820
				header_install
821
				if [ $Lang == "fr" ]
821
				if [ $Lang == "fr" ]
822
				then 
822
				then 
823
					echo ""
823
					echo ""
824
					echo "Définissez un premier compte d'administration d'ALCASAR :"
824
					echo "Définissez un premier compte d'administration d'ALCASAR :"
825
					echo
825
					echo
826
					echo -n "Nom : "
826
					echo -n "Nom : "
827
				else
827
				else
828
					echo ""
828
					echo ""
829
					echo "Define the first account allow to administrate ALCASAR :"
829
					echo "Define the first account allow to administrate ALCASAR :"
830
					echo
830
					echo
831
					echo -n "Account : "
831
					echo -n "Account : "
832
				fi
832
				fi
833
				read admin_portal
833
				read admin_portal
834
				if [ "$admin_portal" == "" ]
834
				if [ "$admin_portal" == "" ]
835
					then
835
					then
836
					admin_portal=!
836
					admin_portal=!
837
				fi
837
				fi
838
				done
838
				done
839
# Creation of keys file for the admin account ("admin")
839
# Creation of keys file for the admin account ("admin")
840
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
840
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
841
			mkdir -p $DIR_DEST_ETC/digest
841
			mkdir -p $DIR_DEST_ETC/digest
842
			chmod 755 $DIR_DEST_ETC/digest
842
			chmod 755 $DIR_DEST_ETC/digest
843
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
843
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
844
				do
844
				do
845
					/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin "ALCASAR Control Center (ACC)" $admin_portal
845
					/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin "ALCASAR Control Center (ACC)" $admin_portal
846
				done
846
				done
847
			$DIR_DEST_BIN/alcasar-profil.sh --list
847
			$DIR_DEST_BIN/alcasar-profil.sh --list
848
	fi
848
	fi
849
# ACC partitioning
849
# ACC partitioning
850
	rm -f /etc/httpd/conf/webapps.d/alcasar*
850
	rm -f /etc/httpd/conf/webapps.d/alcasar*
851
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
851
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
852
<Directory $DIR_WEB>
852
<Directory $DIR_WEB>
853
	AllowOverride None
853
	AllowOverride None
854
	Order deny,allow
854
	Order deny,allow
855
	Deny from all
855
	Deny from all
856
	Allow from 127.0.0.1
856
	Allow from 127.0.0.1
857
	Allow from $PRIVATE_NETWORK_MASK
857
	Allow from $PRIVATE_NETWORK_MASK
858
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
858
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
859
</Directory>
859
</Directory>
860
<Directory $DIR_WEB/certs>
860
<Directory $DIR_WEB/certs>
861
	AddType application/x-x509-ca-cert crt
861
	AddType application/x-x509-ca-cert crt
862
</Directory>
862
</Directory>
863
<Directory $DIR_ACC>
863
<Directory $DIR_ACC>
864
	SSLRequireSSL
864
	SSLRequireSSL
865
	AllowOverride None
865
	AllowOverride None
866
	Order deny,allow
866
	Order deny,allow
867
	Deny from all
867
	Deny from all
868
	Allow from 127.0.0.1
868
	Allow from 127.0.0.1
869
	Allow from $PRIVATE_NETWORK_MASK
869
	Allow from $PRIVATE_NETWORK_MASK
870
	require valid-user
870
	require valid-user
871
	AuthType digest
871
	AuthType digest
872
	AuthName "ALCASAR Control Center (ACC)" 
872
	AuthName "ALCASAR Control Center (ACC)" 
873
	AuthDigestDomain $HOSTNAME.$DOMAIN
873
	AuthDigestDomain $HOSTNAME.$DOMAIN
874
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
874
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
875
	AuthUserFile $DIR_DEST_ETC/digest/key_all
875
	AuthUserFile $DIR_DEST_ETC/digest/key_all
876
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
876
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
877
</Directory>
877
</Directory>
878
<Directory $DIR_ACC/admin>
878
<Directory $DIR_ACC/admin>
879
	SSLRequireSSL
879
	SSLRequireSSL
880
	AllowOverride None
880
	AllowOverride None
881
	Order deny,allow
881
	Order deny,allow
882
	Deny from all
882
	Deny from all
883
	Allow from 127.0.0.1
883
	Allow from 127.0.0.1
884
	Allow from $PRIVATE_NETWORK_MASK
884
	Allow from $PRIVATE_NETWORK_MASK
885
	require valid-user
885
	require valid-user
886
	AuthType digest
886
	AuthType digest
887
	AuthName "ALCASAR Control Center (ACC)" 
887
	AuthName "ALCASAR Control Center (ACC)" 
888
	AuthDigestDomain $HOSTNAME.$DOMAIN
888
	AuthDigestDomain $HOSTNAME.$DOMAIN
889
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
889
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
890
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
890
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
891
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
891
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
892
</Directory>
892
</Directory>
893
<Directory $DIR_ACC/manager>
893
<Directory $DIR_ACC/manager>
894
	SSLRequireSSL
894
	SSLRequireSSL
895
	AllowOverride None
895
	AllowOverride None
896
	Order deny,allow
896
	Order deny,allow
897
	Deny from all
897
	Deny from all
898
	Allow from 127.0.0.1
898
	Allow from 127.0.0.1
899
	Allow from $PRIVATE_NETWORK_MASK
899
	Allow from $PRIVATE_NETWORK_MASK
900
	require valid-user
900
	require valid-user
901
	AuthType digest
901
	AuthType digest
902
	AuthName "ALCASAR Control Center (ACC)" 
902
	AuthName "ALCASAR Control Center (ACC)" 
903
	AuthDigestDomain $HOSTNAME.$DOMAIN
903
	AuthDigestDomain $HOSTNAME.$DOMAIN
904
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
904
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
905
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
905
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
906
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
906
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
907
</Directory>
907
</Directory>
908
<Directory $DIR_ACC/backup>
908
<Directory $DIR_ACC/backup>
909
	SSLRequireSSL
909
	SSLRequireSSL
910
	AllowOverride None
910
	AllowOverride None
911
	Order deny,allow
911
	Order deny,allow
912
	Deny from all
912
	Deny from all
913
	Allow from 127.0.0.1
913
	Allow from 127.0.0.1
914
	Allow from $PRIVATE_NETWORK_MASK
914
	Allow from $PRIVATE_NETWORK_MASK
915
	require valid-user
915
	require valid-user
916
	AuthType digest
916
	AuthType digest
917
	AuthName "ALCASAR Control Center (ACC)" 
917
	AuthName "ALCASAR Control Center (ACC)" 
918
	AuthDigestDomain $HOSTNAME.$DOMAIN
918
	AuthDigestDomain $HOSTNAME.$DOMAIN
919
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
919
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
920
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
920
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
921
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
921
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
922
</Directory>
922
</Directory>
923
Alias /save/ "$DIR_SAVE/"
923
Alias /save/ "$DIR_SAVE/"
924
<Directory $DIR_SAVE>
924
<Directory $DIR_SAVE>
925
	SSLRequireSSL
925
	SSLRequireSSL
926
	Options Indexes
926
	Options Indexes
927
	Order deny,allow
927
	Order deny,allow
928
	Deny from all
928
	Deny from all
929
	Allow from 127.0.0.1
929
	Allow from 127.0.0.1
930
	Allow from $PRIVATE_NETWORK_MASK
930
	Allow from $PRIVATE_NETWORK_MASK
931
	require valid-user
931
	require valid-user
932
	AuthType digest
932
	AuthType digest
933
	AuthName "ALCASAR Control Center (ACC)" 
933
	AuthName "ALCASAR Control Center (ACC)" 
934
	AuthDigestDomain $HOSTNAME.$DOMAIN
934
	AuthDigestDomain $HOSTNAME.$DOMAIN
935
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
935
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
936
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
936
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
937
</Directory>
937
</Directory>
938
EOF
938
EOF
939
	# Launch after coova (in order to wait tun0 to be up)
939
	# Launch after coova (in order to wait tun0 to be up)
940
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
940
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
941
	# Log file for ACC access imputability
941
	# Log file for ACC access imputability
942
	[ -e /var/Save/security/acc_access.log ] || touch /var/Save/security/acc_access.log
942
	[ -e /var/Save/security/acc_access.log ] || touch /var/Save/security/acc_access.log
943
	chown root:apache /var/Save/security/acc_access.log
943
	chown root:apache /var/Save/security/acc_access.log
944
	chmod 664 /var/Save/security/acc_access.log
944
	chmod 664 /var/Save/security/acc_access.log
945
} # End of ACC ()
945
} # End of ACC ()
946
 
946
 
947
##########################################################################
947
##########################################################################
948
##				Fonction "CA"				##
948
##				Fonction "CA"				##
949
## - Creating the CA and the server certificate (apache)	 	##
949
## - Creating the CA and the server certificate (apache)	 	##
950
##########################################################################
950
##########################################################################
951
CA ()
951
CA ()
952
{
952
{
953
	$DIR_DEST_BIN/alcasar-CA.sh
953
	$DIR_DEST_BIN/alcasar-CA.sh
954
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
954
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
955
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
955
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
956
	cat <<EOF > $FIC_VIRTUAL_SSL
956
	cat <<EOF > $FIC_VIRTUAL_SSL
957
# default SSL virtual host, used for all HTTPS requests that do not
957
# default SSL virtual host, used for all HTTPS requests that do not
958
# match a ServerName or ServerAlias in any <VirtualHost> block.
958
# match a ServerName or ServerAlias in any <VirtualHost> block.
959
 
959
 
960
<VirtualHost _default_:443>
960
<VirtualHost _default_:443>
961
# general configuration
961
# general configuration
962
    ServerAdmin root@localhost
962
    ServerAdmin root@localhost
963
    ServerName $HOSTNAME.$DOMAIN
963
    ServerName $HOSTNAME.$DOMAIN
964
 
964
 
965
# SSL configuration
965
# SSL configuration
966
    SSLEngine on
966
    SSLEngine on
967
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
967
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
968
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
968
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
969
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
969
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
970
    CustomLog logs/ssl_request_log \
970
    CustomLog logs/ssl_request_log \
971
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
971
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
972
    ErrorLog logs/ssl_error_log
972
    ErrorLog logs/ssl_error_log
973
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
973
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
974
</VirtualHost>
974
</VirtualHost>
975
EOF
975
EOF
976
	chown -R root:apache /etc/pki
976
	chown -R root:apache /etc/pki
977
	chmod -R 750 /etc/pki
977
	chmod -R 750 /etc/pki
978
} # End of CA ()
978
} # End of CA ()
979
 
979
 
980
##################################################################
980
##################################################################
981
##			Function "time_server"			##
981
##			Function "time_server"			##
982
## - Configuring NTP server					##
982
## - Configuring NTP server					##
983
##################################################################
983
##################################################################
984
time_server ()
984
time_server ()
985
{
985
{
986
# Set the Internet time server
986
# Set the Internet time server
987
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
987
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
988
	cat <<EOF > /etc/ntp/step-tickers
988
	cat <<EOF > /etc/ntp/step-tickers
989
0.fr.pool.ntp.org	# adapt to your country
989
0.fr.pool.ntp.org	# adapt to your country
990
1.fr.pool.ntp.org
990
1.fr.pool.ntp.org
991
2.fr.pool.ntp.org
991
2.fr.pool.ntp.org
992
EOF
992
EOF
993
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
993
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
994
	cat <<EOF > /etc/ntp.conf
994
	cat <<EOF > /etc/ntp.conf
995
server 0.fr.pool.ntp.org	# adapt to your country
995
server 0.fr.pool.ntp.org	# adapt to your country
996
server 1.fr.pool.ntp.org
996
server 1.fr.pool.ntp.org
997
server 2.fr.pool.ntp.org
997
server 2.fr.pool.ntp.org
998
server 127.127.1.0   		# local clock si NTP internet indisponible ...
998
server 127.127.1.0   		# local clock si NTP internet indisponible ...
999
fudge 127.127.1.0 stratum 10
999
fudge 127.127.1.0 stratum 10
1000
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
1000
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
1001
restrict 127.0.0.1
1001
restrict 127.0.0.1
1002
driftfile /var/lib/ntp/drift
1002
driftfile /var/lib/ntp/drift
1003
logfile /var/log/ntp.log
1003
logfile /var/log/ntp.log
1004
disable monitor
1004
disable monitor
1005
EOF
1005
EOF
1006
	chown -R ntp:ntp /var/lib/ntp
1006
	chown -R ntp:ntp /var/lib/ntp
1007
# Synchronize now
1007
# Synchronize now
1008
	ntpd -q -g &
1008
	ntpd -q -g &
1009
} # End of time_server ()
1009
} # End of time_server ()
1010
 
1010
 
1011
##########################################################################################
1011
##########################################################################################
1012
##			Fonction "init_db"						##
1012
##			Fonction "init_db"						##
1013
## - Initialisation de la base Mysql							##
1013
## - Initialisation de la base Mysql							##
1014
## - Affectation du mot de passe de l'administrateur (root)				##
1014
## - Affectation du mot de passe de l'administrateur (root)				##
1015
## - Suppression des bases et des utilisateurs superflus				##
1015
## - Suppression des bases et des utilisateurs superflus				##
1016
## - Création de la base 'radius'							##
1016
## - Création de la base 'radius'							##
1017
## - Installation du schéma de cette base						##
1017
## - Installation du schéma de cette base						##
1018
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
1018
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
1019
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
1019
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
1020
##########################################################################################
1020
##########################################################################################
1021
init_db ()
1021
init_db ()
1022
{
1022
{
1023
	if [ `systemctl is-active mysqld` == "active" ]
1023
	if [ `systemctl is-active mysqld` == "active" ]
1024
	then
1024
	then
1025
		systemctl stop mysqld
1025
		systemctl stop mysqld
1026
	fi
1026
	fi
1027
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1027
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1028
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1028
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1029
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
1029
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
1030
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
1030
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
1031
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf
1031
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf
1032
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf  # accentuated user names are allowed
1032
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf  # accentuated user names are allowed
1033
	$SED "s?^plugin-load.*?#&?g" /etc/my.cnf.d/feedback.cnf # remove the feedback plugin (ALCASAR doesn't report anything !)
1033
	$SED "s?^plugin-load.*?#&?g" /etc/my.cnf.d/feedback.cnf # remove the feedback plugin (ALCASAR doesn't report anything !)
1034
	/usr/sbin/mysqld-prepare-db-dir > /dev/null 2>&1
1034
	/usr/sbin/mysqld-prepare-db-dir > /dev/null 2>&1
1035
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
1035
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
1036
	/usr/bin/systemctl start mysqld
1036
	/usr/bin/systemctl start mysqld
1037
	nb_round=1
1037
	nb_round=1
1038
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1038
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1039
	do
1039
	do
1040
		nb_round=`expr $nb_round + 1`
1040
		nb_round=`expr $nb_round + 1`
1041
		sleep 2
1041
		sleep 2
1042
	done
1042
	done
1043
	if [ ! -S /var/lib/mysql/mysql.sock ]
1043
	if [ ! -S /var/lib/mysql/mysql.sock ]
1044
	then
1044
	then
1045
		echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1045
		echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1046
		exit
1046
		exit
1047
	fi
1047
	fi
1048
	MYSQL="/usr/bin/mysql --execute"
1048
	MYSQL="/usr/bin/mysql --execute"
1049
# Secure the server
1049
# Secure the server
1050
	$MYSQL="GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$mysqlpwd';"
1050
	$MYSQL="GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$mysqlpwd';"
1051
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1051
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1052
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1052
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1053
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
1053
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
1054
# Create 'radius' database
1054
# Create 'radius' database
1055
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
1055
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
1056
# Add an empty radius database structure
1056
# Add an empty radius database structure
1057
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
1057
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
1058
# modify the start script in order to close accounting connexion when the system is comming down or up
1058
# modify the start script in order to close accounting connexion when the system is comming down or up
1059
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
1059
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
1060
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
1060
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
1061
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
1061
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
1062
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
1062
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
1063
	/usr/bin/systemctl daemon-reload
1063
	/usr/bin/systemctl daemon-reload
1064
} # End of init_db ()
1064
} # End of init_db ()
1065
 
1065
 
1066
###################################################################
1066
###################################################################
1067
##                       Function "freeradius"                   ##
1067
##                       Function "freeradius"                   ##
1068
## - Set the configuration files                                 ##
1068
## - Set the configuration files                                 ##
1069
## - Set the shared secret between coova-chilli and freeradius   ##
1069
## - Set the shared secret between coova-chilli and freeradius   ##
1070
## - Adapt the Mysql conf file and counters                      ##
1070
## - Adapt the Mysql conf file and counters                      ##
1071
###################################################################
1071
###################################################################
1072
freeradius ()
1072
freeradius ()
1073
{
1073
{
1074
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1074
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1075
	chown -R radius:radius /etc/raddb
1075
	chown -R radius:radius /etc/raddb
1076
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
1076
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
1077
# Set radius global parameters (radius.conf)
1077
# Set radius global parameters (radius.conf)
1078
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1078
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1079
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1079
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1080
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
1080
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
1081
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1081
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1082
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
1082
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
1083
 
1083
 
1084
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1084
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1085
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1085
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1086
	cat << EOF > /etc/raddb/clients.conf
1086
	cat << EOF > /etc/raddb/clients.conf
1087
client 127.0.0.1 {
1087
client localhost {
-
 
1088
	ipaddr = 127.0.0.1
1088
	secret = $secretradius
1089
	secret = $secretradius
1089
	shortname = coova
1090
	shortname = chilli
-
 
1091
	nas_type = other	
1090
}
1092
}
1091
EOF
1093
EOF
1092
# Set Virtual server (remvove all except "alcasar virtual site")
1094
# Set Virtual server (remvove all except "alcasar virtual site")
1093
	rm -f /etc/raddb/sites-enabled/*
1095
	rm -f /etc/raddb/sites-enabled/*
1094
    cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
1096
    cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
1095
	chown radius:apache /etc/raddb/sites-available/alcasar
1097
	chown radius:apache /etc/raddb/sites-available/alcasar
1096
	chmod 660 /etc/raddb/sites-available/alcasar
1098
	chmod 660 /etc/raddb/sites-available/alcasar
1097
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
1099
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
1098
# INFO : To connect from outside (EAP), add the EAP virtual server (link in sites-enabled) and inner-tunnel modules (link in mods-enabled) 
1100
# INFO : To connect from outside (EAP), add the EAP virtual server (link in sites-enabled) and inner-tunnel modules (link in mods-enabled) 
1099
 
1101
 
1100
# Set modules 
1102
# Set modules 
1101
# Set only usefull modules for ALCASAR (ldap is enabled only via ACC)
1103
# Set only usefull modules for ALCASAR (ldap is enabled only via ACC)
1102
    rm -rf  /etc/raddb/mods-enabled/*
1104
    rm -rf  /etc/raddb/mods-enabled/*
1103
    for mods in sql sqlcounter attr_filter expiration logintime pap 
1105
    for mods in sql sqlcounter attr_filter expiration logintime pap expr
1104
        do
1106
        do
1105
        ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1107
        ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1106
        done
1108
        done
1107
# Configure SQL mod
1109
# Configure SQL mod
1108
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
1110
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
1109
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1111
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1110
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
1112
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
1111
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
1113
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
1112
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1114
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1113
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1115
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1114
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1116
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1115
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
1117
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
1116
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc. 
1118
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc. 
1117
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1119
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1118
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1120
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1119
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
1121
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
1120
# sqlcounter modifications
1122
# sqlcounter modifications
1121
	[ -e /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default
1123
	[ -e /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default
1122
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf
1124
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf
1123
query = "\
1125
query = "\
1124
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)),0)) \
1126
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)),0)) \
1125
    FROM radacct \
1127
    FROM radacct \
1126
    WHERE username = '%{\${key}}' \
1128
    WHERE username = '%{\${key}}' \
1127
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1129
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1128
EOF
1130
EOF
1129
	[ -e /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default
1131
	[ -e /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default
1130
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf
1132
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf
1131
query = "\
1133
query = "\
1132
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)), 0)) \
1134
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)), 0)) \
1133
    FROM radacct \
1135
    FROM radacct \
1134
    WHERE username='%{\${key}}' \
1136
    WHERE username='%{\${key}}' \
1135
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1137
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1136
EOF
1138
EOF
1137
	[ -e /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default
1139
	[ -e /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default
1138
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf
1140
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf
1139
# This is the query modified for ALCASAR needs (thanks to Daniel Laliberte --> authorized period after the first connection)
1141
# This is the query modified for ALCASAR needs (thanks to Daniel Laliberte --> authorized period after the first connection)
1140
query = "\
1142
query = "\
1141
    SELECT IFNULL((SELECT TIME_TO_SEC(TIMEDIFF(NOW(), acctstarttime)) \
1143
    SELECT IFNULL((SELECT TIME_TO_SEC(TIMEDIFF(NOW(), acctstarttime)) \
1142
    FROM radacct \
1144
    FROM radacct \
1143
    WHERE UserName='%{\${key}}' \
1145
    WHERE UserName='%{\${key}}' \
1144
    ORDER BY acctstarttime \
1146
    ORDER BY acctstarttime \
1145
    LIMIT 1),0)"
1147
    LIMIT 1),0)"
1146
EOF
1148
EOF
1147
# make certain that mysql is up before freeradius start
1149
# make certain that mysql is up before freeradius start
1148
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
1150
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
1149
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
1151
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
1150
	/usr/bin/systemctl daemon-reload
1152
	/usr/bin/systemctl daemon-reload
1151
 # Allow apache to change some conf files (ie : ldap on/off)
1153
 # Allow apache to change some conf files (ie : ldap on/off)
1152
 chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
1154
 chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
1153
	
1155
	
1154
} # End freeradius ()
1156
} # End freeradius ()
1155
 
1157
 
1156
#############################################################################
1158
#############################################################################
1157
##                              Fonction "chilli"                          ##
1159
##                              Fonction "chilli"                          ##
1158
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1160
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1159
## - Adapt the authentication web page (intercept.php)                     ##
1161
## - Adapt the authentication web page (intercept.php)                     ##
1160
#############################################################################
1162
#############################################################################
1161
chilli ()
1163
chilli ()
1162
{
1164
{
1163
# chilli unit for systemd
1165
# chilli unit for systemd
1164
	cat << EOF > /lib/systemd/system/chilli.service
1166
	cat << EOF > /lib/systemd/system/chilli.service
1165
#  This file is part of systemd.
1167
#  This file is part of systemd.
1166
#
1168
#
1167
#  systemd is free software; you can redistribute it and/or modify it
1169
#  systemd is free software; you can redistribute it and/or modify it
1168
#  under the terms of the GNU General Public License as published by
1170
#  under the terms of the GNU General Public License as published by
1169
#  the Free Software Foundation; either version 2 of the License, or
1171
#  the Free Software Foundation; either version 2 of the License, or
1170
#  (at your option) any later version.
1172
#  (at your option) any later version.
1171
[Unit]
1173
[Unit]
1172
Description=chilli is a captive portal daemon
1174
Description=chilli is a captive portal daemon
1173
After=network.target
1175
After=network.target
1174
 
1176
 
1175
[Service]
1177
[Service]
1176
Type=forking
1178
Type=forking
1177
ExecStart=/usr/libexec/chilli start
1179
ExecStart=/usr/libexec/chilli start
1178
ExecStop=/usr/libexec/chilli stop
1180
ExecStop=/usr/libexec/chilli stop
1179
ExecReload=/usr/libexec/chilli reload
1181
ExecReload=/usr/libexec/chilli reload
1180
PIDFile=/var/run/chilli.pid
1182
PIDFile=/var/run/chilli.pid
1181
 
1183
 
1182
[Install]
1184
[Install]
1183
WantedBy=multi-user.target
1185
WantedBy=multi-user.target
1184
EOF
1186
EOF
1185
# init file creation
1187
# init file creation
1186
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1188
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1187
	cat <<EOF > /etc/init.d/chilli
1189
	cat <<EOF > /etc/init.d/chilli
1188
#!/bin/sh
1190
#!/bin/sh
1189
#
1191
#
1190
# chilli CoovaChilli init
1192
# chilli CoovaChilli init
1191
#
1193
#
1192
# chkconfig: 2345 65 35
1194
# chkconfig: 2345 65 35
1193
# description: CoovaChilli
1195
# description: CoovaChilli
1194
### BEGIN INIT INFO
1196
### BEGIN INIT INFO
1195
# Provides:       chilli
1197
# Provides:       chilli
1196
# Required-Start: network 
1198
# Required-Start: network 
1197
# Should-Start: 
1199
# Should-Start: 
1198
# Required-Stop:  network
1200
# Required-Stop:  network
1199
# Should-Stop: 
1201
# Should-Stop: 
1200
# Default-Start:  2 3 5
1202
# Default-Start:  2 3 5
1201
# Default-Stop:
1203
# Default-Stop:
1202
# Description:    CoovaChilli access controller
1204
# Description:    CoovaChilli access controller
1203
### END INIT INFO
1205
### END INIT INFO
1204
 
1206
 
1205
[ -f /usr/sbin/chilli ] || exit 0
1207
[ -f /usr/sbin/chilli ] || exit 0
1206
. /etc/init.d/functions
1208
. /etc/init.d/functions
1207
CONFIG=/etc/chilli.conf
1209
CONFIG=/etc/chilli.conf
1208
pidfile=/var/run/chilli.pid
1210
pidfile=/var/run/chilli.pid
1209
[ -f \$CONFIG ] || {
1211
[ -f \$CONFIG ] || {
1210
	echo "\$CONFIG Not found"
1212
	echo "\$CONFIG Not found"
1211
	exit 0
1213
	exit 0
1212
}
1214
}
1213
current_users_file="/var/tmp/havp/current_users.txt"	# file containing active users
1215
current_users_file="/var/tmp/havp/current_users.txt"	# file containing active users
1214
RETVAL=0
1216
RETVAL=0
1215
prog="chilli"
1217
prog="chilli"
1216
case \$1 in
1218
case \$1 in
1217
	start)
1219
	start)
1218
		if [ -f \$pidfile ] ; then 
1220
		if [ -f \$pidfile ] ; then 
1219
			gprintf "chilli is already running"
1221
			gprintf "chilli is already running"
1220
		else
1222
		else
1221
			gprintf "Starting \$prog: "
1223
			gprintf "Starting \$prog: "
1222
			echo '' > \$current_users_file && chown apache:apache \$current_users_file
1224
			echo '' > \$current_users_file && chown apache:apache \$current_users_file
1223
			rm -f /var/run/chilli* # cleaning
1225
			rm -f /var/run/chilli* # cleaning
1224
			/usr/sbin/modprobe tun >/dev/null 2>&1
1226
			/usr/sbin/modprobe tun >/dev/null 2>&1
1225
			echo 1 > /proc/sys/net/ipv4/ip_forward
1227
			echo 1 > /proc/sys/net/ipv4/ip_forward
1226
			[ -e /dev/net/tun ] || {
1228
			[ -e /dev/net/tun ] || {
1227
				(cd /dev; 
1229
				(cd /dev; 
1228
				mkdir net; 
1230
				mkdir net; 
1229
				cd net; 
1231
				cd net; 
1230
				mknod tun c 10 200)
1232
				mknod tun c 10 200)
1231
			}
1233
			}
1232
			ifconfig $INTIF 0.0.0.0
1234
			ifconfig $INTIF 0.0.0.0
1233
			/usr/sbin/ethtool -K $INTIF gro off
1235
			/usr/sbin/ethtool -K $INTIF gro off
1234
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1236
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1235
			RETVAL=\$?
1237
			RETVAL=\$?
1236
		fi
1238
		fi
1237
		;;
1239
		;;
1238
 
1240
 
1239
	reload)
1241
	reload)
1240
		killall -HUP chilli
1242
		killall -HUP chilli
1241
		;;
1243
		;;
1242
 
1244
 
1243
	restart)
1245
	restart)
1244
		\$0 stop
1246
		\$0 stop
1245
		sleep 2
1247
		sleep 2
1246
		\$0 start
1248
		\$0 start
1247
		;;
1249
		;;
1248
 
1250
 
1249
	status)
1251
	status)
1250
		status chilli
1252
		status chilli
1251
		RETVAL=0
1253
		RETVAL=0
1252
		;;
1254
		;;
1253
 
1255
 
1254
	stop)
1256
	stop)
1255
		if [ -f \$pidfile ] ; then  
1257
		if [ -f \$pidfile ] ; then  
1256
			gprintf "Shutting down \$prog: "
1258
			gprintf "Shutting down \$prog: "
1257
			killproc /usr/sbin/chilli
1259
			killproc /usr/sbin/chilli
1258
			RETVAL=\$?
1260
			RETVAL=\$?
1259
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1261
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1260
			[ -e \$current_users_file ] && rm -f \$current_users_file
1262
			[ -e \$current_users_file ] && rm -f \$current_users_file
1261
		else	
1263
		else	
1262
			gprintf "chilli is not running"
1264
			gprintf "chilli is not running"
1263
		fi
1265
		fi
1264
		;;
1266
		;;
1265
 
1267
 
1266
	*)
1268
	*)
1267
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1269
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1268
		exit 1
1270
		exit 1
1269
esac
1271
esac
1270
echo
1272
echo
1271
EOF
1273
EOF
1272
	chmod a+x /etc/init.d/chilli
1274
	chmod a+x /etc/init.d/chilli
1273
	ln -s /etc/init.d/chilli /usr/libexec/chilli
1275
	ln -s /etc/init.d/chilli /usr/libexec/chilli
1274
# conf file creation
1276
# conf file creation
1275
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1277
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1276
	#NTP Option configuration for DHCP
1278
	#NTP Option configuration for DHCP
1277
	#DHCP Options : rfc2132
1279
	#DHCP Options : rfc2132
1278
		#dhcp option value will be convert in hexa.
1280
		#dhcp option value will be convert in hexa.
1279
		#NTP option (or 'option 42') is like :
1281
		#NTP option (or 'option 42') is like :
1280
		#			
1282
		#			
1281
		#    Code   Len         Address 1               Address 2
1283
		#    Code   Len         Address 1               Address 2
1282
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1284
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1283
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1285
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1284
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1286
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1285
		#
1287
		#
1286
		#Code : 42 => 2a
1288
		#Code : 42 => 2a
1287
		#Len : 4 => 04
1289
		#Len : 4 => 04
1288
	PRIVATE_IP_HEXA=$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f1))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f2))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f3))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f4))
1290
	PRIVATE_IP_HEXA=$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f1))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f2))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f3))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f4))
1289
	cat <<EOF > /etc/chilli.conf
1291
	cat <<EOF > /etc/chilli.conf
1290
# coova config for ALCASAR
1292
# coova config for ALCASAR
1291
cmdsocket	/var/run/chilli.sock
1293
cmdsocket	/var/run/chilli.sock
1292
unixipc		chilli.$INTIF.ipc
1294
unixipc		chilli.$INTIF.ipc
1293
pidfile		/var/run/chilli.pid
1295
pidfile		/var/run/chilli.pid
1294
net		$PRIVATE_NETWORK_MASK
1296
net		$PRIVATE_NETWORK_MASK
1295
dhcpif		$INTIF
1297
dhcpif		$INTIF
1296
ethers		$DIR_DEST_ETC/alcasar-ethers
1298
ethers		$DIR_DEST_ETC/alcasar-ethers
1297
#nodynip
1299
#nodynip
1298
#statip
1300
#statip
1299
dynip		$PRIVATE_NETWORK_MASK
1301
dynip		$PRIVATE_NETWORK_MASK
1300
domain		$DOMAIN
1302
domain		$DOMAIN
1301
dns1		$PRIVATE_IP
1303
dns1		$PRIVATE_IP
1302
dns2		$PRIVATE_IP
1304
dns2		$PRIVATE_IP
1303
uamlisten	$PRIVATE_IP
1305
uamlisten	$PRIVATE_IP
1304
uamport		3990
1306
uamport		3990
1305
uamuiport	3991
1307
uamuiport	3991
1306
macauth
1308
macauth
1307
macpasswd	password
1309
macpasswd	password
1308
strictmacauth
1310
strictmacauth
1309
locationname	$HOSTNAME.$DOMAIN
1311
locationname	$HOSTNAME.$DOMAIN
1310
radiusserver1	127.0.0.1
1312
radiusserver1	127.0.0.1
1311
radiusserver2	127.0.0.1
1313
radiusserver2	127.0.0.1
1312
radiussecret	$secretradius
1314
radiussecret	$secretradius
1313
radiusauthport	1812
1315
radiusauthport	1812
1314
radiusacctport	1813
1316
radiusacctport	1813
1315
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1317
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1316
redirurl
1318
redirurl
1317
radiusnasid	$HOSTNAME.$DOMAIN
1319
radiusnasid	$HOSTNAME.$DOMAIN
1318
uamsecret	$secretuam
1320
uamsecret	$secretuam
1319
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1321
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1320
coaport		3799
1322
coaport		3799
1321
conup		$DIR_DEST_BIN/alcasar-conup.sh
1323
conup		$DIR_DEST_BIN/alcasar-conup.sh
1322
condown		$DIR_DEST_BIN/alcasar-condown.sh
1324
condown		$DIR_DEST_BIN/alcasar-condown.sh
1323
include		$DIR_DEST_ETC/alcasar-uamallowed
1325
include		$DIR_DEST_ETC/alcasar-uamallowed
1324
include		$DIR_DEST_ETC/alcasar-uamdomain
1326
include		$DIR_DEST_ETC/alcasar-uamdomain
1325
dhcpopt		2a04$PRIVATE_IP_HEXA
1327
dhcpopt		2a04$PRIVATE_IP_HEXA
1326
#dhcpgateway		none
1328
#dhcpgateway		none
1327
#dhcprelayagent		none
1329
#dhcprelayagent		none
1328
#dhcpgatewayport	none
1330
#dhcpgatewayport	none
1329
sslkeyfile	/etc/pki/tls/private/alcasar.key
1331
sslkeyfile	/etc/pki/tls/private/alcasar.key
1330
sslcertfile	/etc/pki/tls/certs/alcasar.crt
1332
sslcertfile	/etc/pki/tls/certs/alcasar.crt
1331
redirssl
1333
redirssl
1332
uamuissl
1334
uamuissl
1333
EOF
1335
EOF
1334
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
1336
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
1335
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1337
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1336
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
1338
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
1337
# create files for trusted domains and urls
1339
# create files for trusted domains and urls
1338
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1340
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1339
	chown root:apache $DIR_DEST_ETC/alcasar-*
1341
	chown root:apache $DIR_DEST_ETC/alcasar-*
1340
	chmod 660 $DIR_DEST_ETC/alcasar-*
1342
	chmod 660 $DIR_DEST_ETC/alcasar-*
1341
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1343
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1342
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1344
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1343
# user 'chilli' creation (in order to run conup/off and up/down scripts
1345
# user 'chilli' creation (in order to run conup/off and up/down scripts
1344
	chilli_exist=`grep -c ^chilli: /etc/passwd`
1346
	chilli_exist=`grep -c ^chilli: /etc/passwd`
1345
	if [ "$chilli_exist" == "1" ]
1347
	if [ "$chilli_exist" == "1" ]
1346
	then
1348
	then
1347
	      userdel -r chilli 2>/dev/null
1349
	      userdel -r chilli 2>/dev/null
1348
	fi
1350
	fi
1349
	groupadd -f chilli
1351
	groupadd -f chilli
1350
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1352
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1351
}  # End of chilli ()
1353
}  # End of chilli ()
1352
 
1354
 
1353
##################################################################
1355
##################################################################
1354
##		Fonction "dansguardian"				##
1356
##		Fonction "dansguardian"				##
1355
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1357
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1356
##################################################################
1358
##################################################################
1357
dansguardian ()
1359
dansguardian ()
1358
{
1360
{
1359
	mkdir -p /var/dansguardian /var/log/dansguardian
1361
	mkdir -p /var/dansguardian /var/log/dansguardian
1360
	chown -R dansguardian /var/dansguardian /var/log/dansguardian
1362
	chown -R dansguardian /var/dansguardian /var/log/dansguardian
1361
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1363
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1362
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1364
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1363
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1365
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1364
# By default the filter is off 
1366
# By default the filter is off 
1365
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1367
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1366
# French deny HTML page
1368
# French deny HTML page
1367
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1369
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1368
# Listen only on LAN side
1370
# Listen only on LAN side
1369
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1371
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1370
# DG send its flow to HAVP
1372
# DG send its flow to HAVP
1371
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1373
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1372
# replace the default deny HTML page
1374
# replace the default deny HTML page
1373
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1375
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1374
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1376
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1375
# Don't log
1377
# Don't log
1376
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1378
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1377
# on désactive par défaut le controle de contenu des pages html
1379
# on désactive par défaut le controle de contenu des pages html
1378
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1380
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1379
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1381
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1380
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1382
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1381
# on désactive par défaut le contrôle d'URL par expressions régulières
1383
# on désactive par défaut le contrôle d'URL par expressions régulières
1382
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1384
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1383
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1385
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1384
 
1386
 
1385
# Configure Dansguardian for large site
1387
# Configure Dansguardian for large site
1386
# Minimum number of processus to handle connections
1388
# Minimum number of processus to handle connections
1387
	$SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1389
	$SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1388
# Maximum number of processus to handle connections
1390
# Maximum number of processus to handle connections
1389
	$SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1391
	$SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1390
# Run at least 8 daemons
1392
# Run at least 8 daemons
1391
	$SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1393
	$SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1392
# minimum number of processes to spawn
1394
# minimum number of processes to spawn
1393
	$SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1395
	$SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1394
# maximum age of a child process before it croaks it
1396
# maximum age of a child process before it croaks it
1395
	$SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
1397
	$SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
1396
	
1398
	
1397
# on désactive par défaut le contrôle de téléchargement de fichiers
1399
# on désactive par défaut le contrôle de téléchargement de fichiers
1398
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1400
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1399
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1401
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1400
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1402
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1401
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1403
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1402
	touch $DIR_DG/lists/bannedextensionlist
1404
	touch $DIR_DG/lists/bannedextensionlist
1403
	touch $DIR_DG/lists/bannedmimetypelist
1405
	touch $DIR_DG/lists/bannedmimetypelist
1404
# 'Safesearch' regex actualisation
1406
# 'Safesearch' regex actualisation
1405
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1407
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1406
# empty LAN IP list that won't be WEB filtered
1408
# empty LAN IP list that won't be WEB filtered
1407
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1409
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1408
	touch $DIR_DG/lists/exceptioniplist
1410
	touch $DIR_DG/lists/exceptioniplist
1409
# Keep a copy of URL & domain filter configuration files
1411
# Keep a copy of URL & domain filter configuration files
1410
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1412
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1411
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1413
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1412
} # End of dansguardian ()
1414
} # End of dansguardian ()
1413
 
1415
 
1414
##################################################################
1416
##################################################################
1415
##			Fonction "antivirus"			##
1417
##			Fonction "antivirus"			##
1416
## - configuration of havp, libclamav and freshclam		##
1418
## - configuration of havp, libclamav and freshclam		##
1417
##################################################################
1419
##################################################################
1418
antivirus ()		
1420
antivirus ()		
1419
{
1421
{
1420
# create 'havp' user
1422
# create 'havp' user
1421
	havp_exist=`grep -c ^havp: /etc/passwd`
1423
	havp_exist=`grep -c ^havp: /etc/passwd`
1422
	if [ "$havp_exist" == "1" ]
1424
	if [ "$havp_exist" == "1" ]
1423
	then
1425
	then
1424
	      userdel -r havp 2>/dev/null
1426
	      userdel -r havp 2>/dev/null
1425
	      groupdel havp 2>/dev/null
1427
	      groupdel havp 2>/dev/null
1426
	fi
1428
	fi
1427
	groupadd -f havp
1429
	groupadd -f havp
1428
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1430
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1429
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp /var/log/clamav /var/lib/clamav
1431
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp /var/log/clamav /var/lib/clamav
1430
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1432
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1431
	chown -R clamav:clamav /var/log/clamav /var/lib/clamav
1433
	chown -R clamav:clamav /var/log/clamav /var/lib/clamav
1432
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1434
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1433
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1435
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1434
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1436
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1435
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1437
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1436
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1438
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1437
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1439
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1438
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1440
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1439
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1441
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1440
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1442
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1441
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1443
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1442
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1444
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1443
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1445
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1444
# skip checking of youtube flow (too heavy load / risk too low)
1446
# skip checking of youtube flow (too heavy load / risk too low)
1445
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1447
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1446
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1448
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1447
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1449
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1448
# adapt init script and systemd unit
1450
# adapt init script and systemd unit
1449
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1451
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1450
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1452
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1451
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1453
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1452
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1454
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1453
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1455
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1454
# replace of the intercept page (template)
1456
# replace of the intercept page (template)
1455
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1457
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1456
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1458
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1457
# update virus database every 4 hours (24h/6)
1459
# update virus database every 4 hours (24h/6)
1458
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1460
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1459
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1461
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1460
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1462
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1461
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1463
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1462
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1464
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1463
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1465
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1464
# update now
1466
# update now
1465
	/usr/bin/freshclam --no-warnings
1467
	/usr/bin/freshclam --no-warnings
1466
} # End of antivirus ()
1468
} # End of antivirus ()
1467
 
1469
 
1468
##########################################################################
1470
##########################################################################
1469
##			Fonction "tinyproxy"				##
1471
##			Fonction "tinyproxy"				##
1470
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1472
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1471
##########################################################################
1473
##########################################################################
1472
tinyproxy ()		
1474
tinyproxy ()		
1473
{
1475
{
1474
	tinyproxy_exist=`grep -c ^tinyproxy: /etc/passwd`
1476
	tinyproxy_exist=`grep -c ^tinyproxy: /etc/passwd`
1475
	if [ "$tinyproxy_exist" == "1" ]
1477
	if [ "$tinyproxy_exist" == "1" ]
1476
	then
1478
	then
1477
	      userdel -r tinyproxy 2>/dev/null
1479
	      userdel -r tinyproxy 2>/dev/null
1478
	      groupdel tinyproxy 2>/dev/null
1480
	      groupdel tinyproxy 2>/dev/null
1479
	fi
1481
	fi
1480
	groupadd -f tinyproxy
1482
	groupadd -f tinyproxy
1481
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1483
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1482
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1484
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1483
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1485
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1484
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1486
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1485
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1487
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1486
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1488
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1487
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1489
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1488
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1490
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1489
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1491
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1490
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1492
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1491
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1493
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1492
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1494
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1493
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1495
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1494
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1496
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1495
# Create the systemd unit
1497
# Create the systemd unit
1496
cat << EOF > /lib/systemd/system/tinyproxy.service
1498
cat << EOF > /lib/systemd/system/tinyproxy.service
1497
#  This file is part of systemd.
1499
#  This file is part of systemd.
1498
#
1500
#
1499
#  systemd is free software; you can redistribute it and/or modify it
1501
#  systemd is free software; you can redistribute it and/or modify it
1500
#  under the terms of the GNU General Public License as published by
1502
#  under the terms of the GNU General Public License as published by
1501
#  the Free Software Foundation; either version 2 of the License, or
1503
#  the Free Software Foundation; either version 2 of the License, or
1502
#  (at your option) any later version.
1504
#  (at your option) any later version.
1503
 
1505
 
1504
# This unit launches tinyproxy (a very light proxy).
1506
# This unit launches tinyproxy (a very light proxy).
1505
# The "sleep 2" is needed because the pid file isn't ready for systemd
1507
# The "sleep 2" is needed because the pid file isn't ready for systemd
1506
[Unit]
1508
[Unit]
1507
Description=Tinyproxy Web Proxy Server
1509
Description=Tinyproxy Web Proxy Server
1508
After=network.target iptables.service
1510
After=network.target iptables.service
1509
 
1511
 
1510
[Service]
1512
[Service]
1511
Type=forking
1513
Type=forking
1512
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1514
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1513
ExecStartPre=/bin/sleep 2
1515
ExecStartPre=/bin/sleep 2
1514
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1516
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1515
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1517
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1516
 
1518
 
1517
[Install]
1519
[Install]
1518
WantedBy=multi-user.target
1520
WantedBy=multi-user.target
1519
EOF
1521
EOF
1520
 
1522
 
1521
} # end of tinyproxy
1523
} # end of tinyproxy
1522
##################################################################################
1524
##################################################################################
1523
##			function "ulogd"					##
1525
##			function "ulogd"					##
1524
## - Ulog config for multi-log files 						##
1526
## - Ulog config for multi-log files 						##
1525
##################################################################################
1527
##################################################################################
1526
ulogd ()
1528
ulogd ()
1527
{
1529
{
1528
# Three instances of ulogd (three different logfiles)
1530
# Three instances of ulogd (three different logfiles)
1529
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1531
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1530
	nl=1
1532
	nl=1
1531
	for log_type in traceability ssh ext-access
1533
	for log_type in traceability ssh ext-access
1532
	do
1534
	do
1533
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1535
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1534
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1536
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1535
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1537
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1536
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
1538
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
1537
		cat << EOF >> /etc/ulogd-$log_type.conf
1539
		cat << EOF >> /etc/ulogd-$log_type.conf
1538
[emu1]
1540
[emu1]
1539
file="/var/log/firewall/$log_type.log"
1541
file="/var/log/firewall/$log_type.log"
1540
sync=1
1542
sync=1
1541
EOF
1543
EOF
1542
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1544
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1543
		nl=`expr $nl + 1`
1545
		nl=`expr $nl + 1`
1544
	done
1546
	done
1545
	chown -R root:apache /var/log/firewall
1547
	chown -R root:apache /var/log/firewall
1546
	chmod 750 /var/log/firewall
1548
	chmod 750 /var/log/firewall
1547
	chmod 640 /var/log/firewall/*
1549
	chmod 640 /var/log/firewall/*
1548
}  # End of ulogd ()
1550
}  # End of ulogd ()
1549
 
1551
 
1550
 
1552
 
1551
##########################################################
1553
##########################################################
1552
##              Function "nfsen"			##
1554
##              Function "nfsen"			##
1553
## - install the nfsen grapher				##
1555
## - install the nfsen grapher				##
1554
## - install the two plugins porttracker & surfmap	##
1556
## - install the two plugins porttracker & surfmap	##
1555
##########################################################
1557
##########################################################
1556
nfsen()
1558
nfsen()
1557
{
1559
{
1558
	tar xzf ./conf/nfsen/nfsen-*.tar.gz -C /tmp/
1560
	tar xzf ./conf/nfsen/nfsen-*.tar.gz -C /tmp/
1559
# Add PortTracker plugin
1561
# Add PortTracker plugin
1560
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1562
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1561
	do
1563
	do
1562
		[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1564
		[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1563
	done
1565
	done
1564
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-*/contrib/PortTracker/PortTracker.pm
1566
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-*/contrib/PortTracker/PortTracker.pm
1565
# use of our conf file and init unit
1567
# use of our conf file and init unit
1566
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-*/etc/
1568
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-*/etc/
1567
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1569
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1568
	DirTmp=$(pwd)
1570
	DirTmp=$(pwd)
1569
	cd /tmp/nfsen-*/
1571
	cd /tmp/nfsen-*/
1570
	/usr/bin/perl install.pl etc/nfsen.conf
1572
	/usr/bin/perl install.pl etc/nfsen.conf
1571
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1573
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1572
# Create RRD DB for porttracker (only in it still doesn't exist)
1574
# Create RRD DB for porttracker (only in it still doesn't exist)
1573
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1575
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1574
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1576
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1575
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1577
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1576
	chmod -R 770 /var/log/netflow/porttracker
1578
	chmod -R 770 /var/log/netflow/porttracker
1577
# nfsen unit for systemd
1579
# nfsen unit for systemd
1578
	cat << EOF > /lib/systemd/system/nfsen.service
1580
	cat << EOF > /lib/systemd/system/nfsen.service
1579
#  This file is part of systemd.
1581
#  This file is part of systemd.
1580
#
1582
#
1581
#  systemd is free software; you can redistribute it and/or modify it
1583
#  systemd is free software; you can redistribute it and/or modify it
1582
#  under the terms of the GNU General Public License as published by
1584
#  under the terms of the GNU General Public License as published by
1583
#  the Free Software Foundation; either version 2 of the License, or
1585
#  the Free Software Foundation; either version 2 of the License, or
1584
#  (at your option) any later version.
1586
#  (at your option) any later version.
1585
 
1587
 
1586
# This unit launches nfsen (a Netflow grapher).
1588
# This unit launches nfsen (a Netflow grapher).
1587
[Unit]
1589
[Unit]
1588
Description= NfSen init script
1590
Description= NfSen init script
1589
After=network.target iptables.service
1591
After=network.target iptables.service
1590
 
1592
 
1591
[Service]
1593
[Service]
1592
Type=oneshot
1594
Type=oneshot
1593
RemainAfterExit=yes
1595
RemainAfterExit=yes
1594
PIDFile=/var/run/nfsen/nfsen.pid
1596
PIDFile=/var/run/nfsen/nfsen.pid
1595
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1597
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1596
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1598
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1597
ExecStart=/usr/bin/nfsen start 
1599
ExecStart=/usr/bin/nfsen start 
1598
ExecStop=/usr/bin/nfsen stop
1600
ExecStop=/usr/bin/nfsen stop
1599
ExecReload=/usr/bin/nfsen restart
1601
ExecReload=/usr/bin/nfsen restart
1600
TimeoutSec=0
1602
TimeoutSec=0
1601
 
1603
 
1602
[Install]
1604
[Install]
1603
WantedBy=multi-user.target
1605
WantedBy=multi-user.target
1604
EOF
1606
EOF
1605
# Add the listen port to collect netflow packet (nfcapd)
1607
# Add the listen port to collect netflow packet (nfcapd)
1606
	$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1608
	$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1607
# expire delay for the profile "live"
1609
# expire delay for the profile "live"
1608
	/usr/bin/systemctl start nfsen
1610
	/usr/bin/systemctl start nfsen
1609
	/bin/nfsen -m live -e 62d 2>/dev/null
1611
	/bin/nfsen -m live -e 62d 2>/dev/null
1610
# add SURFmap plugin
1612
# add SURFmap plugin
1611
	cp $DIR_CONF/nfsen/SURFmap_*.tar.gz /tmp/
1613
	cp $DIR_CONF/nfsen/SURFmap_*.tar.gz /tmp/
1612
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1614
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1613
	tar xzf /tmp/SURFmap_*.tar.gz -C /tmp/
1615
	tar xzf /tmp/SURFmap_*.tar.gz -C /tmp/
1614
	cd /tmp/
1616
	cd /tmp/
1615
	/usr/bin/sh SURFmap/install.sh
1617
	/usr/bin/sh SURFmap/install.sh
1616
	chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1618
	chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1617
# clear the installation
1619
# clear the installation
1618
	cd $DirTmp
1620
	cd $DirTmp
1619
	rm -rf /tmp/nfsen-*
1621
	rm -rf /tmp/nfsen-*
1620
	rm -rf /tmp/SURFmap*
1622
	rm -rf /tmp/SURFmap*
1621
} # End of nfsen ()
1623
} # End of nfsen ()
1622
 
1624
 
1623
##################################################
1625
##################################################
1624
##		Function "vnstat"		##
1626
##		Function "vnstat"		##
1625
## Initialization of Vnstat and vnstat phpFE    ##
1627
## Initialization of Vnstat and vnstat phpFE    ##
1626
##################################################
1628
##################################################
1627
vnstat ()
1629
vnstat ()
1628
{
1630
{
1629
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1631
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1630
	$SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1632
	$SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1631
	[ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1633
	[ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1632
	$SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?" $DIR_ACC/manager/stats/config.php
1634
	$SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?" $DIR_ACC/manager/stats/config.php
1633
	$SED "s?\$iface_title\['.*?\$iface_title\['$EXTIF'\] = \$title;?" $DIR_ACC/manager/stats/config.php
1635
	$SED "s?\$iface_title\['.*?\$iface_title\['$EXTIF'\] = \$title;?" $DIR_ACC/manager/stats/config.php
1634
	/usr/bin/vnstat -u -i $EXTIF
1636
	/usr/bin/vnstat -u -i $EXTIF
1635
} # End of vnstat
1637
} # End of vnstat
1636
 
1638
 
1637
##################################################
1639
##################################################
1638
##		Function "dnsmasq"		##
1640
##		Function "dnsmasq"		##
1639
##################################################
1641
##################################################
1640
dnsmasq ()
1642
dnsmasq ()
1641
{
1643
{
1642
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1644
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1643
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1645
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1644
	cat << EOF > /etc/dnsmasq.conf
1646
	cat << EOF > /etc/dnsmasq.conf
1645
# Configuration file for "dnsmasq in forward mode"
1647
# Configuration file for "dnsmasq in forward mode"
1646
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1648
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1647
listen-address=$PRIVATE_IP
1649
listen-address=$PRIVATE_IP
1648
pid-file=/var/run/dnsmasq.pid
1650
pid-file=/var/run/dnsmasq.pid
1649
listen-address=127.0.0.1
1651
listen-address=127.0.0.1
1650
no-dhcp-interface=$INTIF
1652
no-dhcp-interface=$INTIF
1651
no-dhcp-interface=tun0
1653
no-dhcp-interface=tun0
1652
no-dhcp-interface=lo
1654
no-dhcp-interface=lo
1653
bind-interfaces
1655
bind-interfaces
1654
cache-size=2048
1656
cache-size=2048
1655
domain-needed
1657
domain-needed
1656
expand-hosts
1658
expand-hosts
1657
bogus-priv
1659
bogus-priv
1658
filterwin2k
1660
filterwin2k
1659
server=$DNS1
1661
server=$DNS1
1660
server=$DNS2
1662
server=$DNS2
1661
# DHCP service is configured. It will be enabled in "bypass" mode
1663
# DHCP service is configured. It will be enabled in "bypass" mode
1662
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1664
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1663
#dhcp-option=option:router,$PRIVATE_IP
1665
#dhcp-option=option:router,$PRIVATE_IP
1664
#dhcp-option=option:ntp-server,$PRIVATE_IP
1666
#dhcp-option=option:ntp-server,$PRIVATE_IP
1665
#domain=$DOMAIN
1667
#domain=$DOMAIN
1666
 
1668
 
1667
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1669
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1668
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1670
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1669
EOF
1671
EOF
1670
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1672
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1671
	cat << EOF > /etc/dnsmasq-blacklist.conf
1673
	cat << EOF > /etc/dnsmasq-blacklist.conf
1672
# Configuration file for "dnsmasq with blacklist"
1674
# Configuration file for "dnsmasq with blacklist"
1673
# Add Toulouse University blacklist domains
1675
# Add Toulouse University blacklist domains
1674
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1676
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1675
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1677
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1676
pid-file=/var/run/dnsmasq-blacklist.pid
1678
pid-file=/var/run/dnsmasq-blacklist.pid
1677
listen-address=$PRIVATE_IP
1679
listen-address=$PRIVATE_IP
1678
port=54
1680
port=54
1679
no-dhcp-interface=$INTIF
1681
no-dhcp-interface=$INTIF
1680
no-dhcp-interface=tun0
1682
no-dhcp-interface=tun0
1681
no-dhcp-interface=lo
1683
no-dhcp-interface=lo
1682
bind-interfaces
1684
bind-interfaces
1683
cache-size=2048
1685
cache-size=2048
1684
domain-needed
1686
domain-needed
1685
expand-hosts
1687
expand-hosts
1686
bogus-priv
1688
bogus-priv
1687
filterwin2k
1689
filterwin2k
1688
log-queries
1690
log-queries
1689
log-facility=/var/log/dnsmasq/dnsmasq-blacklist.log
1691
log-facility=/var/log/dnsmasq/dnsmasq-blacklist.log
1690
server=$DNS1
1692
server=$DNS1
1691
server=$DNS2
1693
server=$DNS2
1692
EOF
1694
EOF
1693
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1695
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1694
	cat << EOF > /etc/dnsmasq-whitelist.conf
1696
	cat << EOF > /etc/dnsmasq-whitelist.conf
1695
# Configuration file for "dnsmasq with whitelist"
1697
# Configuration file for "dnsmasq with whitelist"
1696
# ADD Toulouse university whitelist domains
1698
# ADD Toulouse university whitelist domains
1697
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1699
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1698
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1700
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1699
pid-file=/var/run/dnsmasq-whitelist.pid
1701
pid-file=/var/run/dnsmasq-whitelist.pid
1700
listen-address=$PRIVATE_IP
1702
listen-address=$PRIVATE_IP
1701
port=55
1703
port=55
1702
no-dhcp-interface=$INTIF
1704
no-dhcp-interface=$INTIF
1703
no-dhcp-interface=tun0
1705
no-dhcp-interface=tun0
1704
no-dhcp-interface=lo
1706
no-dhcp-interface=lo
1705
bind-interfaces
1707
bind-interfaces
1706
cache-size=1024
1708
cache-size=1024
1707
domain-needed
1709
domain-needed
1708
expand-hosts
1710
expand-hosts
1709
bogus-priv
1711
bogus-priv
1710
filterwin2k
1712
filterwin2k
1711
ipset=/#/wl_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1713
ipset=/#/wl_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1712
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1714
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1713
EOF
1715
EOF
1714
# 4th dnsmasq listen on udp 56 ("blackhole")
1716
# 4th dnsmasq listen on udp 56 ("blackhole")
1715
	cat << EOF > /etc/dnsmasq-blackhole.conf
1717
	cat << EOF > /etc/dnsmasq-blackhole.conf
1716
# Configuration file for "dnsmasq as a blackhole"
1718
# Configuration file for "dnsmasq as a blackhole"
1717
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1719
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1718
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1720
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1719
pid-file=/var/run/dnsmasq-blackhole.pid
1721
pid-file=/var/run/dnsmasq-blackhole.pid
1720
listen-address=$PRIVATE_IP
1722
listen-address=$PRIVATE_IP
1721
port=56
1723
port=56
1722
no-dhcp-interface=$INTIF
1724
no-dhcp-interface=$INTIF
1723
no-dhcp-interface=tun0
1725
no-dhcp-interface=tun0
1724
no-dhcp-interface=lo
1726
no-dhcp-interface=lo
1725
bind-interfaces
1727
bind-interfaces
1726
cache-size=256
1728
cache-size=256
1727
domain-needed
1729
domain-needed
1728
expand-hosts
1730
expand-hosts
1729
bogus-priv
1731
bogus-priv
1730
filterwin2k
1732
filterwin2k
1731
EOF
1733
EOF
1732
 
1734
 
1733
# the main instance should start after network and chilli (which create tun0)
1735
# the main instance should start after network and chilli (which create tun0)
1734
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1736
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1735
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1737
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1736
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1738
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1737
	for list in blacklist whitelist blackhole
1739
	for list in blacklist whitelist blackhole
1738
	do
1740
	do
1739
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1741
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1740
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1742
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1741
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1743
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1742
	done
1744
	done
1743
} # End dnsmasq
1745
} # End dnsmasq
1744
 
1746
 
1745
##########################################################
1747
##########################################################
1746
##		Fonction "BL"				##
1748
##		Fonction "BL"				##
1747
##########################################################
1749
##########################################################
1748
BL ()
1750
BL ()
1749
{
1751
{
1750
	# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
1752
	# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
1751
	rm -rf $DIR_DG/lists/blacklists
1753
	rm -rf $DIR_DG/lists/blacklists
1752
	mkdir -p /tmp/blacklists
1754
	mkdir -p /tmp/blacklists
1753
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
1755
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
1754
# creation of file for the rehabilited domains and urls
1756
# creation of file for the rehabilited domains and urls
1755
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1757
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1756
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1758
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1757
	touch $DIR_DG/lists/exceptionsitelist
1759
	touch $DIR_DG/lists/exceptionsitelist
1758
	touch $DIR_DG/lists/exceptionurllist
1760
	touch $DIR_DG/lists/exceptionurllist
1759
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1761
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1760
	cat <<EOF > $DIR_DG/lists/bannedurllist
1762
	cat <<EOF > $DIR_DG/lists/bannedurllist
1761
# Dansguardian filter config for ALCASAR
1763
# Dansguardian filter config for ALCASAR
1762
EOF
1764
EOF
1763
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1765
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1764
# Dansguardian domain filter config for ALCASAR
1766
# Dansguardian domain filter config for ALCASAR
1765
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1767
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1766
#**
1768
#**
1767
# block all SSL and CONNECT tunnels
1769
# block all SSL and CONNECT tunnels
1768
**s
1770
**s
1769
# block all SSL and CONNECT tunnels specified only as an IP
1771
# block all SSL and CONNECT tunnels specified only as an IP
1770
*ips
1772
*ips
1771
# block all sites specified only by an IP
1773
# block all sites specified only by an IP
1772
*ip
1774
*ip
1773
EOF
1775
EOF
1774
# Add Bing to the safesearch url regext list (parental control)
1776
# Add Bing to the safesearch url regext list (parental control)
1775
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1777
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1776
# Bing - add 'adlt=strict'
1778
# Bing - add 'adlt=strict'
1777
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1779
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1778
EOF
1780
EOF
1779
# change the google safesearch ("safe=strict" instead of "safe=vss")
1781
# change the google safesearch ("safe=strict" instead of "safe=vss")
1780
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1782
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1781
# creation of the custom BL and WL categorie named "ossi" (for domain names & ip only)
1783
# creation of the custom BL and WL categorie named "ossi" (for domain names & ip only)
1782
	mkdir -p $DIR_DG/lists/blacklists/ossi-bl
1784
	mkdir -p $DIR_DG/lists/blacklists/ossi-bl
1783
	touch $DIR_DG/lists/blacklists/ossi-bl/domains
1785
	touch $DIR_DG/lists/blacklists/ossi-bl/domains
1784
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1786
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1785
	mkdir -p $DIR_DG/lists/blacklists/ossi-wl
1787
	mkdir -p $DIR_DG/lists/blacklists/ossi-wl
1786
	touch $DIR_DG/lists/blacklists/ossi-wl/domains
1788
	touch $DIR_DG/lists/blacklists/ossi-wl/domains
1787
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
1789
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
1788
# add custom ALCASAR BL files
1790
# add custom ALCASAR BL files
1789
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklist")
1791
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklist")
1790
	do
1792
	do
1791
		mkdir $DIR_DG/lists/blacklists/ossi-bl-$x
1793
		mkdir $DIR_DG/lists/blacklists/ossi-bl-$x
1792
		cp $DIR_BLACKLIST/$x  $DIR_DG/lists/blacklists/ossi-bl-$x/domains
1794
		cp $DIR_BLACKLIST/$x  $DIR_DG/lists/blacklists/ossi-bl-$x/domains
1793
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1795
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1794
	done
1796
	done
1795
	chown -R dansguardian:apache $DIR_DG
1797
	chown -R dansguardian:apache $DIR_DG
1796
	chown -R root:apache $DIR_DEST_SHARE
1798
	chown -R root:apache $DIR_DEST_SHARE
1797
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1799
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1798
# adapt the Toulouse BL to ALCASAR architecture
1800
# adapt the Toulouse BL to ALCASAR architecture
1799
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1801
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1800
# enable the default categories
1802
# enable the default categories
1801
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
1803
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
1802
} # End BL()
1804
} # End BL()
1803
 
1805
 
1804
##########################################################
1806
##########################################################
1805
##		Fonction "cron"				##
1807
##		Fonction "cron"				##
1806
## - Mise en place des différents fichiers de cron	##
1808
## - Mise en place des différents fichiers de cron	##
1807
##########################################################
1809
##########################################################
1808
cron ()
1810
cron ()
1809
{
1811
{
1810
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1812
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1811
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1813
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1812
	cat <<EOF > /etc/crontab
1814
	cat <<EOF > /etc/crontab
1813
SHELL=/usr/bin/bash
1815
SHELL=/usr/bin/bash
1814
PATH=/usr/sbin:/usr/bin
1816
PATH=/usr/sbin:/usr/bin
1815
MAILTO=root
1817
MAILTO=root
1816
HOME=/
1818
HOME=/
1817
 
1819
 
1818
# run-parts
1820
# run-parts
1819
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1821
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1820
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1822
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1821
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1823
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1822
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1824
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1823
EOF
1825
EOF
1824
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1826
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1825
	cat <<EOF >> /etc/anacrontab
1827
	cat <<EOF >> /etc/anacrontab
1826
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1828
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1827
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1829
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1828
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1830
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1829
EOF
1831
EOF
1830
 
1832
 
1831
	cat <<EOF > /etc/cron.d/alcasar-mysql
1833
	cat <<EOF > /etc/cron.d/alcasar-mysql
1832
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1834
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1833
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mysql.sh --dump
1835
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mysql.sh --dump
1834
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1836
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1835
40 4 * * * root $DIR_DEST_BIN/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1837
40 4 * * * root $DIR_DEST_BIN/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1836
EOF
1838
EOF
1837
	cat <<EOF > /etc/cron.d/alcasar-archive
1839
	cat <<EOF > /etc/cron.d/alcasar-archive
1838
# Archive des logs et de la base de données (tous les lundi à 5h35)
1840
# Archive des logs et de la base de données (tous les lundi à 5h35)
1839
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1841
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1840
EOF
1842
EOF
1841
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1843
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1842
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1844
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1843
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1845
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1844
EOF
1846
EOF
1845
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1847
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1846
# mise à jour automatique de la distribution tous les jours 3h30
1848
# mise à jour automatique de la distribution tous les jours 3h30
1847
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1849
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1848
EOF
1850
EOF
1849
 
1851
 
1850
	cat << EOF > /etc/cron.d/alcasar-connections-stats
1852
	cat << EOF > /etc/cron.d/alcasar-connections-stats
1851
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
1853
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
1852
# 'alcasar-tot_stats' (everyday at 01h01 pm) : aggregating the daily connections of users (write in the table 'totacct')
1854
# 'alcasar-tot_stats' (everyday at 01h01 pm) : aggregating the daily connections of users (write in the table 'totacct')
1853
# 'alcasar-monthly_tot_stat' (everyday at 01h05 pm) : aggregating the monthly connections of users (write in table 'mtotacct')
1855
# 'alcasar-monthly_tot_stat' (everyday at 01h05 pm) : aggregating the monthly connections of users (write in table 'mtotacct')
1854
# 'alcasar-truncate_raddact' (every month, the first at 01h10 pm) : removing the log sessions of users older than 365 days
1856
# 'alcasar-truncate_raddact' (every month, the first at 01h10 pm) : removing the log sessions of users older than 365 days
1855
# 'alcasar-clean_radacct' (every month, the first at 01h15 pm) : closing the sessions openned for more than 30 days
1857
# 'alcasar-clean_radacct' (every month, the first at 01h15 pm) : closing the sessions openned for more than 30 days
1856
# 'alcasar-activity_report.sh' (every sunday at 5h35 pm) : generate an activity report in PDF
1858
# 'alcasar-activity_report.sh' (every sunday at 5h35 pm) : generate an activity report in PDF
1857
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1859
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1858
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1860
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1859
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1861
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1860
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
1862
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
1861
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1863
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1862
EOF
1864
EOF
1863
	cat << EOF > /etc/cron.d/alcasar-watchdog
1865
	cat << EOF > /etc/cron.d/alcasar-watchdog
1864
# run the "watchdog" every 3'
1866
# run the "watchdog" every 3'
1865
# empty the IPSET of the whitelisted IP (loaded dynamically with dnsmasq-whitelist) when every whitelisted users are logged out (every sunday at 0h05
1867
# empty the IPSET of the whitelisted IP (loaded dynamically with dnsmasq-whitelist) when every whitelisted users are logged out (every sunday at 0h05
1866
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1868
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1867
0 5 * * 0 root $DIR_DEST_BIN/alcasar-flush_ipset_wl.sh > /dev/null 2>&1
1869
0 5 * * 0 root $DIR_DEST_BIN/alcasar-flush_ipset_wl.sh > /dev/null 2>&1
1868
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1870
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1869
EOF
1871
EOF
1870
# Enabling the watchdog every 18'
1872
# Enabling the watchdog every 18'
1871
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1873
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1872
# activate  the daemon-watchdog after boot process
1874
# activate  the daemon-watchdog after boot process
1873
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1875
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1874
# activate the daemon-watchdog every 18'
1876
# activate the daemon-watchdog every 18'
1875
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1877
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1876
EOF
1878
EOF
1877
 
1879
 
1878
# Enabling category update from rsync
1880
# Enabling category update from rsync
1879
	cat << EOF > /etc/cron.d/alcasar-rsync-bl
1881
	cat << EOF > /etc/cron.d/alcasar-rsync-bl
1880
# Automatic update of BL via rsync every 12 hours. The categories are listed in the file '/usr/local/etc/update_cat.conf' (no sync if empty). 
1882
# Automatic update of BL via rsync every 12 hours. The categories are listed in the file '/usr/local/etc/update_cat.conf' (no sync if empty). 
1881
0 */12 * * * root $DIR_DEST_BIN/alcasar-bl.sh --update_cat > /dev/null 2>&1
1883
0 */12 * * * root $DIR_DEST_BIN/alcasar-bl.sh --update_cat > /dev/null 2>&1
1882
EOF
1884
EOF
1883
 
1885
 
1884
# Renew the Let's Encrypt certificate
1886
# Renew the Let's Encrypt certificate
1885
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
1887
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
1886
# Automatic renew of the Let's Encrypt certificate
1888
# Automatic renew of the Let's Encrypt certificate
1887
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1889
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1888
EOF
1890
EOF
1889
 
1891
 
1890
# removing the users crons
1892
# removing the users crons
1891
	rm -f /var/spool/cron/*
1893
	rm -f /var/spool/cron/*
1892
} # End cron()
1894
} # End cron()
1893
 
1895
 
1894
##################################################################
1896
##################################################################
1895
## 			Fonction "Fail2Ban"			##
1897
## 			Fonction "Fail2Ban"			##
1896
##- Modification de la configuration de fail2ban		##
1898
##- Modification de la configuration de fail2ban		##
1897
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1899
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1898
##################################################################
1900
##################################################################
1899
fail2ban()
1901
fail2ban()
1900
{
1902
{
1901
	/usr/bin/sh $DIR_CONF/fail2ban.sh
1903
	/usr/bin/sh $DIR_CONF/fail2ban.sh
1902
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1904
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1903
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1905
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1904
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1906
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1905
	chmod 644 /var/log/fail2ban.log
1907
	chmod 644 /var/log/fail2ban.log
1906
	chmod 644 /var/Save/security/watchdog.log
1908
	chmod 644 /var/Save/security/watchdog.log
1907
	/usr/bin/touch /var/log/auth.log
1909
	/usr/bin/touch /var/log/auth.log
1908
# fail2ban unit
1910
# fail2ban unit
1909
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1911
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1910
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1912
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1911
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1913
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1912
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1914
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1913
} # End fail2ban()
1915
} # End fail2ban()
1914
 
1916
 
1915
##################################################################
1917
##################################################################
1916
## 			Fonction "gammu_smsd"			##
1918
## 			Fonction "gammu_smsd"			##
1917
## - Creation de la base de donnée Gammu			##
1919
## - Creation de la base de donnée Gammu			##
1918
## - Creation du fichier de config: gammu_smsd_conf		##
1920
## - Creation du fichier de config: gammu_smsd_conf		##
1919
##################################################################
1921
##################################################################
1920
gammu_smsd()
1922
gammu_smsd()
1921
{
1923
{
1922
# Create 'gammu' databse
1924
# Create 'gammu' databse
1923
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1925
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1924
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1926
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1925
# Add a gammu database structure
1927
# Add a gammu database structure
1926
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1928
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1927
 
1929
 
1928
# Config file for the daemon
1930
# Config file for the daemon
1929
cat << EOF > /etc/gammu_smsd_conf
1931
cat << EOF > /etc/gammu_smsd_conf
1930
[gammu]
1932
[gammu]
1931
port = /dev/ttyUSB0
1933
port = /dev/ttyUSB0
1932
connection = at115200
1934
connection = at115200
1933
 
1935
 
1934
;########################################################
1936
;########################################################
1935
 
1937
 
1936
[smsd]
1938
[smsd]
1937
 
1939
 
1938
PIN = 1234
1940
PIN = 1234
1939
 
1941
 
1940
logfile = /var/log/gammu-smsd/gammu-smsd.log
1942
logfile = /var/log/gammu-smsd/gammu-smsd.log
1941
logformat = textall
1943
logformat = textall
1942
debuglevel = 0
1944
debuglevel = 0
1943
 
1945
 
1944
service = sql
1946
service = sql
1945
driver = native_mysql
1947
driver = native_mysql
1946
user = $DB_USER
1948
user = $DB_USER
1947
password = $radiuspwd
1949
password = $radiuspwd
1948
pc = localhost
1950
pc = localhost
1949
database = $DB_GAMMU
1951
database = $DB_GAMMU
1950
 
1952
 
1951
RunOnReceive = $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1953
RunOnReceive = $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1952
 
1954
 
1953
StatusFrequency = 30
1955
StatusFrequency = 30
1954
;LoopSleep = 2
1956
;LoopSleep = 2
1955
 
1957
 
1956
;ResetFrequency = 300
1958
;ResetFrequency = 300
1957
;HardResetFrequency = 120
1959
;HardResetFrequency = 120
1958
 
1960
 
1959
CheckSecurity = 1 
1961
CheckSecurity = 1 
1960
CheckSignal = 1
1962
CheckSignal = 1
1961
CheckBattery = 0
1963
CheckBattery = 0
1962
EOF
1964
EOF
1963
 
1965
 
1964
chmod 755 /etc/gammu_smsd_conf
1966
chmod 755 /etc/gammu_smsd_conf
1965
 
1967
 
1966
# Log folder for gammu-smsd
1968
# Log folder for gammu-smsd
1967
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1969
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1968
chmod 755 /var/log/gammu-smsd
1970
chmod 755 /var/log/gammu-smsd
1969
 
1971
 
1970
# Write radius credentials in the gammu script
1972
# Write radius credentials in the gammu script
1971
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1973
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1972
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1974
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1973
 
1975
 
1974
# Udev rule for Huawei GSM MODEM (idVendor: 12d1) --> run "modeswitch" to switch from "mass_storage" mode to "ttyUSB" (modem) mode
1976
# Udev rule for Huawei GSM MODEM (idVendor: 12d1) --> run "modeswitch" to switch from "mass_storage" mode to "ttyUSB" (modem) mode
1975
cat << EOF > /lib/udev/rules.d/66-huawei.rules
1977
cat << EOF > /lib/udev/rules.d/66-huawei.rules
1976
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
1978
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
1977
EOF
1979
EOF
1978
 
1980
 
1979
} # End gammu_smsd()
1981
} # End gammu_smsd()
1980
 
1982
 
1981
 
1983
 
1982
##################################################################
1984
##################################################################
1983
##			Fonction "msec"				##
1985
##			Fonction "msec"				##
1984
## - Apply the "fileserver" security level			##
1986
## - Apply the "fileserver" security level			##
1985
## - remove the "system request" for rebboting			##
1987
## - remove the "system request" for rebboting			##
1986
## - Fix several file permissions				##
1988
## - Fix several file permissions				##
1987
##################################################################
1989
##################################################################
1988
msec()
1990
msec()
1989
{
1991
{
1990
 
1992
 
1991
# Apply fileserver security level
1993
# Apply fileserver security level
1992
[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
1994
[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
1993
echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
1995
echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
1994
 
1996
 
1995
# Set permissions monitoring and enforcement
1997
# Set permissions monitoring and enforcement
1996
cat <<EOF > /etc/security/msec/perm.local
1998
cat <<EOF > /etc/security/msec/perm.local
1997
/var/log/firefwall/                     root.apache     750
1999
/var/log/firefwall/                     root.apache     750
1998
/var/log/firewall/*                     root.apache     640
2000
/var/log/firewall/*                     root.apache     640
1999
/etc/security/msec/perm.local           root.root       640
2001
/etc/security/msec/perm.local           root.root       640
2000
/etc/security/msec/level.local          root.root       640
2002
/etc/security/msec/level.local          root.root       640
2001
/etc/freeradius-web                     root.apache     750
2003
/etc/freeradius-web                     root.apache     750
2002
/etc/freeradius-web/admin.conf          root.apache     640
2004
/etc/freeradius-web/admin.conf          root.apache     640
2003
/etc/raddb/client.conf                  radius.radius   640
2005
/etc/raddb/client.conf                  radius.radius   640
2004
/etc/raddb/radius.conf                  radius.radius   640
2006
/etc/raddb/radius.conf                  radius.radius   640
2005
/etc/raddb/mods-available/ldap          radius.apache   660
2007
/etc/raddb/mods-available/ldap          radius.apache   660
2006
/etc/raddb/sites-available/alcasar      radius.apache   660
2008
/etc/raddb/sites-available/alcasar      radius.apache   660
2007
/etc/pki/*                              root.apache     750
2009
/etc/pki/*                              root.apache     750
2008
/var/log/netflow/porttracker            root.apache     770
2010
/var/log/netflow/porttracker            root.apache     770
2009
/var/log/netflow/porttracker/*          root.apache     660
2011
/var/log/netflow/porttracker/*          root.apache     660
2010
EOF
2012
EOF
2011
# apply now hourly & daily checks 
2013
# apply now hourly & daily checks 
2012
/usr/sbin/msec
2014
/usr/sbin/msec
2013
/etc/cron.weekly/msec
2015
/etc/cron.weekly/msec
2014
 
2016
 
2015
} # End msec()
2017
} # End msec()
2016
 
2018
 
2017
 
2019
 
2018
##################################################################
2020
##################################################################
2019
##			Fonction "letsencrypt"			##
2021
##			Fonction "letsencrypt"			##
2020
## - Install Let's Encrypt client				##
2022
## - Install Let's Encrypt client				##
2021
## - Prepare Let's Encrypt ALCASAR configuration file		##
2023
## - Prepare Let's Encrypt ALCASAR configuration file		##
2022
##################################################################
2024
##################################################################
2023
letsencrypt()
2025
letsencrypt()
2024
{
2026
{
2025
	echo "Installing Let's Encrypt client..."
2027
	echo "Installing Let's Encrypt client..."
2026
 
2028
 
2027
	# Extract acme.sh
2029
	# Extract acme.sh
2028
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2030
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2029
 
2031
 
2030
	pwdInstall=$(pwd)
2032
	pwdInstall=$(pwd)
2031
	cd /tmp/acme.sh-*
2033
	cd /tmp/acme.sh-*
2032
 
2034
 
2033
	acmesh_installDir="/opt/acme.sh"
2035
	acmesh_installDir="/opt/acme.sh"
2034
	acmesh_confDir="/usr/local/etc/letsencrypt"
2036
	acmesh_confDir="/usr/local/etc/letsencrypt"
2035
	acmesh_userAgent="ALCASAR"
2037
	acmesh_userAgent="ALCASAR"
2036
 
2038
 
2037
	# Install acme.sh
2039
	# Install acme.sh
2038
	./acme.sh --install \
2040
	./acme.sh --install \
2039
		--home $acmesh_installDir \
2041
		--home $acmesh_installDir \
2040
		--config-home $acmesh_confDir/data \
2042
		--config-home $acmesh_confDir/data \
2041
		--certhome $acmesh_confDir/certs \
2043
		--certhome $acmesh_confDir/certs \
2042
		--accountkey $acmesh_confDir/ca/account.key \
2044
		--accountkey $acmesh_confDir/ca/account.key \
2043
		--accountconf $acmesh_confDir/data/account.conf \
2045
		--accountconf $acmesh_confDir/data/account.conf \
2044
		--useragent $acmesh_userAgent \
2046
		--useragent $acmesh_userAgent \
2045
		--nocron \
2047
		--nocron \
2046
		> /dev/null
2048
		> /dev/null
2047
 
2049
 
2048
	if [ $? -ne 0 ]; then
2050
	if [ $? -ne 0 ]; then
2049
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2051
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2050
	fi
2052
	fi
2051
 
2053
 
2052
	# Create configuration file
2054
	# Create configuration file
2053
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2055
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2054
email=
2056
email=
2055
dateIssueRequest=
2057
dateIssueRequest=
2056
domainRequest=
2058
domainRequest=
2057
challenge=
2059
challenge=
2058
dateIssued=
2060
dateIssued=
2059
dnsapi=
2061
dnsapi=
2060
dateNextRenewal=
2062
dateNextRenewal=
2061
EOF
2063
EOF
2062
 
2064
 
2063
	cd $pwdInstall
2065
	cd $pwdInstall
2064
	rm -rf /tmp/acme.sh-*
2066
	rm -rf /tmp/acme.sh-*
2065
 
2067
 
2066
} # END letsencrypt()
2068
} # END letsencrypt()
2067
 
2069
 
2068
##################################################################
2070
##################################################################
2069
##		Fonction "post_install"			##
2071
##		Fonction "post_install"			##
2070
## - Modifying banners (locals et ssh) & prompts	##
2072
## - Modifying banners (locals et ssh) & prompts	##
2071
## - SSH config						##
2073
## - SSH config						##
2072
## - sudoers config & files security			##
2074
## - sudoers config & files security			##
2073
## - log rotate & ANSSI security parameters		##
2075
## - log rotate & ANSSI security parameters		##
2074
## - Apply former conf in case of an update		##
2076
## - Apply former conf in case of an update		##
2075
##########################################################
2077
##########################################################
2076
post_install()
2078
post_install()
2077
{
2079
{
2078
# change the SSH banner
2080
# change the SSH banner
2079
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
2081
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
2080
	echo " V$VERSION" >> /etc/ssh/alcasar-banner-ssh
2082
	echo " V$VERSION" >> /etc/ssh/alcasar-banner-ssh
2081
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
2083
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
2082
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2084
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2083
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2085
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2084
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2086
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2085
# postfix banner anonymisation
2087
# postfix banner anonymisation
2086
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
2088
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
2087
	chown -R postfix:postfix /var/lib/postfix
2089
	chown -R postfix:postfix /var/lib/postfix
2088
# sshd liste on EXTIF & INTIF
2090
# sshd liste on EXTIF & INTIF
2089
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2091
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2090
# sshd authorized certificate for root login
2092
# sshd authorized certificate for root login
2091
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2093
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2092
# ALCASAR conf file
2094
# ALCASAR conf file
2093
	echo "HTTPS_LOGIN=on" >> $CONF_FILE
2095
	echo "HTTPS_LOGIN=on" >> $CONF_FILE
2094
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
2096
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
2095
	echo "SSH=on" >> $CONF_FILE
2097
	echo "SSH=on" >> $CONF_FILE
2096
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
2098
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
2097
	echo "LDAP=off" >> $CONF_FILE
2099
	echo "LDAP=off" >> $CONF_FILE
2098
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
2100
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
2099
	echo "MULTIWAN=off" >> $CONF_FILE
2101
	echo "MULTIWAN=off" >> $CONF_FILE
2100
	echo "FAILOVER=30" >> $CONF_FILE
2102
	echo "FAILOVER=30" >> $CONF_FILE
2101
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
2103
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
2102
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
2104
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
2103
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
2105
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
2104
# Prompt customisation (colors)
2106
# Prompt customisation (colors)
2105
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
2107
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
2106
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
2108
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
2107
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2109
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2108
# sudoers configuration for "apache" & "sysadmin"
2110
# sudoers configuration for "apache" & "sysadmin"
2109
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2111
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2110
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
2112
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
2111
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
2113
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
2112
# Modify some logrotate files (gammu, ulogd)
2114
# Modify some logrotate files (gammu, ulogd)
2113
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2115
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2114
	chmod 644 /etc/logrotate.d/*
2116
	chmod 644 /etc/logrotate.d/*
2115
# Log compression
2117
# Log compression
2116
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2118
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2117
# actualisation des fichiers logs compressés
2119
# actualisation des fichiers logs compressés
2118
	for dir in firewall dansguardian httpd
2120
	for dir in firewall dansguardian httpd
2119
	do
2121
	do
2120
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
2122
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
2121
	done
2123
	done
2122
# create the alcasar-load_balancing unit
2124
# create the alcasar-load_balancing unit
2123
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
2125
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
2124
#  This file is part of systemd.
2126
#  This file is part of systemd.
2125
#
2127
#
2126
#  systemd is free software; you can redistribute it and/or modify it
2128
#  systemd is free software; you can redistribute it and/or modify it
2127
#  under the terms of the GNU General Public License as published by
2129
#  under the terms of the GNU General Public License as published by
2128
#  the Free Software Foundation; either version 2 of the License, or
2130
#  the Free Software Foundation; either version 2 of the License, or
2129
#  (at your option) any later version.
2131
#  (at your option) any later version.
2130
 
2132
 
2131
# This unit lauches alcasar-load-balancing.sh script.
2133
# This unit lauches alcasar-load-balancing.sh script.
2132
[Unit]
2134
[Unit]
2133
Description=alcasar-load_balancing.sh execution
2135
Description=alcasar-load_balancing.sh execution
2134
After=network.target iptables.service
2136
After=network.target iptables.service
2135
 
2137
 
2136
[Service]
2138
[Service]
2137
Type=oneshot
2139
Type=oneshot
2138
RemainAfterExit=yes
2140
RemainAfterExit=yes
2139
ExecStart=$DIR_DEST_BIN/alcasar-load_balancing.sh start
2141
ExecStart=$DIR_DEST_BIN/alcasar-load_balancing.sh start
2140
ExecStop=$DIR_DEST_BIN/alcasar-load_balancing.sh stop
2142
ExecStop=$DIR_DEST_BIN/alcasar-load_balancing.sh stop
2141
TimeoutSec=0
2143
TimeoutSec=0
2142
SysVStartPriority=99
2144
SysVStartPriority=99
2143
 
2145
 
2144
[Install]
2146
[Install]
2145
WantedBy=multi-user.target
2147
WantedBy=multi-user.target
2146
EOF
2148
EOF
2147
# processes launched at boot time (Systemctl)
2149
# processes launched at boot time (Systemctl)
2148
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat sshd
2150
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat sshd
2149
	do
2151
	do
2150
		/usr/bin/systemctl -q enable $i.service
2152
		/usr/bin/systemctl -q enable $i.service
2151
	done
2153
	done
2152
	
2154
	
2153
# disable processes at boot time (Systemctl)
2155
# disable processes at boot time (Systemctl)
2154
	for i in ulogd gpm
2156
	for i in ulogd gpm
2155
	do
2157
	do
2156
		/usr/bin/systemctl -q disable $i.service
2158
		/usr/bin/systemctl -q disable $i.service
2157
	done
2159
	done
2158
	
2160
	
2159
# Apply French Security Agency (ANSSI) rules
2161
# Apply French Security Agency (ANSSI) rules
2160
# ignore ICMP broadcast (smurf attack)
2162
# ignore ICMP broadcast (smurf attack)
2161
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2163
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2162
# ignore ICMP errors bogus
2164
# ignore ICMP errors bogus
2163
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2165
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2164
# remove ICMP redirects responces
2166
# remove ICMP redirects responces
2165
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2167
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2166
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2168
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2167
# enable SYN Cookies (Syn flood attacks)
2169
# enable SYN Cookies (Syn flood attacks)
2168
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2170
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2169
# enable kernel antispoofing
2171
# enable kernel antispoofing
2170
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2172
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2171
# ignore source routing
2173
# ignore source routing
2172
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2174
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2173
# set conntrack timer to 1h (3600s) instead of 5 weeks
2175
# set conntrack timer to 1h (3600s) instead of 5 weeks
2174
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2176
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2175
# disable log_martians (ALCASAR is often installed between two private network addresses) 
2177
# disable log_martians (ALCASAR is often installed between two private network addresses) 
2176
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
2178
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
2177
# disable iptables_helpers
2179
# disable iptables_helpers
2178
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
2180
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
2179
# Switch to the router mode
2181
# Switch to the router mode
2180
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
2182
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
2181
# Remove unused service ipv6
2183
# Remove unused service ipv6
2182
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2184
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2183
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2185
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2184
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2186
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2185
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2187
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2186
# switch to multi-users runlevel (instead of x11)
2188
# switch to multi-users runlevel (instead of x11)
2187
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2189
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2188
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
2190
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
2189
	[ -e /etc/default/grub.default ]  || cp /etc/default/grub /etc/default/grub.default
2191
	[ -e /etc/default/grub.default ]  || cp /etc/default/grub /etc/default/grub.default
2190
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2192
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2191
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR?g" /etc/default/grub
2193
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR?g" /etc/default/grub
2192
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
2194
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
2193
	vm_vga=`lsmod | egrep -c "virtio|vmwgfx"` # test if in VM
2195
	vm_vga=`lsmod | egrep -c "virtio|vmwgfx"` # test if in VM
2194
	if [ $vm_vga == 0 ] # is not a VM 
2196
	if [ $vm_vga == 0 ] # is not a VM 
2195
	then
2197
	then
2196
        cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2198
        cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2197
        echo >> /etc/mageia-release
2199
        echo >> /etc/mageia-release
2198
        $SED "s?^GRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
2200
        $SED "s?^GRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
2199
    fi
2201
    fi
2200
    if [ $Lang == "fr" ]
2202
    if [ $Lang == "fr" ]
2201
    then
2203
    then
2202
            echo "Bienvenue sur ALCASAR V$VERSION" >> /etc/mageia-release
2204
            echo "Bienvenue sur ALCASAR V$VERSION" >> /etc/mageia-release
2203
            echo "Connectez-vous à l'URL 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2205
            echo "Connectez-vous à l'URL 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2204
    else
2206
    else
2205
            echo "Welcome on ALCASAR V$VERSION" >> /etc/mageia-release
2207
            echo "Welcome on ALCASAR V$VERSION" >> /etc/mageia-release
2206
            echo "Connect to 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2208
            echo "Connect to 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2207
    fi
2209
    fi
2208
    /usr/bin/update-grub2
2210
    /usr/bin/update-grub2
2209
# Load and apply the previous conf file
2211
# Load and apply the previous conf file
2210
	if [ "$mode" = "update" ]
2212
	if [ "$mode" = "update" ]
2211
	then
2213
	then
2212
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
2214
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
2213
		$DIR_DEST_BIN/alcasar-conf.sh --load
2215
		$DIR_DEST_BIN/alcasar-conf.sh --load
2214
		PARENT_SCRIPT=`basename $0`
2216
		PARENT_SCRIPT=`basename $0`
2215
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2217
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2216
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2218
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2217
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf 
2219
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf 
2218
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2220
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2219
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
2221
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
2220
	fi
2222
	fi
2221
	rm -f /tmp/alcasar-conf*
2223
	rm -f /tmp/alcasar-conf*
2222
	chown -R root:apache $DIR_DEST_ETC/*
2224
	chown -R root:apache $DIR_DEST_ETC/*
2223
	chmod -R 660 $DIR_DEST_ETC/*
2225
	chmod -R 660 $DIR_DEST_ETC/*
2224
	chmod ug+x $DIR_DEST_ETC/digest
2226
	chmod ug+x $DIR_DEST_ETC/digest
2225
	cd $DIR_INSTALL
2227
	cd $DIR_INSTALL
2226
	echo ""
2228
	echo ""
2227
	echo "#############################################################################"
2229
	echo "#############################################################################"
2228
	if [ $Lang == "fr" ]
2230
	if [ $Lang == "fr" ]
2229
		then
2231
		then
2230
		echo "#                        Fin d'installation d'ALCASAR                       #"
2232
		echo "#                        Fin d'installation d'ALCASAR                       #"
2231
		echo "#                                                                           #"
2233
		echo "#                                                                           #"
2232
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2234
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2233
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2235
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2234
		echo "#                                                                           #"
2236
		echo "#                                                                           #"
2235
		echo "#############################################################################"
2237
		echo "#############################################################################"
2236
		echo
2238
		echo
2237
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2239
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2238
		echo
2240
		echo
2239
		echo "- Lisez attentivement la documentation d'exploitation"
2241
		echo "- Lisez attentivement la documentation d'exploitation"
2240
		echo
2242
		echo
2241
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar.localdomain"
2243
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar.localdomain"
2242
		echo
2244
		echo
2243
		echo "                   Appuyez sur 'Entrée' pour continuer"
2245
		echo "                   Appuyez sur 'Entrée' pour continuer"
2244
	else	
2246
	else	
2245
		echo "#                        End of ALCASAR install process                     #"
2247
		echo "#                        End of ALCASAR install process                     #"
2246
		echo "#                                                                           #"
2248
		echo "#                                                                           #"
2247
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2249
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2248
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2250
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2249
		echo "#                                                                           #"
2251
		echo "#                                                                           #"
2250
		echo "#############################################################################"
2252
		echo "#############################################################################"
2251
		echo
2253
		echo
2252
		echo "- The system will be rebooted in order to operate ALCASAR"
2254
		echo "- The system will be rebooted in order to operate ALCASAR"
2253
		echo
2255
		echo
2254
		echo "- Read the exploitation documentation"
2256
		echo "- Read the exploitation documentation"
2255
		echo
2257
		echo
2256
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar.localdomain"
2258
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar.localdomain"
2257
		echo
2259
		echo
2258
		echo "                   Hit 'Enter' to continue"
2260
		echo "                   Hit 'Enter' to continue"
2259
	fi
2261
	fi
2260
	sleep 2
2262
	sleep 2
2261
	if [ "$mode" != "update" ]
2263
	if [ "$mode" != "update" ]
2262
	then
2264
	then
2263
		read a
2265
		read a
2264
	fi
2266
	fi
2265
	clear
2267
	clear
2266
	reboot
2268
	reboot
2267
} # End post_install ()
2269
} # End post_install ()
2268
 
2270
 
2269
#################################
2271
#################################
2270
#  	Main Install loop  	#
2272
#  	Main Install loop  	#
2271
#################################
2273
#################################
2272
dir_exec=`dirname "$0"`
2274
dir_exec=`dirname "$0"`
2273
if [ $dir_exec != "." ]
2275
if [ $dir_exec != "." ]
2274
then
2276
then
2275
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2277
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2276
	echo "Launch this program from the ALCASAR archive directory"
2278
	echo "Launch this program from the ALCASAR archive directory"
2277
	exit 0
2279
	exit 0
2278
fi
2280
fi
2279
if [[ $EUID > 0 ]]
2281
if [[ $EUID > 0 ]]
2280
then
2282
then
2281
	echo "Vous devez être "root" pour installer ALCASAR (commande 'su')"
2283
	echo "Vous devez être "root" pour installer ALCASAR (commande 'su')"
2282
	echo "You must be "root" to install ALCASAR ('su' command)"
2284
	echo "You must be "root" to install ALCASAR ('su' command)"
2283
	exit 0
2285
	exit 0
2284
fi
2286
fi
2285
VERSION=`cat $DIR_INSTALL/VERSION`
2287
VERSION=`cat $DIR_INSTALL/VERSION`
2286
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2288
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2287
nb_args=$#
2289
nb_args=$#
2288
args=$1
2290
args=$1
2289
if [ $nb_args -eq 0 ]
2291
if [ $nb_args -eq 0 ]
2290
then
2292
then
2291
	nb_args=1
2293
	nb_args=1
2292
	args="-h"
2294
	args="-h"
2293
fi
2295
fi
2294
chmod -R u+x $DIR_SCRIPTS/*
2296
chmod -R u+x $DIR_SCRIPTS/*
2295
case $args in
2297
case $args in
2296
	-\? | -h* | --h*)
2298
	-\? | -h* | --h*)
2297
		echo "$usage"
2299
		echo "$usage"
2298
		exit 0
2300
		exit 0
2299
		;;
2301
		;;
2300
	-i | --install)
2302
	-i | --install)
2301
		header_install
2303
		header_install
2302
		license
2304
		license
2303
		header_install
2305
		header_install
2304
		testing
2306
		testing
2305
# RPMs install
2307
# RPMs install
2306
		$DIR_SCRIPTS/alcasar-urpmi.sh
2308
		$DIR_SCRIPTS/alcasar-urpmi.sh
2307
		if [ "$?" != "0" ]
2309
		if [ "$?" != "0" ]
2308
		then
2310
		then
2309
			exit 0
2311
			exit 0
2310
		fi
2312
		fi
2311
		if [ -e $CONF_FILE ]
2313
		if [ -e $CONF_FILE ]
2312
		then
2314
		then
2313
# Uninstall the running version
2315
# Uninstall the running version
2314
			$DIR_SCRIPTS/alcasar-uninstall.sh -update
2316
			$DIR_SCRIPTS/alcasar-uninstall.sh -update
2315
		fi
2317
		fi
2316
# Test if manual update	
2318
# Test if manual update	
2317
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2319
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2318
		then
2320
		then
2319
			header_install
2321
			header_install
2320
			if [ $Lang == "fr" ]
2322
			if [ $Lang == "fr" ]
2321
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2323
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2322
				else echo "The configuration file of an old version has been found";
2324
				else echo "The configuration file of an old version has been found";
2323
			fi
2325
			fi
2324
			response=0
2326
			response=0
2325
			PTN='^[oOnNyY]$'
2327
			PTN='^[oOnNyY]$'
2326
			until [[ $(expr $response : $PTN) -gt 0 ]]
2328
			until [[ $(expr $response : $PTN) -gt 0 ]]
2327
			do
2329
			do
2328
				if [ $Lang == "fr" ]
2330
				if [ $Lang == "fr" ]
2329
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2331
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2330
					else echo -n "Do you want to use it (Y/n)?";
2332
					else echo -n "Do you want to use it (Y/n)?";
2331
				 fi
2333
				 fi
2332
				read response
2334
				read response
2333
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2335
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2334
				then rm -f /tmp/alcasar-conf*
2336
				then rm -f /tmp/alcasar-conf*
2335
				fi
2337
				fi
2336
			done
2338
			done
2337
		fi
2339
		fi
2338
# Test if update
2340
# Test if update
2339
		if [ -e /tmp/alcasar-conf* ] 
2341
		if [ -e /tmp/alcasar-conf* ] 
2340
		then
2342
		then
2341
			if [ $Lang == "fr" ]
2343
			if [ $Lang == "fr" ]
2342
				then echo "#### Installation avec mise à jour ####";
2344
				then echo "#### Installation avec mise à jour ####";
2343
				else echo "#### Installation with update     ####";
2345
				else echo "#### Installation with update     ####";
2344
			fi
2346
			fi
2345
# Extract the central configuration file
2347
# Extract the central configuration file
2346
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2348
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2347
			ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2349
			ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2348
			PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2350
			PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2349
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2351
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2350
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2352
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2351
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2353
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2352
			mode="update"
2354
			mode="update"
2353
		fi
2355
		fi
2354
		for func in init network ACC CA time_server init_db freeradius chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd msec letsencrypt post_install
2356
		for func in init network ACC CA time_server init_db freeradius chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd msec letsencrypt post_install
2355
		do
2357
		do
2356
			$func
2358
			$func
2357
# echo "*** 'debug' : end of function $func ***"; read a
2359
# echo "*** 'debug' : end of function $func ***"; read a
2358
		done
2360
		done
2359
		;;
2361
		;;
2360
	-u | --uninstall)
2362
	-u | --uninstall)
2361
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
2363
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
2362
		then
2364
		then
2363
			if [ $Lang == "fr" ]
2365
			if [ $Lang == "fr" ]
2364
				then echo "ALCASAR n'est pas installé!";
2366
				then echo "ALCASAR n'est pas installé!";
2365
				else echo "ALCASAR isn't installed!";
2367
				else echo "ALCASAR isn't installed!";
2366
			fi
2368
			fi
2367
			exit 0
2369
			exit 0
2368
		fi
2370
		fi
2369
		response=0
2371
		response=0
2370
		PTN='^[oOnN]$'
2372
		PTN='^[oOnN]$'
2371
		until [[ $(expr $response : $PTN) -gt 0 ]]
2373
		until [[ $(expr $response : $PTN) -gt 0 ]]
2372
		do
2374
		do
2373
			if [ $Lang == "fr" ]
2375
			if [ $Lang == "fr" ]
2374
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2376
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2375
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2377
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2376
			fi
2378
			fi
2377
			read response
2379
			read response
2378
		done
2380
		done
2379
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2381
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2380
		then
2382
		then
2381
			$DIR_SCRIPTS/alcasar-conf.sh --create
2383
			$DIR_SCRIPTS/alcasar-conf.sh --create
2382
		else	
2384
		else	
2383
			rm -f /tmp/alcasar-conf*
2385
			rm -f /tmp/alcasar-conf*
2384
		fi
2386
		fi
2385
# Uninstall the running version
2387
# Uninstall the running version
2386
		$DIR_SCRIPTS/alcasar-uninstall.sh -full
2388
		$DIR_SCRIPTS/alcasar-uninstall.sh -full
2387
		;;
2389
		;;
2388
	*)
2390
	*)
2389
		echo "Argument inconnu :$1";
2391
		echo "Argument inconnu :$1";
2390
		echo "Unknown argument :$1";
2392
		echo "Unknown argument :$1";
2391
		echo "$usage"
2393
		echo "$usage"
2392
		exit 1
2394
		exit 1
2393
		;;
2395
		;;
2394
esac
2396
esac
2395
# end of script
2397
# end of script
2396
 
2398
 
2397
 
2399