Subversion Repositories ALCASAR

Rev

Rev 2446 | Rev 2454 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 2446 Rev 2447
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 2446 2017-12-03 23:07:18Z richard $ 
2
#  $Id: alcasar.sh 2447 2017-12-04 23:05:51Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares : 
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
22
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, gammu, havp, libclamav, Ulog, fail2ban, tinyproxy, NFsen and NFdump
23
 
23
 
24
# Options :
24
# Options :
25
#       -i or --install
25
#       -i or --install
26
#       -u or --uninstall
26
#       -u or --uninstall
27
 
27
 
28
# Functions :
28
# Functions :
29
#	testing			: connectivity tests, free space test and mageia version test
29
#	testing			: connectivity tests, free space test and mageia version test
30
#	init			: Installation of RPM and scripts
30
#	init			: Installation of RPM and scripts
31
#	network			: Network parameters
31
#	network			: Network parameters
32
#	ACC			: ALCASAR Control Center installation
32
#	ACC			: ALCASAR Control Center installation
33
#	CA			: Certification Authority initialization
33
#	CA			: Certification Authority initialization
34
#	time_server		: NTPd configuration
34
#	time_server		: NTPd configuration
35
#	init_db			: Initilization of radius database managed with MariaDB
35
#	init_db			: Initilization of radius database managed with MariaDB
36
#	freeradius		: FreeRadius initialisation
36
#	freeradius		: FreeRadius initialisation
37
#	chilli			: coovachilli initialisation (+authentication page)
37
#	chilli			: coovachilli initialisation (+authentication page)
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
38
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	antivirus		: HAVP + libclamav configuration
39
#	antivirus		: HAVP + libclamav configuration
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
40
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
41
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	nfsen			: Configuration of Nfsen Netflow grapher 
42
#	nfsen			: Configuration of Nfsen Netflow grapher 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	vnstat			: little network stat daemon
44
#	vnstat			: little network stat daemon
45
#	BL			: Adaptation of Toulouse University BlackList : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	BL			: Adaptation of Toulouse University BlackList : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
46
#	cron			: Logs export + watchdog + connexion statistics
46
#	cron			: Logs export + watchdog + connexion statistics
47
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	fail2ban		: Fail2ban IDS installation and configuration
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
49
#	msec			: Mandriva security package configuration
49
#	msec			: Mandriva security package configuration
50
#	letsencrypt		: Let's Encrypt client
50
#	letsencrypt		: Let's Encrypt client
51
#	post_install		: Security, log rotation, etc.
51
#	post_install		: Security, log rotation, etc.
52
 
52
 
53
DATE=`date '+%d %B %Y - %Hh%M'`
53
DATE=`date '+%d %B %Y - %Hh%M'`
54
DATE_SHORT=`date '+%d/%m/%Y'`
54
DATE_SHORT=`date '+%d/%m/%Y'`
55
Lang=`echo $LANG|cut -c 1-2`
55
Lang=`echo $LANG|cut -c 1-2`
56
mode="install"
56
mode="install"
57
# ******* Files parameters - paramètres fichiers *********
57
# ******* Files parameters - paramètres fichiers *********
58
DIR_INSTALL=`pwd`				# current directory 
58
DIR_INSTALL=`pwd`				# current directory 
59
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
59
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
60
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
60
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
61
DIR_BLACKLIST="$DIR_INSTALL/blacklist"		# install directory (with blacklist files)
61
DIR_BLACKLIST="$DIR_INSTALL/blacklist"		# install directory (with blacklist files)
62
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
62
DIR_SAVE="/var/Save"				# backup directory (traceability_log, user_db, security_log)
63
DIR_WEB="/var/www/html"				# directory of APACHE
63
DIR_WEB="/var/www/html"				# directory of APACHE
64
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
64
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
65
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
65
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
66
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
66
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
67
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
67
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
68
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
68
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
69
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
69
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
70
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
70
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
71
# ******* DBMS parameters - paramètres SGBD ********
71
# ******* DBMS parameters - paramètres SGBD ********
72
DB_RADIUS="radius"				# database name used by FreeRadius server
72
DB_RADIUS="radius"				# database name used by FreeRadius server
73
DB_USER="radius"				# user name allows to request the users database
73
DB_USER="radius"				# user name allows to request the users database
74
DB_GAMMU="gammu"				# database name used by Gammu-smsd
74
DB_GAMMU="gammu"				# database name used by Gammu-smsd
75
# ******* Network parameters - paramètres réseau *******
75
# ******* Network parameters - paramètres réseau *******
76
HOSTNAME="alcasar"				# default hostname
76
HOSTNAME="alcasar"				# default hostname
77
DOMAIN="localdomain"				# default local domain
77
DOMAIN="localdomain"				# default local domain
78
EXTIF=`/usr/sbin/ip route|grep default|head -n1|cut -d" " -f5`							# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
78
EXTIF=`/usr/sbin/ip route|grep default|head -n1|cut -d" " -f5`							# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
79
INTIF=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
79
INTIF=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|head -n1|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
80
MTU="1500"
80
MTU="1500"
81
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
81
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
82
# ****** Paths - chemin des commandes *******
82
# ****** Paths - chemin des commandes *******
83
SED="/bin/sed -i"
83
SED="/bin/sed -i"
84
# ****************** End of global parameters *********************
84
# ****************** End of global parameters *********************
85
 
85
 
86
license ()
86
license ()
87
{
87
{
88
	if [ $Lang == "fr" ]
88
	if [ $Lang == "fr" ]
89
	then
89
	then
90
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
90
		cat $DIR_INSTALL/gpl-warning.fr.txt | more
91
	else
91
	else
92
		cat $DIR_INSTALL/gpl-warning.txt | more
92
		cat $DIR_INSTALL/gpl-warning.txt | more
93
	fi
93
	fi
94
	response=0
94
	response=0
95
	PTN='^[oOyYnN]$'
95
	PTN='^[oOyYnN]$'
96
	until [[ $(expr $response : $PTN) -gt 0 ]]
96
	until [[ $(expr $response : $PTN) -gt 0 ]]
97
	do
97
	do
98
		if [ $Lang == "fr" ]
98
		if [ $Lang == "fr" ]
99
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
99
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
100
			else echo -n "Do you accept the terms of this license (Y/n)? : "
100
			else echo -n "Do you accept the terms of this license (Y/n)? : "
101
		fi
101
		fi
102
		read response
102
		read response
103
	done
103
	done
104
	if [ "$response" = "n" ] || [ "$response" = "N" ]
104
	if [ "$response" = "n" ] || [ "$response" = "N" ]
105
	then
105
	then
106
		exit 1
106
		exit 1
107
	fi
107
	fi
108
}
108
}
109
 
109
 
110
header_install ()
110
header_install ()
111
{
111
{
112
	clear
112
	clear
113
	echo "-----------------------------------------------------------------------------"
113
	echo "-----------------------------------------------------------------------------"
114
	echo "                     ALCASAR V$VERSION Installation"
114
	echo "                     ALCASAR V$VERSION Installation"
115
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
115
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
116
	echo "-----------------------------------------------------------------------------"
116
	echo "-----------------------------------------------------------------------------"
117
}
117
}
118
 
118
 
119
##################################################################
119
##################################################################
120
##			Function "testing"			##
120
##			Function "testing"			##
121
## - Test of Mageia version					##
121
## - Test of Mageia version					##
122
## - Test of ALCASAR version (if already installed)		##
122
## - Test of ALCASAR version (if already installed)		##
123
## - Test of free space on /var  (>10G)				##
123
## - Test of free space on /var  (>10G)				##
124
## - Test of Internet access					##
124
## - Test of Internet access					##
125
##################################################################
125
##################################################################
126
testing ()
126
testing ()
127
{
127
{
128
# Test of Mageia version
128
# Test of Mageia version
129
# extract the current Mageia version and hardware architecture (i586 ou X64)
129
# extract the current Mageia version and hardware architecture (i586 ou X64)
130
	fic=`cat /etc/product.id`
130
	fic=`cat /etc/product.id`
131
	unknown_os=0
131
	unknown_os=0
132
	old="$IFS"
132
	old="$IFS"
133
	IFS=","
133
	IFS=","
134
	set $fic
134
	set $fic
135
	for i in $*
135
	for i in $*
136
	do
136
	do
137
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
137
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
138
			then 
138
			then 
139
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
139
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
140
			unknown_os=`expr $unknown_os + 1`
140
			unknown_os=`expr $unknown_os + 1`
141
		fi
141
		fi
142
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
142
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
143
			then 
143
			then 
144
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
144
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
145
			unknown_os=`expr $unknown_os + 1`
145
			unknown_os=`expr $unknown_os + 1`
146
		fi
146
		fi
147
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
147
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
148
			then 
148
			then 
149
			ARCH=`echo $i|cut -d"=" -f2`
149
			ARCH=`echo $i|cut -d"=" -f2`
150
			unknown_os=`expr $unknown_os + 1`
150
			unknown_os=`expr $unknown_os + 1`
151
		fi
151
		fi
152
	done
152
	done
153
	if [ "$ARCH" == "i586" ]
153
	if [ "$ARCH" == "i586" ]
154
		then
154
		then
155
		if [ $Lang == "fr" ]
155
		if [ $Lang == "fr" ]
156
			then echo -n "Votre architecture matérielle doit être en 64bits"
156
			then echo -n "Votre architecture matérielle doit être en 64bits"
157
			else echo -n "You hardware architecture must be 64bits"
157
			else echo -n "You hardware architecture must be 64bits"
158
			exit 0
158
			exit 0
159
		fi
159
		fi
160
	fi
160
	fi
161
	IFS="$old"
161
	IFS="$old"
162
# Test if ALCASAR is already installed
162
# Test if ALCASAR is already installed
163
	if [ -e $CONF_FILE ]
163
	if [ -e $CONF_FILE ]
164
	then
164
	then
165
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
165
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
166
		if [ $Lang == "fr" ]
166
		if [ $Lang == "fr" ]
167
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
167
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
168
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
168
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
169
		fi
169
		fi
170
		response=0
170
		response=0
171
		PTN='^[oOnNyY]$'
171
		PTN='^[oOnNyY]$'
172
		until [[ $(expr $response : $PTN) -gt 0 ]]
172
		until [[ $(expr $response : $PTN) -gt 0 ]]
173
		do
173
		do
174
			if [ $Lang == "fr" ]
174
			if [ $Lang == "fr" ]
175
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
175
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
176
				else echo -n "Do you want to update (Y/n)?";
176
				else echo -n "Do you want to update (Y/n)?";
177
			 fi
177
			 fi
178
			read response
178
			read response
179
		done
179
		done
180
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
180
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
181
		then
181
		then
182
			rm -f /tmp/alcasar-conf*
182
			rm -f /tmp/alcasar-conf*
183
		else
183
		else
184
# Retrieve former NICname
184
# Retrieve former NICname
185
			EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`				# EXTernal InterFace
185
			EXTIF=`grep ^EXTIF= $CONF_FILE|cut -d"=" -f2`				# EXTernal InterFace
186
			INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`				# INTernal InterFace
186
			INTIF=`grep ^INTIF= $CONF_FILE|cut -d"=" -f2`				# INTernal InterFace
187
# Create the current conf file
187
# Create the current conf file
188
			$DIR_SCRIPTS/alcasar-conf.sh --create
188
			$DIR_SCRIPTS/alcasar-conf.sh --create
189
			mode="update"
189
			mode="update"
190
		fi
190
		fi
191
	fi
191
	fi
192
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "6" ) ]]
192
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "6" ) ]]
193
		then
193
		then
194
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
194
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
195
			then
195
			then
196
			echo
196
			echo
197
			if [ $Lang == "fr" ]
197
			if [ $Lang == "fr" ]
198
				then	
198
				then	
199
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
199
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
200
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
200
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
201
				echo "2 - Installez Linux-Mageia 6.0 (64bits) et ALCASAR (cf. doc d'installation)"
201
				echo "2 - Installez Linux-Mageia 6.0 (64bits) et ALCASAR (cf. doc d'installation)"
202
				echo "3 - Importez votre base des usagers"
202
				echo "3 - Importez votre base des usagers"
203
			else
203
			else
204
				echo "The automatic update of ALCASAR can't be performed."
204
				echo "The automatic update of ALCASAR can't be performed."
205
				echo "1 - Save your traceability files and the user database"
205
				echo "1 - Save your traceability files and the user database"
206
				echo "2 - Install Linux-Mageia 6 (64bits) & ALCASAR (cf. installation doc)"
206
				echo "2 - Install Linux-Mageia 6 (64bits) & ALCASAR (cf. installation doc)"
207
				echo "3 - Import your users database"
207
				echo "3 - Import your users database"
208
			fi
208
			fi
209
		else
209
		else
210
			if [ $Lang == "fr" ]
210
			if [ $Lang == "fr" ]
211
				then	
211
				then	
212
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
212
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
213
			else
213
			else
214
				echo "The installation of ALCASAR can't be performed."
214
				echo "The installation of ALCASAR can't be performed."
215
			fi
215
			fi
216
		fi
216
		fi
217
		echo
217
		echo
218
		if [ $Lang == "fr" ]
218
		if [ $Lang == "fr" ]
219
			then	
219
			then	
220
			echo "Le système d'exploitation doit être remplacé (Mageia6-64bits)"
220
			echo "Le système d'exploitation doit être remplacé (Mageia6-64bits)"
221
		else
221
		else
222
			echo "The OS must be replaced (Mageia6-64bits)"
222
			echo "The OS must be replaced (Mageia6-64bits)"
223
		fi
223
		fi
224
		exit 0
224
		exit 0
225
	fi
225
	fi
226
	if [ ! -d /var/log/netflow/porttracker ]
226
	if [ ! -d /var/log/netflow/porttracker ]
227
		then
227
		then
228
# Test free space on /var
228
# Test free space on /var
229
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
229
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
230
		if [ $free_space -lt 10 ]
230
		if [ $free_space -lt 10 ]
231
			then
231
			then
232
			if [ $Lang == "fr" ]
232
			if [ $Lang == "fr" ]
233
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
233
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
234
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
234
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
235
			fi
235
			fi
236
		exit 0
236
		exit 0
237
		fi
237
		fi
238
	fi
238
	fi
239
	if [ $Lang == "fr" ]
239
	if [ $Lang == "fr" ]
240
		then echo -n "Tests des paramètres réseau : "
240
		then echo -n "Tests des paramètres réseau : "
241
		else echo -n "Network parameters tests : "
241
		else echo -n "Network parameters tests : "
242
	fi
242
	fi
243
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
243
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
244
	cd /etc/sysconfig/network-scripts/
244
	cd /etc/sysconfig/network-scripts/
245
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
245
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
246
	for i in $IF_INTERFACES
246
	for i in $IF_INTERFACES
247
	do
247
	do
248
		IP_INTERFACE=`/usr/sbin/ip link|grep $i`	
248
		IP_INTERFACE=`/usr/sbin/ip link|grep $i`	
249
		if [ -z "$IP_INTERFACE" ]
249
		if [ -z "$IP_INTERFACE" ]
250
		then
250
		then
251
			rm -f ifcfg-$i
251
			rm -f ifcfg-$i
252
			
252
			
253
			if [ $Lang == "fr" ]
253
			if [ $Lang == "fr" ]
254
				then echo "Suppression : ifcfg-$i"
254
				then echo "Suppression : ifcfg-$i"
255
				else echo "Deleting : ifcfg-$i"
255
				else echo "Deleting : ifcfg-$i"
256
			fi
256
			fi
257
		fi
257
		fi
258
	done
258
	done
259
	cd $DIR_INSTALL
259
	cd $DIR_INSTALL
260
	echo -n "."
260
	echo -n "."
261
# Test Ethernet NIC links state 
261
# Test Ethernet NIC links state 
262
	DOWN_IF=`/usr/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "|grep -v "^w"`
262
	DOWN_IF=`/usr/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "|grep -v "^w"`
263
	for i in $DOWN_IF
263
	for i in $DOWN_IF
264
	do
264
	do
265
		echo $i
265
		echo $i
266
		if [ $Lang == "fr" ]
266
		if [ $Lang == "fr" ]
267
		then 
267
		then 
268
			echo "Échec"
268
			echo "Échec"
269
			echo "Le lien réseau de la carte $i n'est pas actif."
269
			echo "Le lien réseau de la carte $i n'est pas actif."
270
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
270
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
271
		else
271
		else
272
			echo "Failed"
272
			echo "Failed"
273
			echo "The link state of $i interface is down."
273
			echo "The link state of $i interface is down."
274
			echo "Make sure that this network card is connected to a switch or an A.P."
274
			echo "Make sure that this network card is connected to a switch or an A.P."
275
		fi
275
		fi
276
		exit 0
276
		exit 0
277
	done
277
	done
278
	echo -n "."
278
	echo -n "."
279
# Test EXTIF config files
279
# Test EXTIF config files
280
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
280
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
281
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
281
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
282
	PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
282
	PUBLIC_GATEWAY=`ip route list|grep $EXTIF|grep ^default|cut -d" " -f3`
283
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
283
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
284
	then
284
	then
285
		if [ $Lang == "fr" ]
285
		if [ $Lang == "fr" ]
286
		then 
286
		then 
287
			echo "Échec"
287
			echo "Échec"
288
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
288
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
289
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
289
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
290
			echo "Appliquez les changements : 'systemctl restart network'"
290
			echo "Appliquez les changements : 'systemctl restart network'"
291
		else
291
		else
292
			echo "Failed"
292
			echo "Failed"
293
			echo "The Internet connected network card ($EXTIF) isn't well configured."
293
			echo "The Internet connected network card ($EXTIF) isn't well configured."
294
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
294
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
295
			echo "Apply the new configuration 'systemctl restart network'"
295
			echo "Apply the new configuration 'systemctl restart network'"
296
		fi
296
		fi
297
		echo "DEVICE=$EXTIF"
297
		echo "DEVICE=$EXTIF"
298
		echo "IPADDR="
298
		echo "IPADDR="
299
		echo "NETMASK="
299
		echo "NETMASK="
300
		echo "GATEWAY="
300
		echo "GATEWAY="
301
		echo "DNS1="
301
		echo "DNS1="
302
		echo "DNS2="
302
		echo "DNS2="
303
		echo "ONBOOT=yes"
303
		echo "ONBOOT=yes"
304
		exit 0
304
		exit 0
305
	fi
305
	fi
306
	echo -n "."
306
	echo -n "."
307
# Test if default GW is set on EXTIF (router or ISP provider equipment)
307
# Test if default GW is set on EXTIF (router or ISP provider equipment)
308
	if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
308
	if [ `ip route list|grep $EXTIF|grep -c ^default` -ne "1" ] ; then
309
		if [ $Lang == "fr" ]
309
		if [ $Lang == "fr" ]
310
		then 
310
		then 
311
			echo "Échec"
311
			echo "Échec"
312
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
312
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
313
			echo "Réglez ce problème puis relancez ce script."
313
			echo "Réglez ce problème puis relancez ce script."
314
		else
314
		else
315
			echo "Failed"
315
			echo "Failed"
316
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
316
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
317
			echo "Resolv this problem, then restart this script."
317
			echo "Resolv this problem, then restart this script."
318
		fi
318
		fi
319
		exit 0
319
		exit 0
320
	fi
320
	fi
321
	echo -n "."
321
	echo -n "."
322
# Test if default GW is alive
322
# Test if default GW is alive
323
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
323
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
324
	if [ $(expr $arp_reply) -eq 0 ]
324
	if [ $(expr $arp_reply) -eq 0 ]
325
	       	then
325
	       	then
326
		if [ $Lang == "fr" ]
326
		if [ $Lang == "fr" ]
327
		then 
327
		then 
328
			echo "Échec"
328
			echo "Échec"
329
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
329
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
330
			echo "Réglez ce problème puis relancez ce script."
330
			echo "Réglez ce problème puis relancez ce script."
331
		else
331
		else
332
			echo "Failed"
332
			echo "Failed"
333
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
333
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
334
			echo "Resolv this problem, then restart this script."
334
			echo "Resolv this problem, then restart this script."
335
		fi
335
		fi
336
		exit 0
336
		exit 0
337
	fi
337
	fi
338
	echo -n "."
338
	echo -n "."
339
# Test Internet connectivity
339
# Test Internet connectivity
340
	rm -rf /tmp/con_ok.html
340
	rm -rf /tmp/con_ok.html
341
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
341
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
342
	if [ ! -e /tmp/con_ok.html ]
342
	if [ ! -e /tmp/con_ok.html ]
343
	then
343
	then
344
		if [ $Lang == "fr" ]
344
		if [ $Lang == "fr" ]
345
		then 
345
		then 
346
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
346
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
347
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
347
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
348
			echo "Vérifiez la validité des adresses IP des DNS."
348
			echo "Vérifiez la validité des adresses IP des DNS."
349
		else
349
		else
350
			echo "The Internet connection try failed (google.fr)."
350
			echo "The Internet connection try failed (google.fr)."
351
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
351
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
352
			echo "Verify the DNS IP addresses"
352
			echo "Verify the DNS IP addresses"
353
		fi
353
		fi
354
		exit 0
354
		exit 0
355
	fi
355
	fi
356
	rm -rf /tmp/con_ok.html
356
	rm -rf /tmp/con_ok.html
357
	echo ". : ok"
357
	echo ". : ok"
358
} # end of testing ()
358
} # end of testing ()
359
 
359
 
360
##################################################################
360
##################################################################
361
##			Function "init"				##
361
##			Function "init"				##
362
## - Création du fichier "/root/ALCASAR_parametres.tx		##
362
## - Création du fichier "/root/ALCASAR_parametres.tx		##
363
## - Installation et modification des scripts du portail	##
363
## - Installation et modification des scripts du portail	##
364
##################################################################
364
##################################################################
365
init ()
365
init ()
366
{
366
{
367
	if [ "$mode" != "update" ]
367
	if [ "$mode" != "update" ]
368
	then
368
	then
369
# On affecte le nom d'organisme
369
# On affecte le nom d'organisme
370
		header_install
370
		header_install
371
		ORGANISME=!
371
		ORGANISME=!
372
		PTN='^[a-zA-Z0-9-]*$'
372
		PTN='^[a-zA-Z0-9-]*$'
373
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
373
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
374
                do
374
                do
375
			if [ $Lang == "fr" ]
375
			if [ $Lang == "fr" ]
376
			       	then echo -n "Entrez le nom de votre organisme : "
376
			       	then echo -n "Entrez le nom de votre organisme : "
377
				else echo -n "Enter the name of your organism : "
377
				else echo -n "Enter the name of your organism : "
378
			fi
378
			fi
379
			read ORGANISME
379
			read ORGANISME
380
			if [ "$ORGANISME" == "" ]
380
			if [ "$ORGANISME" == "" ]
381
				then
381
				then
382
				ORGANISME=!
382
				ORGANISME=!
383
			fi
383
			fi
384
		done
384
		done
385
	fi
385
	fi
386
# On crée aléatoirement les mots de passe et les secrets partagés
386
# On crée aléatoirement les mots de passe et les secrets partagés
387
# We create random passwords and shared secrets
387
# We create random passwords and shared secrets
388
	rm -f $PASSWD_FILE
388
	rm -f $PASSWD_FILE
389
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
389
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
390
	grub2pwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
390
	grub2pwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
391
    pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
391
    pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
392
        LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
392
        LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
393
        grep -v '[eE]nter password:' | \
393
        grep -v '[eE]nter password:' | \
394
        sed -e "s/PBKDF2 hash of your password is //"`
394
        sed -e "s/PBKDF2 hash of your password is //"`
395
    echo "GRUB2_PASSWORD=$pbkdf2" > /boot/grub2/user.cfg
395
    echo "GRUB2_PASSWORD=$pbkdf2" > /boot/grub2/user.cfg
396
    [ -e /root/grub.default ] || cp /etc/grub.d/10_linux /root/grub.default
396
    [ -e /root/grub.default ] || cp /etc/grub.d/10_linux /root/grub.default
397
    cp -f $DIR_CONF/grub-10_linux /etc/grub.d/10_linux  # Request password only on menu editing attempts (not when selecting an entry)
397
    cp -f $DIR_CONF/grub-10_linux /etc/grub.d/10_linux  # Request password only on menu editing attempts (not when selecting an entry)
398
    chmod 0600 /boot/grub2/user.cfg
398
    chmod 0600 /boot/grub2/user.cfg
399
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
399
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
400
    echo "GRUB2_user=root" >> $PASSWD_FILE
400
    echo "GRUB2_user=root" >> $PASSWD_FILE
401
    echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
401
    echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
402
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
402
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
403
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
403
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
404
	echo "db_root=$mysqlpwd" >> $PASSWD_FILE
404
	echo "db_root=$mysqlpwd" >> $PASSWD_FILE
405
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
405
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
406
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
406
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
407
	echo "db_user=$DB_USER" >> $PASSWD_FILE
407
	echo "db_user=$DB_USER" >> $PASSWD_FILE
408
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
408
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
409
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
409
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
410
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
410
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
411
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
411
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
412
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
412
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c16`
413
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
413
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
414
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
414
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
415
	chmod 640 $PASSWD_FILE
415
	chmod 640 $PASSWD_FILE
416
#  copy scripts in in /usr/local/bin
416
#  copy scripts in in /usr/local/bin
417
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
417
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
418
#  copy conf files in /usr/local/etc
418
#  copy conf files in /usr/local/etc
419
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
419
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
420
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mysql.sh
420
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mysql.sh
421
# generate central conf file
421
# generate central conf file
422
	cat <<EOF > $CONF_FILE
422
	cat <<EOF > $CONF_FILE
423
##########################################
423
##########################################
424
##                                      ##
424
##                                      ##
425
##          ALCASAR Parameters          ##
425
##          ALCASAR Parameters          ##
426
##                                      ##
426
##                                      ##
427
##########################################
427
##########################################
428
 
428
 
429
INSTALL_DATE=$DATE
429
INSTALL_DATE=$DATE
430
VERSION=$VERSION
430
VERSION=$VERSION
431
ORGANISM=$ORGANISME
431
ORGANISM=$ORGANISME
432
HOSTNAME=$HOSTNAME
432
HOSTNAME=$HOSTNAME
433
DOMAIN=$DOMAIN
433
DOMAIN=$DOMAIN
434
EOF
434
EOF
435
	chmod o-rwx $CONF_FILE
435
	chmod o-rwx $CONF_FILE
436
} # End of init ()
436
} # End of init ()
437
 
437
 
438
##################################################################
438
##################################################################
439
##			Function "network"			##
439
##			Function "network"			##
440
## - Définition du plan d'adressage du réseau de consultation	##
440
## - Définition du plan d'adressage du réseau de consultation	##
441
## - Nommage DNS du système 					##
441
## - Nommage DNS du système 					##
442
## - Configuration de l'interface INTIF (réseau de consultation)##
442
## - Configuration de l'interface INTIF (réseau de consultation)##
443
## - Modification du fichier /etc/hosts				##
443
## - Modification du fichier /etc/hosts				##
444
## - Renseignement des fichiers hosts.allow et hosts.deny	##
444
## - Renseignement des fichiers hosts.allow et hosts.deny	##
445
##################################################################
445
##################################################################
446
network ()
446
network ()
447
{
447
{
448
	header_install
448
	header_install
449
	if [ "$mode" != "update" ]
449
	if [ "$mode" != "update" ]
450
		then
450
		then
451
		if [ $Lang == "fr" ]
451
		if [ $Lang == "fr" ]
452
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
452
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
453
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
453
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
454
		fi
454
		fi
455
		response=0
455
		response=0
456
		PTN='^[oOyYnN]$'
456
		PTN='^[oOyYnN]$'
457
		until [[ $(expr $response : $PTN) -gt 0 ]]
457
		until [[ $(expr $response : $PTN) -gt 0 ]]
458
		do
458
		do
459
			if [ $Lang == "fr" ]
459
			if [ $Lang == "fr" ]
460
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
460
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
461
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
461
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
462
			fi
462
			fi
463
			read response
463
			read response
464
		done
464
		done
465
		if [ "$response" = "n" ] || [ "$response" = "N" ]
465
		if [ "$response" = "n" ] || [ "$response" = "N" ]
466
		then
466
		then
467
			PRIVATE_IP_MASK="0"
467
			PRIVATE_IP_MASK="0"
468
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
468
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
469
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
469
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
470
			do
470
			do
471
				if [ $Lang == "fr" ]
471
				if [ $Lang == "fr" ]
472
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
472
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
473
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
473
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
474
				fi
474
				fi
475
				read PRIVATE_IP_MASK
475
				read PRIVATE_IP_MASK
476
			done
476
			done
477
		else
477
		else
478
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
478
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
479
		fi
479
		fi
480
	else
480
	else
481
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= conf/etc/alcasar.conf|cut -d"=" -f2` 
481
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= conf/etc/alcasar.conf|cut -d"=" -f2` 
482
		rm -rf conf/etc/alcasar.conf
482
		rm -rf conf/etc/alcasar.conf
483
	fi
483
	fi
484
# Define LAN side global parameters
484
# Define LAN side global parameters
485
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
485
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
486
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
486
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
487
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
487
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
488
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
488
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
489
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
489
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
490
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
490
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
491
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
491
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
492
		then
492
		then
493
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
493
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
494
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
494
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
495
	fi	
495
	fi	
496
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
496
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
497
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
497
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
498
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
498
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
499
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
499
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
500
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
500
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
501
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
501
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
502
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
502
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
503
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
503
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
504
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
504
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
505
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
505
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
506
# Define Internet parameters
506
# Define Internet parameters
507
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
507
	DNS1=`grep ^nameserver /etc/resolv.conf|awk -F" " '{print $2}'|head -n 1`				# 1st DNS server
508
	nb_dns=`grep -c ^nameserver /etc/resolv.conf`
508
	nb_dns=`grep -c ^nameserver /etc/resolv.conf`
509
	if [ $nb_dns == 2 ]
509
	if [ $nb_dns == 2 ]
510
		then
510
		then
511
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
511
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
512
	fi
512
	fi
513
	DNS1=${DNS1:=208.67.220.220}
513
	DNS1=${DNS1:=208.67.220.220}
514
	DNS2=${DNS2:=208.67.222.222}
514
	DNS2=${DNS2:=208.67.222.222}
515
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
515
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
516
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
516
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
517
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
517
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
518
# Wrtie the conf file
518
# Wrtie the conf file
519
	echo "EXTIF=$EXTIF" >> $CONF_FILE
519
	echo "EXTIF=$EXTIF" >> $CONF_FILE
520
	echo "INTIF=$INTIF" >> $CONF_FILE
520
	echo "INTIF=$INTIF" >> $CONF_FILE
521
	######## Récupération des interfaces du ou des réseaux de consultation supplémentaires #################
521
	######## Récupération des interfaces du ou des réseaux de consultation supplémentaires #################
522
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
522
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
523
 
523
 
524
	for i in $INTERFACES
524
	for i in $INTERFACES
525
	do
525
	do
526
		SUB=`echo ${i:0:2}`
526
		SUB=`echo ${i:0:2}`
527
		if [ $SUB = "wl" ]
527
		if [ $SUB = "wl" ]
528
			then WIFIF=$i
528
			then WIFIF=$i
529
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ] 
529
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ] 
530
			then LANIF=$i
530
			then LANIF=$i
531
		fi
531
		fi
532
	done
532
	done
533
 
533
 
534
	if [ -n "$WIFIF" ]
534
	if [ -n "$WIFIF" ]
535
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
535
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
536
	elif [ -n "$LANIF" ]
536
	elif [ -n "$LANIF" ]
537
		then echo "LANIF=$LANIF" >> $CONF_FILE
537
		then echo "LANIF=$LANIF" >> $CONF_FILE
538
	fi
538
	fi
539
	#########################################################################################################	
539
	#########################################################################################################	
540
	
540
	
541
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
541
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
542
	if [ $IP_SETTING == "dhcp" ]
542
	if [ $IP_SETTING == "dhcp" ]
543
		then
543
		then
544
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
544
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
545
		echo "GW=dhcp" >> $CONF_FILE
545
		echo "GW=dhcp" >> $CONF_FILE
546
	else
546
	else
547
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
547
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
548
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
548
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
549
	fi
549
	fi
550
	echo "DNS1=$DNS1" >> $CONF_FILE
550
	echo "DNS1=$DNS1" >> $CONF_FILE
551
	echo "DNS2=$DNS2" >> $CONF_FILE
551
	echo "DNS2=$DNS2" >> $CONF_FILE
552
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
552
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
553
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
553
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
554
	echo "DHCP=on" >> $CONF_FILE
554
	echo "DHCP=on" >> $CONF_FILE
555
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
555
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
556
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
556
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
557
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
557
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
558
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
558
	echo "INT_DNS_DOMAIN=none" >> $CONF_FILE
559
	echo "INT_DNS_IP=none" >> $CONF_FILE
559
	echo "INT_DNS_IP=none" >> $CONF_FILE
560
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
560
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
561
# network default
561
# network default
562
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
562
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
563
	cat <<EOF > /etc/sysconfig/network
563
	cat <<EOF > /etc/sysconfig/network
564
NETWORKING=yes
564
NETWORKING=yes
565
FORWARD_IPV4=true
565
FORWARD_IPV4=true
566
EOF
566
EOF
567
# /etc/hosts config
567
# /etc/hosts config
568
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
568
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
569
	cat <<EOF > /etc/hosts
569
	cat <<EOF > /etc/hosts
570
127.0.0.1	localhost
570
127.0.0.1	localhost
571
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME
571
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME
572
EOF
572
EOF
573
# EXTIF (Internet) config
573
# EXTIF (Internet) config
574
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
574
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
575
	if [ $IP_SETTING == "dhcp" ]
575
	if [ $IP_SETTING == "dhcp" ]
576
		then
576
		then
577
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
577
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
578
DEVICE=$EXTIF
578
DEVICE=$EXTIF
579
BOOTPROTO=dhcp
579
BOOTPROTO=dhcp
580
DNS1=127.0.0.1
580
DNS1=127.0.0.1
581
PEERDNS=no
581
PEERDNS=no
582
RESOLV_MODS=yes
582
RESOLV_MODS=yes
583
ONBOOT=yes
583
ONBOOT=yes
584
NOZEROCONF=yes
584
NOZEROCONF=yes
585
METRIC=10
585
METRIC=10
586
MII_NOT_SUPPORTED=yes
586
MII_NOT_SUPPORTED=yes
587
IPV6INIT=no
587
IPV6INIT=no
588
IPV6TO4INIT=no
588
IPV6TO4INIT=no
589
ACCOUNTING=no
589
ACCOUNTING=no
590
USERCTL=no
590
USERCTL=no
591
MTU=$MTU
591
MTU=$MTU
592
EOF
592
EOF
593
		else	
593
		else	
594
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
594
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
595
DEVICE=$EXTIF
595
DEVICE=$EXTIF
596
BOOTPROTO=static
596
BOOTPROTO=static
597
IPADDR=$PUBLIC_IP
597
IPADDR=$PUBLIC_IP
598
NETMASK=$PUBLIC_NETMASK
598
NETMASK=$PUBLIC_NETMASK
599
GATEWAY=$PUBLIC_GATEWAY
599
GATEWAY=$PUBLIC_GATEWAY
600
DNS1=127.0.0.1
600
DNS1=127.0.0.1
601
RESOLV_MODS=yes
601
RESOLV_MODS=yes
602
ONBOOT=yes
602
ONBOOT=yes
603
METRIC=10
603
METRIC=10
604
NOZEROCONF=yes
604
NOZEROCONF=yes
605
MII_NOT_SUPPORTED=yes
605
MII_NOT_SUPPORTED=yes
606
IPV6INIT=no
606
IPV6INIT=no
607
IPV6TO4INIT=no
607
IPV6TO4INIT=no
608
ACCOUNTING=no
608
ACCOUNTING=no
609
USERCTL=no
609
USERCTL=no
610
MTU=$MTU
610
MTU=$MTU
611
EOF
611
EOF
612
	fi
612
	fi
613
# Config INTIF (consultation LAN) in normal mode
613
# Config INTIF (consultation LAN) in normal mode
614
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
614
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
615
DEVICE=$INTIF
615
DEVICE=$INTIF
616
BOOTPROTO=static
616
BOOTPROTO=static
617
ONBOOT=yes
617
ONBOOT=yes
618
NOZEROCONF=yes
618
NOZEROCONF=yes
619
MII_NOT_SUPPORTED=yes
619
MII_NOT_SUPPORTED=yes
620
IPV6INIT=no
620
IPV6INIT=no
621
IPV6TO4INIT=no
621
IPV6TO4INIT=no
622
ACCOUNTING=no
622
ACCOUNTING=no
623
USERCTL=no
623
USERCTL=no
624
EOF
624
EOF
625
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
625
	cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
626
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
626
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
627
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
627
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
628
DEVICE=$INTIF
628
DEVICE=$INTIF
629
BOOTPROTO=static
629
BOOTPROTO=static
630
IPADDR=$PRIVATE_IP
630
IPADDR=$PRIVATE_IP
631
NETMASK=$PRIVATE_NETMASK
631
NETMASK=$PRIVATE_NETMASK
632
ONBOOT=yes
632
ONBOOT=yes
633
METRIC=10
633
METRIC=10
634
NOZEROCONF=yes
634
NOZEROCONF=yes
635
MII_NOT_SUPPORTED=yes
635
MII_NOT_SUPPORTED=yes
636
IPV6INIT=no
636
IPV6INIT=no
637
IPV6TO4INIT=no
637
IPV6TO4INIT=no
638
ACCOUNTING=no
638
ACCOUNTING=no
639
USERCTL=no
639
USERCTL=no
640
EOF
640
EOF
641
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
641
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
642
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
642
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
643
	then
643
	then
644
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
644
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
645
DEVICE=$WIFIF
645
DEVICE=$WIFIF
646
BOOTPROTO=static
646
BOOTPROTO=static
647
ONBOOT=yes
647
ONBOOT=yes
648
NOZEROCONF=yes
648
NOZEROCONF=yes
649
MII_NOT_SUPPORTED=yes
649
MII_NOT_SUPPORTED=yes
650
IPV6INIT=no
650
IPV6INIT=no
651
IPV6TO4INIT=no
651
IPV6TO4INIT=no
652
ACCOUNTING=no
652
ACCOUNTING=no
653
USERCTL=no
653
USERCTL=no
654
EOF
654
EOF
655
	elif [ -n "$LANIF" ]
655
	elif [ -n "$LANIF" ]
656
	then
656
	then
657
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
657
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
658
DEVICE=$LANIF
658
DEVICE=$LANIF
659
BOOTPROTO=static
659
BOOTPROTO=static
660
ONBOOT=yes
660
ONBOOT=yes
661
NOZEROCONF=yes
661
NOZEROCONF=yes
662
MII_NOT_SUPPORTED=yes
662
MII_NOT_SUPPORTED=yes
663
IPV6INIT=no
663
IPV6INIT=no
664
IPV6TO4INIT=no
664
IPV6TO4INIT=no
665
ACCOUNTING=no
665
ACCOUNTING=no
666
USERCTL=no
666
USERCTL=no
667
EOF
667
EOF
668
	fi
668
	fi
669
	#########################################################################################################	
669
	#########################################################################################################	
670
# Renseignement des fichiers hosts.allow et hosts.deny
670
# Renseignement des fichiers hosts.allow et hosts.deny
671
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
671
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
672
	cat <<EOF > /etc/hosts.allow
672
	cat <<EOF > /etc/hosts.allow
673
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
673
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
674
sshd: ALL
674
sshd: ALL
675
ntpd: $PRIVATE_NETWORK_SHORT
675
ntpd: $PRIVATE_NETWORK_SHORT
676
EOF
676
EOF
677
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
677
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
678
	cat <<EOF > /etc/hosts.deny
678
	cat <<EOF > /etc/hosts.deny
679
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
679
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
680
EOF
680
EOF
681
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
681
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
682
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
682
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
683
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
683
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
684
# load conntrack ftp module
684
# load conntrack ftp module
685
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
685
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
686
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
686
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
687
# load ipt_NETFLOW module
687
# load ipt_NETFLOW module
688
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
688
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
689
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
689
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
690
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
690
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
691
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
691
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
692
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
692
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
693
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
693
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
694
# 
694
# 
695
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
695
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
696
} # End of network ()
696
} # End of network ()
697
 
697
 
698
##################################################################
698
##################################################################
699
##			Function "ACC"				##
699
##			Function "ACC"				##
700
## - installation of then ALCASAR Control Center (ACC)	)	##
700
## - installation of then ALCASAR Control Center (ACC)	)	##
701
## - configuration of the web server (Apache)			##
701
## - configuration of the web server (Apache)			##
702
## - creation of the first ACC admin account 			##
702
## - creation of the first ACC admin account 			##
703
## - secure the access						##
703
## - secure the access						##
704
##################################################################
704
##################################################################
705
ACC ()
705
ACC ()
706
{
706
{
707
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
707
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
708
	mkdir $DIR_WEB
708
	mkdir $DIR_WEB
709
# Copy & adapt ACC files
709
# Copy & adapt ACC files
710
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
710
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
711
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
711
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
712
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
712
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
713
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
713
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
714
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
714
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
715
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
715
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
716
	chown -R apache:apache $DIR_WEB/*
716
	chown -R apache:apache $DIR_WEB/*
717
# copy & adapt "freeradius-web" files
717
# copy & adapt "freeradius-web" files
718
	cp -rf $DIR_CONF/freeradius-web/ /etc/
718
	cp -rf $DIR_CONF/freeradius-web/ /etc/
719
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
719
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
720
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
720
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
721
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
721
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
722
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
722
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
723
	cat <<EOF > /etc/freeradius-web/naslist.conf
723
	cat <<EOF > /etc/freeradius-web/naslist.conf
724
nas1_name: alcasar-$ORGANISME
724
nas1_name: alcasar-$ORGANISME
725
nas1_model: Network Access Controler
725
nas1_model: Network Access Controler
726
nas1_ip: $PRIVATE_IP
726
nas1_ip: $PRIVATE_IP
727
nas1_port_num: 0
727
nas1_port_num: 0
728
nas1_community: public
728
nas1_community: public
729
EOF
729
EOF
730
	chown -R apache:apache /etc/freeradius-web/
730
	chown -R apache:apache /etc/freeradius-web/
731
# create the log & backup structure :
731
# create the log & backup structure :
732
# - base = users database
732
# - base = users database
733
# - archive = tarball of "base + http firewall + netflow"
733
# - archive = tarball of "base + http firewall + netflow"
734
# - security = watchdog log
734
# - security = watchdog log
735
	for i in base archive security activity_report;
735
	for i in base archive security activity_report;
736
	do
736
	do
737
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
737
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
738
	done
738
	done
739
	chown -R root:apache $DIR_SAVE
739
	chown -R root:apache $DIR_SAVE
740
# Configuring & securing php
740
# Configuring & securing php
741
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
741
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
742
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
742
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
743
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
743
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
744
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
744
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
745
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
745
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
746
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
746
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
747
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
747
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
748
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
748
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
749
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
749
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
750
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
750
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
751
# Configuring & sécuring Apache
751
# Configuring & sécuring Apache
752
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
752
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
753
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
753
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
754
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
754
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
755
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
755
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
756
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
756
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
757
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
757
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
758
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
758
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
759
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
759
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
760
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
760
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
761
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
761
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
762
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
762
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
763
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
763
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
764
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
764
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
765
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
765
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
766
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
766
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
767
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
767
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
768
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
768
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
769
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
769
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
770
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
770
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
771
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
771
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
772
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
772
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
773
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
773
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
774
# Error page management
774
# Error page management
775
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
775
[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
776
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
776
cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
777
Alias /error/ "/var/www/html/"
777
Alias /error/ "/var/www/html/"
778
<Directory "/usr/share/httpd/error">
778
<Directory "/usr/share/httpd/error">
779
    AllowOverride None
779
    AllowOverride None
780
    Options IncludesNoExec
780
    Options IncludesNoExec
781
    AddOutputFilter Includes html
781
    AddOutputFilter Includes html
782
    AddHandler type-map var
782
    AddHandler type-map var
783
    Require all granted
783
    Require all granted
784
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
784
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
785
    ForceLanguagePriority Prefer Fallback
785
    ForceLanguagePriority Prefer Fallback
786
</Directory>
786
</Directory>
787
ErrorDocument 400 /error/error.php?error=400
787
ErrorDocument 400 /error/error.php?error=400
788
ErrorDocument 401 /error/error.php?error=401
788
ErrorDocument 401 /error/error.php?error=401
789
ErrorDocument 403 /error/error.php?error=403
789
ErrorDocument 403 /error/error.php?error=403
790
ErrorDocument 404 /error/index.php
790
ErrorDocument 404 /error/index.php
791
ErrorDocument 405 /error/error.php?error=405
791
ErrorDocument 405 /error/error.php?error=405
792
ErrorDocument 408 /error/error.php?error=408
792
ErrorDocument 408 /error/error.php?error=408
793
ErrorDocument 410 /error/error.php?error=410
793
ErrorDocument 410 /error/error.php?error=410
794
ErrorDocument 411 /error/error.php?error=411
794
ErrorDocument 411 /error/error.php?error=411
795
ErrorDocument 412 /error/error.php?error=412
795
ErrorDocument 412 /error/error.php?error=412
796
ErrorDocument 413 /error/error.php?error=413
796
ErrorDocument 413 /error/error.php?error=413
797
ErrorDocument 414 /error/error.php?error=414
797
ErrorDocument 414 /error/error.php?error=414
798
ErrorDocument 415 /error/error.php?error=415
798
ErrorDocument 415 /error/error.php?error=415
799
ErrorDocument 500 /error/error.php?error=500
799
ErrorDocument 500 /error/error.php?error=500
800
ErrorDocument 501 /error/error.php?error=501
800
ErrorDocument 501 /error/error.php?error=501
801
ErrorDocument 502 /error/error.php?error=502
801
ErrorDocument 502 /error/error.php?error=502
802
ErrorDocument 503 /error/error.php?error=503
802
ErrorDocument 503 /error/error.php?error=503
803
ErrorDocument 506 /error/error.php?error=506
803
ErrorDocument 506 /error/error.php?error=506
804
EOF
804
EOF
805
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
805
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
806
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
806
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
807
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
807
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
808
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
808
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
809
</body>
809
</body>
810
</html>
810
</html>
811
EOF
811
EOF
812
# Définition du premier compte lié au profil 'admin'
812
# Définition du premier compte lié au profil 'admin'
813
	if [ "$mode" = "install" ]
813
	if [ "$mode" = "install" ]
814
		then
814
		then
815
			header_install
815
			header_install
816
			admin_portal=!
816
			admin_portal=!
817
			PTN='^[a-zA-Z0-9-]*$'
817
			PTN='^[a-zA-Z0-9-]*$'
818
			until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
818
			until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
819
				do
819
				do
820
				header_install
820
				header_install
821
				if [ $Lang == "fr" ]
821
				if [ $Lang == "fr" ]
822
				then 
822
				then 
823
					echo ""
823
					echo ""
824
					echo "Définissez un premier compte d'administration d'ALCASAR :"
824
					echo "Définissez un premier compte d'administration d'ALCASAR :"
825
					echo
825
					echo
826
					echo -n "Nom : "
826
					echo -n "Nom : "
827
				else
827
				else
828
					echo ""
828
					echo ""
829
					echo "Define the first account allow to administrate ALCASAR :"
829
					echo "Define the first account allow to administrate ALCASAR :"
830
					echo
830
					echo
831
					echo -n "Account : "
831
					echo -n "Account : "
832
				fi
832
				fi
833
				read admin_portal
833
				read admin_portal
834
				if [ "$admin_portal" == "" ]
834
				if [ "$admin_portal" == "" ]
835
					then
835
					then
836
					admin_portal=!
836
					admin_portal=!
837
				fi
837
				fi
838
				done
838
				done
839
# Creation of keys file for the admin account ("admin")
839
# Creation of keys file for the admin account ("admin")
840
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
840
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
841
			mkdir -p $DIR_DEST_ETC/digest
841
			mkdir -p $DIR_DEST_ETC/digest
842
			chmod 755 $DIR_DEST_ETC/digest
842
			chmod 755 $DIR_DEST_ETC/digest
843
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
843
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
844
				do
844
				do
845
					/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin "ALCASAR Control Center (ACC)" $admin_portal
845
					/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin "ALCASAR Control Center (ACC)" $admin_portal
846
				done
846
				done
847
			$DIR_DEST_BIN/alcasar-profil.sh --list
847
			$DIR_DEST_BIN/alcasar-profil.sh --list
848
	fi
848
	fi
849
# ACC partitioning
849
# ACC partitioning
850
	rm -f /etc/httpd/conf/webapps.d/alcasar*
850
	rm -f /etc/httpd/conf/webapps.d/alcasar*
851
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
851
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
852
<Directory $DIR_WEB>
852
<Directory $DIR_WEB>
853
	AllowOverride None
853
	AllowOverride None
854
	Order deny,allow
854
	Order deny,allow
855
	Deny from all
855
	Deny from all
856
	Allow from 127.0.0.1
856
	Allow from 127.0.0.1
857
	Allow from $PRIVATE_NETWORK_MASK
857
	Allow from $PRIVATE_NETWORK_MASK
858
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
858
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
859
</Directory>
859
</Directory>
860
<Directory $DIR_WEB/certs>
860
<Directory $DIR_WEB/certs>
861
	AddType application/x-x509-ca-cert crt
861
	AddType application/x-x509-ca-cert crt
862
</Directory>
862
</Directory>
863
<Directory $DIR_ACC>
863
<Directory $DIR_ACC>
864
	SSLRequireSSL
864
	SSLRequireSSL
865
	AllowOverride None
865
	AllowOverride None
866
	Order deny,allow
866
	Order deny,allow
867
	Deny from all
867
	Deny from all
868
	Allow from 127.0.0.1
868
	Allow from 127.0.0.1
869
	Allow from $PRIVATE_NETWORK_MASK
869
	Allow from $PRIVATE_NETWORK_MASK
870
	require valid-user
870
	require valid-user
871
	AuthType digest
871
	AuthType digest
872
	AuthName "ALCASAR Control Center (ACC)" 
872
	AuthName "ALCASAR Control Center (ACC)" 
873
	AuthDigestDomain $HOSTNAME.$DOMAIN
873
	AuthDigestDomain $HOSTNAME.$DOMAIN
874
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
874
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
875
	AuthUserFile $DIR_DEST_ETC/digest/key_all
875
	AuthUserFile $DIR_DEST_ETC/digest/key_all
876
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
876
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
877
</Directory>
877
</Directory>
878
<Directory $DIR_ACC/admin>
878
<Directory $DIR_ACC/admin>
879
	SSLRequireSSL
879
	SSLRequireSSL
880
	AllowOverride None
880
	AllowOverride None
881
	Order deny,allow
881
	Order deny,allow
882
	Deny from all
882
	Deny from all
883
	Allow from 127.0.0.1
883
	Allow from 127.0.0.1
884
	Allow from $PRIVATE_NETWORK_MASK
884
	Allow from $PRIVATE_NETWORK_MASK
885
	require valid-user
885
	require valid-user
886
	AuthType digest
886
	AuthType digest
887
	AuthName "ALCASAR Control Center (ACC)" 
887
	AuthName "ALCASAR Control Center (ACC)" 
888
	AuthDigestDomain $HOSTNAME.$DOMAIN
888
	AuthDigestDomain $HOSTNAME.$DOMAIN
889
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
889
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
890
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
890
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
891
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
891
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
892
</Directory>
892
</Directory>
893
<Directory $DIR_ACC/manager>
893
<Directory $DIR_ACC/manager>
894
	SSLRequireSSL
894
	SSLRequireSSL
895
	AllowOverride None
895
	AllowOverride None
896
	Order deny,allow
896
	Order deny,allow
897
	Deny from all
897
	Deny from all
898
	Allow from 127.0.0.1
898
	Allow from 127.0.0.1
899
	Allow from $PRIVATE_NETWORK_MASK
899
	Allow from $PRIVATE_NETWORK_MASK
900
	require valid-user
900
	require valid-user
901
	AuthType digest
901
	AuthType digest
902
	AuthName "ALCASAR Control Center (ACC)" 
902
	AuthName "ALCASAR Control Center (ACC)" 
903
	AuthDigestDomain $HOSTNAME.$DOMAIN
903
	AuthDigestDomain $HOSTNAME.$DOMAIN
904
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
904
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
905
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
905
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
906
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
906
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
907
</Directory>
907
</Directory>
908
<Directory $DIR_ACC/backup>
908
<Directory $DIR_ACC/backup>
909
	SSLRequireSSL
909
	SSLRequireSSL
910
	AllowOverride None
910
	AllowOverride None
911
	Order deny,allow
911
	Order deny,allow
912
	Deny from all
912
	Deny from all
913
	Allow from 127.0.0.1
913
	Allow from 127.0.0.1
914
	Allow from $PRIVATE_NETWORK_MASK
914
	Allow from $PRIVATE_NETWORK_MASK
915
	require valid-user
915
	require valid-user
916
	AuthType digest
916
	AuthType digest
917
	AuthName "ALCASAR Control Center (ACC)" 
917
	AuthName "ALCASAR Control Center (ACC)" 
918
	AuthDigestDomain $HOSTNAME.$DOMAIN
918
	AuthDigestDomain $HOSTNAME.$DOMAIN
919
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
919
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
920
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
920
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
921
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
921
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
922
</Directory>
922
</Directory>
923
Alias /save/ "$DIR_SAVE/"
923
Alias /save/ "$DIR_SAVE/"
924
<Directory $DIR_SAVE>
924
<Directory $DIR_SAVE>
925
	SSLRequireSSL
925
	SSLRequireSSL
926
	Options Indexes
926
	Options Indexes
927
	Order deny,allow
927
	Order deny,allow
928
	Deny from all
928
	Deny from all
929
	Allow from 127.0.0.1
929
	Allow from 127.0.0.1
930
	Allow from $PRIVATE_NETWORK_MASK
930
	Allow from $PRIVATE_NETWORK_MASK
931
	require valid-user
931
	require valid-user
932
	AuthType digest
932
	AuthType digest
933
	AuthName "ALCASAR Control Center (ACC)" 
933
	AuthName "ALCASAR Control Center (ACC)" 
934
	AuthDigestDomain $HOSTNAME.$DOMAIN
934
	AuthDigestDomain $HOSTNAME.$DOMAIN
935
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
935
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
936
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
936
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
937
</Directory>
937
</Directory>
938
EOF
938
EOF
939
	# Launch after coova (in order to wait tun0 to be up)
939
	# Launch after coova (in order to wait tun0 to be up)
940
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
940
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
941
	# Log file for ACC access imputability
941
	# Log file for ACC access imputability
942
	[ -e /var/Save/security/acc_access.log ] || touch /var/Save/security/acc_access.log
942
	[ -e /var/Save/security/acc_access.log ] || touch /var/Save/security/acc_access.log
943
	chown root:apache /var/Save/security/acc_access.log
943
	chown root:apache /var/Save/security/acc_access.log
944
	chmod 664 /var/Save/security/acc_access.log
944
	chmod 664 /var/Save/security/acc_access.log
945
} # End of ACC ()
945
} # End of ACC ()
946
 
946
 
947
##########################################################################
947
##########################################################################
948
##				Fonction "CA"				##
948
##				Fonction "CA"				##
949
## - Creating the CA and the server certificate (apache)	 	##
949
## - Creating the CA and the server certificate (apache)	 	##
950
##########################################################################
950
##########################################################################
951
CA ()
951
CA ()
952
{
952
{
953
	$DIR_DEST_BIN/alcasar-CA.sh
953
	$DIR_DEST_BIN/alcasar-CA.sh
954
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
954
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
955
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
955
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
956
	cat <<EOF > $FIC_VIRTUAL_SSL
956
	cat <<EOF > $FIC_VIRTUAL_SSL
957
# default SSL virtual host, used for all HTTPS requests that do not
957
# default SSL virtual host, used for all HTTPS requests that do not
958
# match a ServerName or ServerAlias in any <VirtualHost> block.
958
# match a ServerName or ServerAlias in any <VirtualHost> block.
959
 
959
 
960
<VirtualHost _default_:443>
960
<VirtualHost _default_:443>
961
# general configuration
961
# general configuration
962
    ServerAdmin root@localhost
962
    ServerAdmin root@localhost
963
    ServerName $HOSTNAME.$DOMAIN
963
    ServerName $HOSTNAME.$DOMAIN
964
 
964
 
965
# SSL configuration
965
# SSL configuration
966
    SSLEngine on
966
    SSLEngine on
967
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
967
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
968
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
968
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
969
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
969
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
970
    CustomLog logs/ssl_request_log \
970
    CustomLog logs/ssl_request_log \
971
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
971
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
972
    ErrorLog logs/ssl_error_log
972
    ErrorLog logs/ssl_error_log
973
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
973
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
974
</VirtualHost>
974
</VirtualHost>
975
EOF
975
EOF
976
	chown -R root:apache /etc/pki
976
	chown -R root:apache /etc/pki
977
	chmod -R 750 /etc/pki
977
	chmod -R 750 /etc/pki
978
} # End of CA ()
978
} # End of CA ()
979
 
979
 
980
##################################################################
980
##################################################################
981
##			Function "time_server"			##
981
##			Function "time_server"			##
982
## - Configuring NTP server					##
982
## - Configuring NTP server					##
983
##################################################################
983
##################################################################
984
time_server ()
984
time_server ()
985
{
985
{
986
# Set the Internet time server
986
# Set the Internet time server
987
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
987
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
988
	cat <<EOF > /etc/ntp/step-tickers
988
	cat <<EOF > /etc/ntp/step-tickers
989
0.fr.pool.ntp.org	# adapt to your country
989
0.fr.pool.ntp.org	# adapt to your country
990
1.fr.pool.ntp.org
990
1.fr.pool.ntp.org
991
2.fr.pool.ntp.org
991
2.fr.pool.ntp.org
992
EOF
992
EOF
993
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
993
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
994
	cat <<EOF > /etc/ntp.conf
994
	cat <<EOF > /etc/ntp.conf
995
server 0.fr.pool.ntp.org	# adapt to your country
995
server 0.fr.pool.ntp.org	# adapt to your country
996
server 1.fr.pool.ntp.org
996
server 1.fr.pool.ntp.org
997
server 2.fr.pool.ntp.org
997
server 2.fr.pool.ntp.org
998
server 127.127.1.0   		# local clock si NTP internet indisponible ...
998
server 127.127.1.0   		# local clock si NTP internet indisponible ...
999
fudge 127.127.1.0 stratum 10
999
fudge 127.127.1.0 stratum 10
1000
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
1000
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
1001
restrict 127.0.0.1
1001
restrict 127.0.0.1
1002
driftfile /var/lib/ntp/drift
1002
driftfile /var/lib/ntp/drift
1003
logfile /var/log/ntp.log
1003
logfile /var/log/ntp.log
1004
disable monitor
1004
disable monitor
1005
EOF
1005
EOF
1006
	chown -R ntp:ntp /var/lib/ntp
1006
	chown -R ntp:ntp /var/lib/ntp
1007
# Synchronize now
1007
# Synchronize now
1008
	ntpd -q -g &
1008
	ntpd -q -g &
1009
} # End of time_server ()
1009
} # End of time_server ()
1010
 
1010
 
1011
##########################################################################################
1011
##########################################################################################
1012
##			Fonction "init_db"						##
1012
##			Fonction "init_db"						##
1013
## - Initialisation de la base Mysql							##
1013
## - Initialisation de la base Mysql							##
1014
## - Affectation du mot de passe de l'administrateur (root)				##
1014
## - Affectation du mot de passe de l'administrateur (root)				##
1015
## - Suppression des bases et des utilisateurs superflus				##
1015
## - Suppression des bases et des utilisateurs superflus				##
1016
## - Création de la base 'radius'							##
1016
## - Création de la base 'radius'							##
1017
## - Installation du schéma de cette base						##
1017
## - Installation du schéma de cette base						##
1018
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
1018
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
1019
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
1019
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
1020
##########################################################################################
1020
##########################################################################################
1021
init_db ()
1021
init_db ()
1022
{
1022
{
1023
	if [ `systemctl is-active mysqld` == "active" ]
1023
	if [ `systemctl is-active mysqld` == "active" ]
1024
	then
1024
	then
1025
		systemctl stop mysqld
1025
		systemctl stop mysqld
1026
	fi
1026
	fi
1027
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1027
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1028
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1028
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1029
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
1029
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
1030
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
1030
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
1031
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf
1031
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf
1032
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf  # accentuated user names are allowed
1032
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf  # accentuated user names are allowed
1033
	$SED "s?^plugin-load.*?#&?g" /etc/my.cnf.d/feedback.cnf # remove the feedback plugin (ALCASAR doesn't report anything !)
1033
	$SED "s?^plugin-load.*?#&?g" /etc/my.cnf.d/feedback.cnf # remove the feedback plugin (ALCASAR doesn't report anything !)
1034
	/usr/sbin/mysqld-prepare-db-dir > /dev/null 2>&1
1034
	/usr/sbin/mysqld-prepare-db-dir > /dev/null 2>&1
1035
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
1035
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
1036
	/usr/bin/systemctl start mysqld
1036
	/usr/bin/systemctl start mysqld
1037
	nb_round=1
1037
	nb_round=1
1038
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1038
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1039
	do
1039
	do
1040
		nb_round=`expr $nb_round + 1`
1040
		nb_round=`expr $nb_round + 1`
1041
		sleep 2
1041
		sleep 2
1042
	done
1042
	done
1043
	if [ ! -S /var/lib/mysql/mysql.sock ]
1043
	if [ ! -S /var/lib/mysql/mysql.sock ]
1044
	then
1044
	then
1045
		echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1045
		echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1046
		exit
1046
		exit
1047
	fi
1047
	fi
1048
	MYSQL="/usr/bin/mysql --execute"
1048
	MYSQL="/usr/bin/mysql --execute"
1049
# Secure the server
1049
# Secure the server
1050
	$MYSQL="GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$mysqlpwd';"
1050
	$MYSQL="GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$mysqlpwd';"
1051
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1051
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1052
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1052
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1053
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
1053
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
1054
# Create 'radius' database
1054
# Create 'radius' database
1055
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
1055
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
1056
# Add an empty radius database structure
1056
# Add an empty radius database structure
1057
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
1057
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
1058
# modify the start script in order to close accounting connexion when the system is comming down or up
1058
# modify the start script in order to close accounting connexion when the system is comming down or up
1059
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
1059
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
1060
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
1060
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
1061
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
1061
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
1062
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
1062
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
1063
	/usr/bin/systemctl daemon-reload
1063
	/usr/bin/systemctl daemon-reload
1064
} # End of init_db ()
1064
} # End of init_db ()
1065
 
1065
 
1066
###################################################################
1066
###################################################################
1067
##                       Function "freeradius"                   ##
1067
##                       Function "freeradius"                   ##
1068
## - Set the configuration files                                 ##
1068
## - Set the configuration files                                 ##
1069
## - Set the shared secret between coova-chilli and freeradius   ##
1069
## - Set the shared secret between coova-chilli and freeradius   ##
1070
## - Adapt the Mysql conf file and counters                      ##
1070
## - Adapt the Mysql conf file and counters                      ##
1071
###################################################################
1071
###################################################################
1072
freeradius ()
1072
freeradius ()
1073
{
1073
{
1074
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1074
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1075
	chown -R radius:radius /etc/raddb
1075
	chown -R radius:radius /etc/raddb
1076
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
1076
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
1077
# Set radius global parameters (radius.conf)
1077
# Set radius global parameters (radius.conf)
1078
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1078
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1079
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1079
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1080
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
1080
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
1081
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1081
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1082
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
1082
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
1083
 
1083
 
1084
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1084
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1085
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1085
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1086
	cat << EOF > /etc/raddb/clients.conf
1086
	cat << EOF > /etc/raddb/clients.conf
1087
client localhost {
1087
client localhost {
1088
	ipaddr = 127.0.0.1
1088
	ipaddr = 127.0.0.1
1089
	secret = $secretradius
1089
	secret = $secretradius
1090
	shortname = chilli
1090
	shortname = chilli
1091
	nas_type = other	
1091
	nas_type = other	
1092
}
1092
}
1093
EOF
1093
EOF
1094
# Set Virtual server (remvove all except "alcasar virtual site")
1094
# Set Virtual server (remvove all except "alcasar virtual site")
1095
	rm -f /etc/raddb/sites-enabled/*
1095
	rm -f /etc/raddb/sites-enabled/*
1096
    cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
1096
    cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
1097
	chown radius:apache /etc/raddb/sites-available/alcasar
1097
	chown radius:apache /etc/raddb/sites-available/alcasar
1098
	chmod 660 /etc/raddb/sites-available/alcasar
1098
	chmod 660 /etc/raddb/sites-available/alcasar
1099
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
1099
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
1100
# INFO : To connect from outside (EAP), add the EAP virtual server (link in sites-enabled) and inner-tunnel modules (link in mods-enabled) 
1100
# INFO : To connect from outside (EAP), add the EAP virtual server (link in sites-enabled) and inner-tunnel modules (link in mods-enabled) 
1101
 
1101
 
1102
# Set modules 
1102
# Set modules 
1103
# Set only usefull modules for ALCASAR (ldap is enabled only via ACC)
1103
# Set only usefull modules for ALCASAR (ldap is enabled only via ACC)
1104
    rm -rf  /etc/raddb/mods-enabled/*
1104
    rm -rf  /etc/raddb/mods-enabled/*
1105
    for mods in sql sqlcounter attr_filter expiration logintime pap expr ldap
1105
    for mods in sql sqlcounter attr_filter expiration logintime pap expr
1106
        do
1106
        do
1107
        ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1107
        ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1108
        done
1108
        done
1109
# Configure SQL mod
1109
# Configure SQL mod
1110
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
1110
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
1111
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1111
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1112
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
1112
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
1113
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
1113
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
1114
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1114
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1115
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1115
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1116
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1116
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1117
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
1117
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
1118
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc. 
1118
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc. 
1119
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1119
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1120
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1120
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1121
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
1121
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
1122
# sqlcounter modifications
1122
# sqlcounter modifications
1123
	[ -e /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default
1123
	[ -e /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf.default
1124
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf
1124
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/dailycounter.conf
1125
query = "\
1125
query = "\
1126
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)),0)) \
1126
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)),0)) \
1127
    FROM radacct \
1127
    FROM radacct \
1128
    WHERE username = '%{\${key}}' \
1128
    WHERE username = '%{\${key}}' \
1129
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1129
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1130
EOF
1130
EOF
1131
	[ -e /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default
1131
	[ -e /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf.default
1132
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf
1132
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/monthlycounter.conf
1133
query = "\
1133
query = "\
1134
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)), 0)) \
1134
    SELECT IFNULL((SELECT SUM(acctsessiontime - GREATEST((%%b - UNIX_TIMESTAMP(acctstarttime)), 0)) \
1135
    FROM radacct \
1135
    FROM radacct \
1136
    WHERE username='%{\${key}}' \
1136
    WHERE username='%{\${key}}' \
1137
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1137
    AND UNIX_TIMESTAMP(acctstarttime) + acctsessiontime > '%%b'),0)"
1138
EOF
1138
EOF
1139
	[ -e /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default
1139
	[ -e /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default ] || cp /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf.default
1140
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf
1140
	cat << EOF > /etc/raddb/mods-config/sql/counter/mysql/noresetcounter.conf
1141
# This is the query modified for ALCASAR needs (thanks to Daniel Laliberte --> authorized period after the first connection)
1141
# This is the query modified for ALCASAR needs (thanks to Daniel Laliberte --> authorized period after the first connection)
1142
query = "\
1142
query = "\
1143
    SELECT IFNULL((SELECT TIME_TO_SEC(TIMEDIFF(NOW(), acctstarttime)) \
1143
    SELECT IFNULL((SELECT TIME_TO_SEC(TIMEDIFF(NOW(), acctstarttime)) \
1144
    FROM radacct \
1144
    FROM radacct \
1145
    WHERE UserName='%{\${key}}' \
1145
    WHERE UserName='%{\${key}}' \
1146
    ORDER BY acctstarttime \
1146
    ORDER BY acctstarttime \
1147
    LIMIT 1),0)"
1147
    LIMIT 1),0)"
1148
EOF
1148
EOF
1149
# make certain that mysql is up before freeradius start
1149
# make certain that mysql is up before freeradius start
1150
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
1150
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
1151
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
1151
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
1152
	/usr/bin/systemctl daemon-reload
1152
	/usr/bin/systemctl daemon-reload
1153
 # Allow apache to change some conf files (ie : ldap on/off)
1153
 # Allow apache to change some conf files (ie : ldap on/off)
1154
 chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
1154
 chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
1155
	
1155
	
1156
} # End freeradius ()
1156
} # End freeradius ()
1157
 
1157
 
1158
#############################################################################
1158
#############################################################################
1159
##                              Fonction "chilli"                          ##
1159
##                              Fonction "chilli"                          ##
1160
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1160
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1161
## - Adapt the authentication web page (intercept.php)                     ##
1161
## - Adapt the authentication web page (intercept.php)                     ##
1162
#############################################################################
1162
#############################################################################
1163
chilli ()
1163
chilli ()
1164
{
1164
{
1165
# chilli unit for systemd
1165
# chilli unit for systemd
1166
	cat << EOF > /lib/systemd/system/chilli.service
1166
	cat << EOF > /lib/systemd/system/chilli.service
1167
#  This file is part of systemd.
1167
#  This file is part of systemd.
1168
#
1168
#
1169
#  systemd is free software; you can redistribute it and/or modify it
1169
#  systemd is free software; you can redistribute it and/or modify it
1170
#  under the terms of the GNU General Public License as published by
1170
#  under the terms of the GNU General Public License as published by
1171
#  the Free Software Foundation; either version 2 of the License, or
1171
#  the Free Software Foundation; either version 2 of the License, or
1172
#  (at your option) any later version.
1172
#  (at your option) any later version.
1173
[Unit]
1173
[Unit]
1174
Description=chilli is a captive portal daemon
1174
Description=chilli is a captive portal daemon
1175
After=network.target
1175
After=network.target
1176
 
1176
 
1177
[Service]
1177
[Service]
1178
Type=forking
1178
Type=forking
1179
ExecStart=/usr/libexec/chilli start
1179
ExecStart=/usr/libexec/chilli start
1180
ExecStop=/usr/libexec/chilli stop
1180
ExecStop=/usr/libexec/chilli stop
1181
ExecReload=/usr/libexec/chilli reload
1181
ExecReload=/usr/libexec/chilli reload
1182
PIDFile=/var/run/chilli.pid
1182
PIDFile=/var/run/chilli.pid
1183
 
1183
 
1184
[Install]
1184
[Install]
1185
WantedBy=multi-user.target
1185
WantedBy=multi-user.target
1186
EOF
1186
EOF
1187
# init file creation
1187
# init file creation
1188
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1188
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1189
	cat <<EOF > /etc/init.d/chilli
1189
	cat <<EOF > /etc/init.d/chilli
1190
#!/bin/sh
1190
#!/bin/sh
1191
#
1191
#
1192
# chilli CoovaChilli init
1192
# chilli CoovaChilli init
1193
#
1193
#
1194
# chkconfig: 2345 65 35
1194
# chkconfig: 2345 65 35
1195
# description: CoovaChilli
1195
# description: CoovaChilli
1196
### BEGIN INIT INFO
1196
### BEGIN INIT INFO
1197
# Provides:       chilli
1197
# Provides:       chilli
1198
# Required-Start: network 
1198
# Required-Start: network 
1199
# Should-Start: 
1199
# Should-Start: 
1200
# Required-Stop:  network
1200
# Required-Stop:  network
1201
# Should-Stop: 
1201
# Should-Stop: 
1202
# Default-Start:  2 3 5
1202
# Default-Start:  2 3 5
1203
# Default-Stop:
1203
# Default-Stop:
1204
# Description:    CoovaChilli access controller
1204
# Description:    CoovaChilli access controller
1205
### END INIT INFO
1205
### END INIT INFO
1206
 
1206
 
1207
[ -f /usr/sbin/chilli ] || exit 0
1207
[ -f /usr/sbin/chilli ] || exit 0
1208
. /etc/init.d/functions
1208
. /etc/init.d/functions
1209
CONFIG=/etc/chilli.conf
1209
CONFIG=/etc/chilli.conf
1210
pidfile=/var/run/chilli.pid
1210
pidfile=/var/run/chilli.pid
1211
[ -f \$CONFIG ] || {
1211
[ -f \$CONFIG ] || {
1212
	echo "\$CONFIG Not found"
1212
	echo "\$CONFIG Not found"
1213
	exit 0
1213
	exit 0
1214
}
1214
}
1215
current_users_file="/var/tmp/havp/current_users.txt"	# file containing active users
1215
current_users_file="/var/tmp/havp/current_users.txt"	# file containing active users
1216
RETVAL=0
1216
RETVAL=0
1217
prog="chilli"
1217
prog="chilli"
1218
case \$1 in
1218
case \$1 in
1219
	start)
1219
	start)
1220
		if [ -f \$pidfile ] ; then 
1220
		if [ -f \$pidfile ] ; then 
1221
			gprintf "chilli is already running"
1221
			gprintf "chilli is already running"
1222
		else
1222
		else
1223
			gprintf "Starting \$prog: "
1223
			gprintf "Starting \$prog: "
1224
			echo '' > \$current_users_file && chown apache:apache \$current_users_file
1224
			echo '' > \$current_users_file && chown apache:apache \$current_users_file
1225
			rm -f /var/run/chilli* # cleaning
1225
			rm -f /var/run/chilli* # cleaning
1226
			/usr/sbin/modprobe tun >/dev/null 2>&1
1226
			/usr/sbin/modprobe tun >/dev/null 2>&1
1227
			echo 1 > /proc/sys/net/ipv4/ip_forward
1227
			echo 1 > /proc/sys/net/ipv4/ip_forward
1228
			[ -e /dev/net/tun ] || {
1228
			[ -e /dev/net/tun ] || {
1229
				(cd /dev; 
1229
				(cd /dev; 
1230
				mkdir net; 
1230
				mkdir net; 
1231
				cd net; 
1231
				cd net; 
1232
				mknod tun c 10 200)
1232
				mknod tun c 10 200)
1233
			}
1233
			}
1234
			ifconfig $INTIF 0.0.0.0
1234
			ifconfig $INTIF 0.0.0.0
1235
			/usr/sbin/ethtool -K $INTIF gro off
1235
			/usr/sbin/ethtool -K $INTIF gro off
1236
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1236
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1237
			RETVAL=\$?
1237
			RETVAL=\$?
1238
		fi
1238
		fi
1239
		;;
1239
		;;
1240
 
1240
 
1241
	reload)
1241
	reload)
1242
		killall -HUP chilli
1242
		killall -HUP chilli
1243
		;;
1243
		;;
1244
 
1244
 
1245
	restart)
1245
	restart)
1246
		\$0 stop
1246
		\$0 stop
1247
		sleep 2
1247
		sleep 2
1248
		\$0 start
1248
		\$0 start
1249
		;;
1249
		;;
1250
 
1250
 
1251
	status)
1251
	status)
1252
		status chilli
1252
		status chilli
1253
		RETVAL=0
1253
		RETVAL=0
1254
		;;
1254
		;;
1255
 
1255
 
1256
	stop)
1256
	stop)
1257
		if [ -f \$pidfile ] ; then  
1257
		if [ -f \$pidfile ] ; then  
1258
			gprintf "Shutting down \$prog: "
1258
			gprintf "Shutting down \$prog: "
1259
			killproc /usr/sbin/chilli
1259
			killproc /usr/sbin/chilli
1260
			RETVAL=\$?
1260
			RETVAL=\$?
1261
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1261
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1262
			[ -e \$current_users_file ] && rm -f \$current_users_file
1262
			[ -e \$current_users_file ] && rm -f \$current_users_file
1263
		else	
1263
		else	
1264
			gprintf "chilli is not running"
1264
			gprintf "chilli is not running"
1265
		fi
1265
		fi
1266
		;;
1266
		;;
1267
 
1267
 
1268
	*)
1268
	*)
1269
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1269
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1270
		exit 1
1270
		exit 1
1271
esac
1271
esac
1272
echo
1272
echo
1273
EOF
1273
EOF
1274
	chmod a+x /etc/init.d/chilli
1274
	chmod a+x /etc/init.d/chilli
1275
	ln -s /etc/init.d/chilli /usr/libexec/chilli
1275
	ln -s /etc/init.d/chilli /usr/libexec/chilli
1276
# conf file creation
1276
# conf file creation
1277
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1277
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1278
	#NTP Option configuration for DHCP
1278
	#NTP Option configuration for DHCP
1279
	#DHCP Options : rfc2132
1279
	#DHCP Options : rfc2132
1280
		#dhcp option value will be convert in hexa.
1280
		#dhcp option value will be convert in hexa.
1281
		#NTP option (or 'option 42') is like :
1281
		#NTP option (or 'option 42') is like :
1282
		#			
1282
		#			
1283
		#    Code   Len         Address 1               Address 2
1283
		#    Code   Len         Address 1               Address 2
1284
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1284
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1285
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1285
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1286
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1286
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1287
		#
1287
		#
1288
		#Code : 42 => 2a
1288
		#Code : 42 => 2a
1289
		#Len : 4 => 04
1289
		#Len : 4 => 04
1290
	PRIVATE_IP_HEXA=$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f1))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f2))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f3))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f4))
1290
	PRIVATE_IP_HEXA=$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f1))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f2))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f3))$(printf "%02x\n" $(echo $PRIVATE_IP | cut -d'.' -f4))
1291
	cat <<EOF > /etc/chilli.conf
1291
	cat <<EOF > /etc/chilli.conf
1292
# coova config for ALCASAR
1292
# coova config for ALCASAR
1293
cmdsocket	/var/run/chilli.sock
1293
cmdsocket	/var/run/chilli.sock
1294
unixipc		chilli.$INTIF.ipc
1294
unixipc		chilli.$INTIF.ipc
1295
pidfile		/var/run/chilli.pid
1295
pidfile		/var/run/chilli.pid
1296
net		$PRIVATE_NETWORK_MASK
1296
net		$PRIVATE_NETWORK_MASK
1297
dhcpif		$INTIF
1297
dhcpif		$INTIF
1298
ethers		$DIR_DEST_ETC/alcasar-ethers
1298
ethers		$DIR_DEST_ETC/alcasar-ethers
1299
#nodynip
1299
#nodynip
1300
#statip
1300
#statip
1301
dynip		$PRIVATE_NETWORK_MASK
1301
dynip		$PRIVATE_NETWORK_MASK
1302
domain		$DOMAIN
1302
domain		$DOMAIN
1303
dns1		$PRIVATE_IP
1303
dns1		$PRIVATE_IP
1304
dns2		$PRIVATE_IP
1304
dns2		$PRIVATE_IP
1305
uamlisten	$PRIVATE_IP
1305
uamlisten	$PRIVATE_IP
1306
uamport		3990
1306
uamport		3990
1307
uamuiport	3991
1307
uamuiport	3991
1308
macauth
1308
macauth
1309
macpasswd	password
1309
macpasswd	password
1310
strictmacauth
1310
strictmacauth
1311
locationname	$HOSTNAME.$DOMAIN
1311
locationname	$HOSTNAME.$DOMAIN
1312
radiusserver1	127.0.0.1
1312
radiusserver1	127.0.0.1
1313
radiusserver2	127.0.0.1
1313
radiusserver2	127.0.0.1
1314
radiussecret	$secretradius
1314
radiussecret	$secretradius
1315
radiusauthport	1812
1315
radiusauthport	1812
1316
radiusacctport	1813
1316
radiusacctport	1813
1317
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1317
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1318
redirurl
1318
redirurl
1319
radiusnasid	$HOSTNAME.$DOMAIN
1319
radiusnasid	$HOSTNAME.$DOMAIN
1320
uamsecret	$secretuam
1320
uamsecret	$secretuam
1321
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1321
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1322
coaport		3799
1322
coaport		3799
1323
conup		$DIR_DEST_BIN/alcasar-conup.sh
1323
conup		$DIR_DEST_BIN/alcasar-conup.sh
1324
condown		$DIR_DEST_BIN/alcasar-condown.sh
1324
condown		$DIR_DEST_BIN/alcasar-condown.sh
1325
include		$DIR_DEST_ETC/alcasar-uamallowed
1325
include		$DIR_DEST_ETC/alcasar-uamallowed
1326
include		$DIR_DEST_ETC/alcasar-uamdomain
1326
include		$DIR_DEST_ETC/alcasar-uamdomain
1327
dhcpopt		2a04$PRIVATE_IP_HEXA
1327
dhcpopt		2a04$PRIVATE_IP_HEXA
1328
#dhcpgateway		none
1328
#dhcpgateway		none
1329
#dhcprelayagent		none
1329
#dhcprelayagent		none
1330
#dhcpgatewayport	none
1330
#dhcpgatewayport	none
1331
sslkeyfile	/etc/pki/tls/private/alcasar.key
1331
sslkeyfile	/etc/pki/tls/private/alcasar.key
1332
sslcertfile	/etc/pki/tls/certs/alcasar.crt
1332
sslcertfile	/etc/pki/tls/certs/alcasar.crt
1333
redirssl
1333
redirssl
1334
uamuissl
1334
uamuissl
1335
EOF
1335
EOF
1336
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
1336
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
1337
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1337
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1338
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
1338
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
1339
# create files for trusted domains and urls
1339
# create files for trusted domains and urls
1340
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1340
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1341
	chown root:apache $DIR_DEST_ETC/alcasar-*
1341
	chown root:apache $DIR_DEST_ETC/alcasar-*
1342
	chmod 660 $DIR_DEST_ETC/alcasar-*
1342
	chmod 660 $DIR_DEST_ETC/alcasar-*
1343
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1343
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1344
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1344
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1345
# user 'chilli' creation (in order to run conup/off and up/down scripts
1345
# user 'chilli' creation (in order to run conup/off and up/down scripts
1346
	chilli_exist=`grep -c ^chilli: /etc/passwd`
1346
	chilli_exist=`grep -c ^chilli: /etc/passwd`
1347
	if [ "$chilli_exist" == "1" ]
1347
	if [ "$chilli_exist" == "1" ]
1348
	then
1348
	then
1349
	      userdel -r chilli 2>/dev/null
1349
	      userdel -r chilli 2>/dev/null
1350
	fi
1350
	fi
1351
	groupadd -f chilli
1351
	groupadd -f chilli
1352
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1352
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1353
}  # End of chilli ()
1353
}  # End of chilli ()
1354
 
1354
 
1355
##################################################################
1355
##################################################################
1356
##		Fonction "dansguardian"				##
1356
##		Fonction "dansguardian"				##
1357
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1357
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1358
##################################################################
1358
##################################################################
1359
dansguardian ()
1359
dansguardian ()
1360
{
1360
{
1361
	mkdir -p /var/dansguardian /var/log/dansguardian
1361
	mkdir -p /var/dansguardian /var/log/dansguardian
1362
	chown -R dansguardian /var/dansguardian /var/log/dansguardian
1362
	chown -R dansguardian /var/dansguardian /var/log/dansguardian
1363
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1363
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1364
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1364
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1365
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1365
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1366
# By default the filter is off 
1366
# By default the filter is off 
1367
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1367
	$SED "s/^reportinglevel =.*/reportinglevel = 3/g" $DIR_DG/dansguardian.conf
1368
# French deny HTML page
1368
# French deny HTML page
1369
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1369
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1370
# Listen only on LAN side
1370
# Listen only on LAN side
1371
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1371
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1372
# DG send its flow to HAVP
1372
# DG send its flow to HAVP
1373
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1373
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1374
# replace the default deny HTML page
1374
# replace the default deny HTML page
1375
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1375
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1376
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1376
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1377
# Don't log
1377
# Don't log
1378
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1378
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1379
# on désactive par défaut le controle de contenu des pages html
1379
# on désactive par défaut le controle de contenu des pages html
1380
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1380
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1381
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1381
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1382
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1382
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1383
# on désactive par défaut le contrôle d'URL par expressions régulières
1383
# on désactive par défaut le contrôle d'URL par expressions régulières
1384
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1384
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1385
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1385
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1386
 
1386
 
1387
# Configure Dansguardian for large site
1387
# Configure Dansguardian for large site
1388
# Minimum number of processus to handle connections
1388
# Minimum number of processus to handle connections
1389
	$SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1389
	$SED "s?^minchildren =.*?minchildren = 15?g" $DIR_DG/dansguardian.conf
1390
# Maximum number of processus to handle connections
1390
# Maximum number of processus to handle connections
1391
	$SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1391
	$SED "s?^maxchildren =.*?maxchildren = 200?g" $DIR_DG/dansguardian.conf
1392
# Run at least 8 daemons
1392
# Run at least 8 daemons
1393
	$SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1393
	$SED "s?^minsparechildren =.*?minsparechildren = 8?g" $DIR_DG/dansguardian.conf
1394
# minimum number of processes to spawn
1394
# minimum number of processes to spawn
1395
	$SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1395
	$SED "s?^preforkchildren =.*?preforkchildren = 10?g" $DIR_DG/dansguardian.conf
1396
# maximum age of a child process before it croaks it
1396
# maximum age of a child process before it croaks it
1397
	$SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
1397
	$SED "s?^maxagechildren =.*?maxagechildren = 1000?g" $DIR_DG/dansguardian.conf
1398
	
1398
	
1399
# on désactive par défaut le contrôle de téléchargement de fichiers
1399
# on désactive par défaut le contrôle de téléchargement de fichiers
1400
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1400
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1401
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1401
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1402
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1402
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1403
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1403
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1404
	touch $DIR_DG/lists/bannedextensionlist
1404
	touch $DIR_DG/lists/bannedextensionlist
1405
	touch $DIR_DG/lists/bannedmimetypelist
1405
	touch $DIR_DG/lists/bannedmimetypelist
1406
# 'Safesearch' regex actualisation
1406
# 'Safesearch' regex actualisation
1407
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1407
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1408
# empty LAN IP list that won't be WEB filtered
1408
# empty LAN IP list that won't be WEB filtered
1409
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1409
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1410
	touch $DIR_DG/lists/exceptioniplist
1410
	touch $DIR_DG/lists/exceptioniplist
1411
# Keep a copy of URL & domain filter configuration files
1411
# Keep a copy of URL & domain filter configuration files
1412
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1412
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1413
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1413
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1414
} # End of dansguardian ()
1414
} # End of dansguardian ()
1415
 
1415
 
1416
##################################################################
1416
##################################################################
1417
##			Fonction "antivirus"			##
1417
##			Fonction "antivirus"			##
1418
## - configuration of havp, libclamav and freshclam		##
1418
## - configuration of havp, libclamav and freshclam		##
1419
##################################################################
1419
##################################################################
1420
antivirus ()		
1420
antivirus ()		
1421
{
1421
{
1422
# create 'havp' user
1422
# create 'havp' user
1423
	havp_exist=`grep -c ^havp: /etc/passwd`
1423
	havp_exist=`grep -c ^havp: /etc/passwd`
1424
	if [ "$havp_exist" == "1" ]
1424
	if [ "$havp_exist" == "1" ]
1425
	then
1425
	then
1426
	      userdel -r havp 2>/dev/null
1426
	      userdel -r havp 2>/dev/null
1427
	      groupdel havp 2>/dev/null
1427
	      groupdel havp 2>/dev/null
1428
	fi
1428
	fi
1429
	groupadd -f havp
1429
	groupadd -f havp
1430
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1430
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1431
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp /var/log/clamav /var/lib/clamav
1431
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp /var/log/clamav /var/lib/clamav
1432
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1432
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1433
	chown -R clamav:clamav /var/log/clamav /var/lib/clamav
1433
	chown -R clamav:clamav /var/log/clamav /var/lib/clamav
1434
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1434
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1435
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1435
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1436
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1436
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1437
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1437
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1438
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1438
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1439
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1439
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1440
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1440
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1441
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1441
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1442
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1442
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1443
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1443
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1444
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1444
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1445
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1445
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1446
# skip checking of youtube flow (too heavy load / risk too low)
1446
# skip checking of youtube flow (too heavy load / risk too low)
1447
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1447
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1448
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1448
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1449
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1449
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1450
# adapt init script and systemd unit
1450
# adapt init script and systemd unit
1451
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1451
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1452
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1452
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1453
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1453
	[ -e /lib/systemd/system/havp.service.default ] || cp /lib/systemd/system/havp.service /lib/systemd/system/havp.service.default
1454
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1454
	$SED "/^PIDFile/i ExecStartPre=/bin/mkdir -p /var/run/havp" /lib/systemd/system/havp.service
1455
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1455
	$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service
1456
# replace of the intercept page (template)
1456
# replace of the intercept page (template)
1457
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1457
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1458
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1458
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1459
# update virus database every 4 hours (24h/6)
1459
# update virus database every 4 hours (24h/6)
1460
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1460
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1461
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1461
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1462
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1462
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1463
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1463
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1464
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1464
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1465
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1465
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1466
# update now
1466
# update now
1467
	/usr/bin/freshclam --no-warnings
1467
	/usr/bin/freshclam --no-warnings
1468
} # End of antivirus ()
1468
} # End of antivirus ()
1469
 
1469
 
1470
##########################################################################
1470
##########################################################################
1471
##			Fonction "tinyproxy"				##
1471
##			Fonction "tinyproxy"				##
1472
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1472
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1473
##########################################################################
1473
##########################################################################
1474
tinyproxy ()		
1474
tinyproxy ()		
1475
{
1475
{
1476
	tinyproxy_exist=`grep -c ^tinyproxy: /etc/passwd`
1476
	tinyproxy_exist=`grep -c ^tinyproxy: /etc/passwd`
1477
	if [ "$tinyproxy_exist" == "1" ]
1477
	if [ "$tinyproxy_exist" == "1" ]
1478
	then
1478
	then
1479
	      userdel -r tinyproxy 2>/dev/null
1479
	      userdel -r tinyproxy 2>/dev/null
1480
	      groupdel tinyproxy 2>/dev/null
1480
	      groupdel tinyproxy 2>/dev/null
1481
	fi
1481
	fi
1482
	groupadd -f tinyproxy
1482
	groupadd -f tinyproxy
1483
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1483
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1484
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1484
	mkdir -p /var/run/tinyproxy /var/log/tinyproxy
1485
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1485
	chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1486
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1486
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1487
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1487
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1488
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1488
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1489
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1489
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1490
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1490
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1491
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1491
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1492
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1492
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1493
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1493
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1494
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1494
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1495
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1495
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1496
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1496
	$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf	# Allow from LAN
1497
# Create the systemd unit
1497
# Create the systemd unit
1498
cat << EOF > /lib/systemd/system/tinyproxy.service
1498
cat << EOF > /lib/systemd/system/tinyproxy.service
1499
#  This file is part of systemd.
1499
#  This file is part of systemd.
1500
#
1500
#
1501
#  systemd is free software; you can redistribute it and/or modify it
1501
#  systemd is free software; you can redistribute it and/or modify it
1502
#  under the terms of the GNU General Public License as published by
1502
#  under the terms of the GNU General Public License as published by
1503
#  the Free Software Foundation; either version 2 of the License, or
1503
#  the Free Software Foundation; either version 2 of the License, or
1504
#  (at your option) any later version.
1504
#  (at your option) any later version.
1505
 
1505
 
1506
# This unit launches tinyproxy (a very light proxy).
1506
# This unit launches tinyproxy (a very light proxy).
1507
# The "sleep 2" is needed because the pid file isn't ready for systemd
1507
# The "sleep 2" is needed because the pid file isn't ready for systemd
1508
[Unit]
1508
[Unit]
1509
Description=Tinyproxy Web Proxy Server
1509
Description=Tinyproxy Web Proxy Server
1510
After=network.target iptables.service
1510
After=network.target iptables.service
1511
 
1511
 
1512
[Service]
1512
[Service]
1513
Type=forking
1513
Type=forking
1514
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1514
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1515
ExecStartPre=/bin/sleep 2
1515
ExecStartPre=/bin/sleep 2
1516
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1516
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1517
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1517
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1518
 
1518
 
1519
[Install]
1519
[Install]
1520
WantedBy=multi-user.target
1520
WantedBy=multi-user.target
1521
EOF
1521
EOF
1522
 
1522
 
1523
} # end of tinyproxy
1523
} # end of tinyproxy
1524
##################################################################################
1524
##################################################################################
1525
##			function "ulogd"					##
1525
##			function "ulogd"					##
1526
## - Ulog config for multi-log files 						##
1526
## - Ulog config for multi-log files 						##
1527
##################################################################################
1527
##################################################################################
1528
ulogd ()
1528
ulogd ()
1529
{
1529
{
1530
# Three instances of ulogd (three different logfiles)
1530
# Three instances of ulogd (three different logfiles)
1531
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1531
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1532
	nl=1
1532
	nl=1
1533
	for log_type in traceability ssh ext-access
1533
	for log_type in traceability ssh ext-access
1534
	do
1534
	do
1535
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1535
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1536
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1536
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1537
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1537
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1538
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
1538
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
1539
		cat << EOF >> /etc/ulogd-$log_type.conf
1539
		cat << EOF >> /etc/ulogd-$log_type.conf
1540
[emu1]
1540
[emu1]
1541
file="/var/log/firewall/$log_type.log"
1541
file="/var/log/firewall/$log_type.log"
1542
sync=1
1542
sync=1
1543
EOF
1543
EOF
1544
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1544
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1545
		nl=`expr $nl + 1`
1545
		nl=`expr $nl + 1`
1546
	done
1546
	done
1547
	chown -R root:apache /var/log/firewall
1547
	chown -R root:apache /var/log/firewall
1548
	chmod 750 /var/log/firewall
1548
	chmod 750 /var/log/firewall
1549
	chmod 640 /var/log/firewall/*
1549
	chmod 640 /var/log/firewall/*
1550
}  # End of ulogd ()
1550
}  # End of ulogd ()
1551
 
1551
 
1552
 
1552
 
1553
##########################################################
1553
##########################################################
1554
##              Function "nfsen"			##
1554
##              Function "nfsen"			##
1555
## - install the nfsen grapher				##
1555
## - install the nfsen grapher				##
1556
## - install the two plugins porttracker & surfmap	##
1556
## - install the two plugins porttracker & surfmap	##
1557
##########################################################
1557
##########################################################
1558
nfsen()
1558
nfsen()
1559
{
1559
{
1560
	tar xzf ./conf/nfsen/nfsen-*.tar.gz -C /tmp/
1560
	tar xzf ./conf/nfsen/nfsen-*.tar.gz -C /tmp/
1561
# Add PortTracker plugin
1561
# Add PortTracker plugin
1562
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1562
	for i in /var/www/html/acc/manager/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1563
	do
1563
	do
1564
		[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1564
		[ ! -d $i ] && mkdir -p $i && chown -R apache:apache $i
1565
	done
1565
	done
1566
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-*/contrib/PortTracker/PortTracker.pm
1566
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-*/contrib/PortTracker/PortTracker.pm
1567
# use of our conf file and init unit
1567
# use of our conf file and init unit
1568
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-*/etc/
1568
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-*/etc/
1569
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1569
# Installation of nfsen (we change a little 'install.pl in order not to ask the user for the perl version)
1570
	DirTmp=$(pwd)
1570
	DirTmp=$(pwd)
1571
	cd /tmp/nfsen-*/
1571
	cd /tmp/nfsen-*/
1572
	/usr/bin/perl install.pl etc/nfsen.conf
1572
	/usr/bin/perl install.pl etc/nfsen.conf
1573
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1573
	/usr/bin/perl install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1574
# Create RRD DB for porttracker (only in it still doesn't exist)
1574
# Create RRD DB for porttracker (only in it still doesn't exist)
1575
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1575
	cp contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1576
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1576
	cp contrib/PortTracker/PortTracker.php /var/www/html/acc/manager/nfsen/plugins/
1577
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1577
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1578
	chmod -R 770 /var/log/netflow/porttracker
1578
	chmod -R 770 /var/log/netflow/porttracker
1579
# nfsen unit for systemd
1579
# nfsen unit for systemd
1580
	cat << EOF > /lib/systemd/system/nfsen.service
1580
	cat << EOF > /lib/systemd/system/nfsen.service
1581
#  This file is part of systemd.
1581
#  This file is part of systemd.
1582
#
1582
#
1583
#  systemd is free software; you can redistribute it and/or modify it
1583
#  systemd is free software; you can redistribute it and/or modify it
1584
#  under the terms of the GNU General Public License as published by
1584
#  under the terms of the GNU General Public License as published by
1585
#  the Free Software Foundation; either version 2 of the License, or
1585
#  the Free Software Foundation; either version 2 of the License, or
1586
#  (at your option) any later version.
1586
#  (at your option) any later version.
1587
 
1587
 
1588
# This unit launches nfsen (a Netflow grapher).
1588
# This unit launches nfsen (a Netflow grapher).
1589
[Unit]
1589
[Unit]
1590
Description= NfSen init script
1590
Description= NfSen init script
1591
After=network.target iptables.service
1591
After=network.target iptables.service
1592
 
1592
 
1593
[Service]
1593
[Service]
1594
Type=oneshot
1594
Type=oneshot
1595
RemainAfterExit=yes
1595
RemainAfterExit=yes
1596
PIDFile=/var/run/nfsen/nfsen.pid
1596
PIDFile=/var/run/nfsen/nfsen.pid
1597
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1597
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1598
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1598
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1599
ExecStart=/usr/bin/nfsen start 
1599
ExecStart=/usr/bin/nfsen start 
1600
ExecStop=/usr/bin/nfsen stop
1600
ExecStop=/usr/bin/nfsen stop
1601
ExecReload=/usr/bin/nfsen restart
1601
ExecReload=/usr/bin/nfsen restart
1602
TimeoutSec=0
1602
TimeoutSec=0
1603
 
1603
 
1604
[Install]
1604
[Install]
1605
WantedBy=multi-user.target
1605
WantedBy=multi-user.target
1606
EOF
1606
EOF
1607
# Add the listen port to collect netflow packet (nfcapd)
1607
# Add the listen port to collect netflow packet (nfcapd)
1608
	$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1608
	$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1609
# expire delay for the profile "live"
1609
# expire delay for the profile "live"
1610
	/usr/bin/systemctl start nfsen
1610
	/usr/bin/systemctl start nfsen
1611
	/bin/nfsen -m live -e 62d 2>/dev/null
1611
	/bin/nfsen -m live -e 62d 2>/dev/null
1612
# add SURFmap plugin
1612
# add SURFmap plugin
1613
	cp $DIR_CONF/nfsen/SURFmap_*.tar.gz /tmp/
1613
	cp $DIR_CONF/nfsen/SURFmap_*.tar.gz /tmp/
1614
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1614
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1615
	tar xzf /tmp/SURFmap_*.tar.gz -C /tmp/
1615
	tar xzf /tmp/SURFmap_*.tar.gz -C /tmp/
1616
	cd /tmp/
1616
	cd /tmp/
1617
	/usr/bin/sh SURFmap/install.sh
1617
	/usr/bin/sh SURFmap/install.sh
1618
	chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1618
	chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen
1619
# clear the installation
1619
# clear the installation
1620
	cd $DirTmp
1620
	cd $DirTmp
1621
	rm -rf /tmp/nfsen-*
1621
	rm -rf /tmp/nfsen-*
1622
	rm -rf /tmp/SURFmap*
1622
	rm -rf /tmp/SURFmap*
1623
} # End of nfsen ()
1623
} # End of nfsen ()
1624
 
1624
 
1625
##################################################
1625
##################################################
1626
##		Function "vnstat"		##
1626
##		Function "vnstat"		##
1627
## Initialization of Vnstat and vnstat phpFE    ##
1627
## Initialization of Vnstat and vnstat phpFE    ##
1628
##################################################
1628
##################################################
1629
vnstat ()
1629
vnstat ()
1630
{
1630
{
1631
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1631
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
1632
	$SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1632
	$SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
1633
	[ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1633
	[ -e $DIR_ACC/manager/stats/config.php.default ] || cp $DIR_ACC/manager/stats/config.php $DIR_ACC/manager/stats/config.php.default
1634
	$SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?" $DIR_ACC/manager/stats/config.php
1634
	$SED "s?\$iface_list =.*?\$iface_list = array('$EXTIF');?" $DIR_ACC/manager/stats/config.php
1635
	$SED "s?\$iface_title\['.*?\$iface_title\['$EXTIF'\] = \$title;?" $DIR_ACC/manager/stats/config.php
1635
	$SED "s?\$iface_title\['.*?\$iface_title\['$EXTIF'\] = \$title;?" $DIR_ACC/manager/stats/config.php
1636
	/usr/bin/vnstat -u -i $EXTIF
1636
	/usr/bin/vnstat -u -i $EXTIF
1637
} # End of vnstat
1637
} # End of vnstat
1638
 
1638
 
1639
##################################################
1639
##################################################
1640
##		Function "dnsmasq"		##
1640
##		Function "dnsmasq"		##
1641
##################################################
1641
##################################################
1642
dnsmasq ()
1642
dnsmasq ()
1643
{
1643
{
1644
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1644
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1645
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1645
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1646
    [ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1646
    [ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1647
    cat << EOF > /etc/dnsmasq.conf
1647
    cat << EOF > /etc/dnsmasq.conf
1648
# Configuration file for "dnsmasq in forward mode"
1648
# Configuration file for "dnsmasq in forward mode"
1649
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1649
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1650
listen-address=$PRIVATE_IP
1650
listen-address=$PRIVATE_IP
1651
pid-file=/var/run/dnsmasq.pid
1651
pid-file=/var/run/dnsmasq.pid
1652
listen-address=127.0.0.1
1652
listen-address=127.0.0.1
1653
no-dhcp-interface=$INTIF
1653
no-dhcp-interface=$INTIF
1654
no-dhcp-interface=tun0
1654
no-dhcp-interface=tun0
1655
no-dhcp-interface=lo
1655
no-dhcp-interface=lo
1656
bind-interfaces
1656
bind-interfaces
1657
cache-size=2048
1657
cache-size=2048
1658
domain-needed
1658
domain-needed
1659
expand-hosts
1659
expand-hosts
1660
bogus-priv
1660
bogus-priv
1661
filterwin2k
1661
filterwin2k
1662
server=$DNS1
1662
server=$DNS1
1663
server=$DNS2
1663
server=$DNS2
1664
# DHCP service is configured. It will be enabled in "bypass" mode
1664
# DHCP service is configured. It will be enabled in "bypass" mode
1665
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1665
#dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1666
#dhcp-option=option:router,$PRIVATE_IP
1666
#dhcp-option=option:router,$PRIVATE_IP
1667
#dhcp-option=option:ntp-server,$PRIVATE_IP
1667
#dhcp-option=option:ntp-server,$PRIVATE_IP
1668
#domain=$DOMAIN
1668
#domain=$DOMAIN
1669
 
1669
 
1670
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1670
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1671
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1671
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1672
EOF
1672
EOF
1673
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1673
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1674
	cat << EOF > /etc/dnsmasq-blacklist.conf
1674
	cat << EOF > /etc/dnsmasq-blacklist.conf
1675
# Configuration file for "dnsmasq with blacklist"
1675
# Configuration file for "dnsmasq with blacklist"
1676
# Add Toulouse University blacklist domains
1676
# Add Toulouse University blacklist domains
1677
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1677
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1678
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1678
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1679
pid-file=/var/run/dnsmasq-blacklist.pid
1679
pid-file=/var/run/dnsmasq-blacklist.pid
1680
listen-address=$PRIVATE_IP
1680
listen-address=$PRIVATE_IP
1681
port=54
1681
port=54
1682
no-dhcp-interface=$INTIF
1682
no-dhcp-interface=$INTIF
1683
no-dhcp-interface=tun0
1683
no-dhcp-interface=tun0
1684
no-dhcp-interface=lo
1684
no-dhcp-interface=lo
1685
bind-interfaces
1685
bind-interfaces
1686
cache-size=2048
1686
cache-size=2048
1687
domain-needed
1687
domain-needed
1688
expand-hosts
1688
expand-hosts
1689
bogus-priv
1689
bogus-priv
1690
filterwin2k
1690
filterwin2k
1691
log-queries
1691
log-queries
1692
log-facility=/var/log/dnsmasq/dnsmasq-blacklist.log
1692
log-facility=/var/log/dnsmasq/dnsmasq-blacklist.log
1693
server=$DNS1
1693
server=$DNS1
1694
server=$DNS2
1694
server=$DNS2
1695
EOF
1695
EOF
1696
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1696
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1697
	cat << EOF > /etc/dnsmasq-whitelist.conf
1697
	cat << EOF > /etc/dnsmasq-whitelist.conf
1698
# Configuration file for "dnsmasq with whitelist"
1698
# Configuration file for "dnsmasq with whitelist"
1699
# ADD Toulouse university whitelist domains
1699
# ADD Toulouse university whitelist domains
1700
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1700
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1701
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1701
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1702
pid-file=/var/run/dnsmasq-whitelist.pid
1702
pid-file=/var/run/dnsmasq-whitelist.pid
1703
listen-address=$PRIVATE_IP
1703
listen-address=$PRIVATE_IP
1704
port=55
1704
port=55
1705
no-dhcp-interface=$INTIF
1705
no-dhcp-interface=$INTIF
1706
no-dhcp-interface=tun0
1706
no-dhcp-interface=tun0
1707
no-dhcp-interface=lo
1707
no-dhcp-interface=lo
1708
bind-interfaces
1708
bind-interfaces
1709
cache-size=1024
1709
cache-size=1024
1710
domain-needed
1710
domain-needed
1711
expand-hosts
1711
expand-hosts
1712
bogus-priv
1712
bogus-priv
1713
filterwin2k
1713
filterwin2k
1714
ipset=/#/wl_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1714
ipset=/#/wl_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1715
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1715
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1716
EOF
1716
EOF
1717
# 4th dnsmasq listen on udp 56 ("blackhole")
1717
# 4th dnsmasq listen on udp 56 ("blackhole")
1718
	cat << EOF > /etc/dnsmasq-blackhole.conf
1718
	cat << EOF > /etc/dnsmasq-blackhole.conf
1719
# Configuration file for "dnsmasq as a blackhole"
1719
# Configuration file for "dnsmasq as a blackhole"
1720
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1720
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1721
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1721
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1722
pid-file=/var/run/dnsmasq-blackhole.pid
1722
pid-file=/var/run/dnsmasq-blackhole.pid
1723
listen-address=$PRIVATE_IP
1723
listen-address=$PRIVATE_IP
1724
port=56
1724
port=56
1725
no-dhcp-interface=$INTIF
1725
no-dhcp-interface=$INTIF
1726
no-dhcp-interface=tun0
1726
no-dhcp-interface=tun0
1727
no-dhcp-interface=lo
1727
no-dhcp-interface=lo
1728
bind-interfaces
1728
bind-interfaces
1729
cache-size=256
1729
cache-size=256
1730
domain-needed
1730
domain-needed
1731
expand-hosts
1731
expand-hosts
1732
bogus-priv
1732
bogus-priv
1733
filterwin2k
1733
filterwin2k
1734
EOF
1734
EOF
1735
 
1735
 
1736
# the main instance should start after network and chilli (which create tun0)
1736
# the main instance should start after network and chilli (which create tun0)
1737
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1737
	[ -e /lib/systemd/system/dnsmasq.service.default ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.default
1738
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1738
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1739
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1739
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1740
	for list in blacklist whitelist blackhole
1740
	for list in blacklist whitelist blackhole
1741
	do
1741
	do
1742
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1742
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1743
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1743
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1744
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1744
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1745
	done
1745
	done
1746
} # End dnsmasq
1746
} # End dnsmasq
1747
 
1747
 
1748
##########################################################
1748
##########################################################
1749
##		Fonction "BL"				##
1749
##		Fonction "BL"				##
1750
##########################################################
1750
##########################################################
1751
BL ()
1751
BL ()
1752
{
1752
{
1753
	# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
1753
	# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
1754
	rm -rf $DIR_DG/lists/blacklists
1754
	rm -rf $DIR_DG/lists/blacklists
1755
	mkdir -p /tmp/blacklists
1755
	mkdir -p /tmp/blacklists
1756
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
1756
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
1757
# creation of file for the rehabilited domains and urls
1757
# creation of file for the rehabilited domains and urls
1758
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1758
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1759
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1759
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1760
	touch $DIR_DG/lists/exceptionsitelist
1760
	touch $DIR_DG/lists/exceptionsitelist
1761
	touch $DIR_DG/lists/exceptionurllist
1761
	touch $DIR_DG/lists/exceptionurllist
1762
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1762
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1763
	cat <<EOF > $DIR_DG/lists/bannedurllist
1763
	cat <<EOF > $DIR_DG/lists/bannedurllist
1764
# Dansguardian filter config for ALCASAR
1764
# Dansguardian filter config for ALCASAR
1765
EOF
1765
EOF
1766
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1766
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1767
# Dansguardian domain filter config for ALCASAR
1767
# Dansguardian domain filter config for ALCASAR
1768
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1768
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1769
#**
1769
#**
1770
# block all SSL and CONNECT tunnels
1770
# block all SSL and CONNECT tunnels
1771
**s
1771
**s
1772
# block all SSL and CONNECT tunnels specified only as an IP
1772
# block all SSL and CONNECT tunnels specified only as an IP
1773
*ips
1773
*ips
1774
# block all sites specified only by an IP
1774
# block all sites specified only by an IP
1775
*ip
1775
*ip
1776
EOF
1776
EOF
1777
# Add Bing to the safesearch url regext list (parental control)
1777
# Add Bing to the safesearch url regext list (parental control)
1778
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1778
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1779
# Bing - add 'adlt=strict'
1779
# Bing - add 'adlt=strict'
1780
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1780
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1781
EOF
1781
EOF
1782
# change the google safesearch ("safe=strict" instead of "safe=vss")
1782
# change the google safesearch ("safe=strict" instead of "safe=vss")
1783
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1783
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1784
# creation of the custom BL and WL categorie named "ossi" (for domain names & ip only)
1784
# creation of the custom BL and WL categorie named "ossi" (for domain names & ip only)
1785
	mkdir -p $DIR_DG/lists/blacklists/ossi-bl
1785
	mkdir -p $DIR_DG/lists/blacklists/ossi-bl
1786
	touch $DIR_DG/lists/blacklists/ossi-bl/domains
1786
	touch $DIR_DG/lists/blacklists/ossi-bl/domains
1787
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1787
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1788
	mkdir -p $DIR_DG/lists/blacklists/ossi-wl
1788
	mkdir -p $DIR_DG/lists/blacklists/ossi-wl
1789
	touch $DIR_DG/lists/blacklists/ossi-wl/domains
1789
	touch $DIR_DG/lists/blacklists/ossi-wl/domains
1790
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
1790
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
1791
# add custom ALCASAR BL files
1791
# add custom ALCASAR BL files
1792
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklist")
1792
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklist")
1793
	do
1793
	do
1794
		mkdir $DIR_DG/lists/blacklists/ossi-bl-$x
1794
		mkdir $DIR_DG/lists/blacklists/ossi-bl-$x
1795
		cp $DIR_BLACKLIST/$x  $DIR_DG/lists/blacklists/ossi-bl-$x/domains
1795
		cp $DIR_BLACKLIST/$x  $DIR_DG/lists/blacklists/ossi-bl-$x/domains
1796
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1796
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1797
	done
1797
	done
1798
	chown -R dansguardian:apache $DIR_DG
1798
	chown -R dansguardian:apache $DIR_DG
1799
	chown -R root:apache $DIR_DEST_SHARE
1799
	chown -R root:apache $DIR_DEST_SHARE
1800
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1800
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1801
# adapt the Toulouse BL to ALCASAR architecture
1801
# adapt the Toulouse BL to ALCASAR architecture
1802
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1802
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1803
# enable the default categories
1803
# enable the default categories
1804
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
1804
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
1805
} # End BL()
1805
} # End BL()
1806
 
1806
 
1807
##########################################################
1807
##########################################################
1808
##		Fonction "cron"				##
1808
##		Fonction "cron"				##
1809
## - Mise en place des différents fichiers de cron	##
1809
## - Mise en place des différents fichiers de cron	##
1810
##########################################################
1810
##########################################################
1811
cron ()
1811
cron ()
1812
{
1812
{
1813
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1813
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1814
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1814
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1815
	cat <<EOF > /etc/crontab
1815
	cat <<EOF > /etc/crontab
1816
SHELL=/usr/bin/bash
1816
SHELL=/usr/bin/bash
1817
PATH=/usr/sbin:/usr/bin
1817
PATH=/usr/sbin:/usr/bin
1818
MAILTO=root
1818
MAILTO=root
1819
HOME=/
1819
HOME=/
1820
 
1820
 
1821
# run-parts
1821
# run-parts
1822
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1822
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1823
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1823
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1824
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1824
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1825
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1825
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1826
EOF
1826
EOF
1827
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1827
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1828
	cat <<EOF >> /etc/anacrontab
1828
	cat <<EOF >> /etc/anacrontab
1829
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1829
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1830
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1830
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1831
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1831
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1832
EOF
1832
EOF
1833
 
1833
 
1834
	cat <<EOF > /etc/cron.d/alcasar-mysql
1834
	cat <<EOF > /etc/cron.d/alcasar-mysql
1835
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1835
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1836
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mysql.sh --dump
1836
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mysql.sh --dump
1837
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1837
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1838
40 4 * * * root $DIR_DEST_BIN/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1838
40 4 * * * root $DIR_DEST_BIN/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1839
EOF
1839
EOF
1840
	cat <<EOF > /etc/cron.d/alcasar-archive
1840
	cat <<EOF > /etc/cron.d/alcasar-archive
1841
# Archive des logs et de la base de données (tous les lundi à 5h35)
1841
# Archive des logs et de la base de données (tous les lundi à 5h35)
1842
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1842
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1843
EOF
1843
EOF
1844
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1844
	cat << EOF > /etc/cron.d/alcasar-ticket-clean
1845
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1845
# suppression des fichiers de mots de passe (imports massifs par fichier) et des ticket PDF d'utilisateur
1846
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1846
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
1847
EOF
1847
EOF
1848
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1848
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1849
# mise à jour automatique de la distribution tous les jours 3h30
1849
# mise à jour automatique de la distribution tous les jours 3h30
1850
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1850
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1851
EOF
1851
EOF
1852
 
1852
 
1853
	cat << EOF > /etc/cron.d/alcasar-connections-stats
1853
	cat << EOF > /etc/cron.d/alcasar-connections-stats
1854
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
1854
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
1855
# 'alcasar-tot_stats' (everyday at 01h01 pm) : aggregating the daily connections of users (write in the table 'totacct')
1855
# 'alcasar-tot_stats' (everyday at 01h01 pm) : aggregating the daily connections of users (write in the table 'totacct')
1856
# 'alcasar-monthly_tot_stat' (everyday at 01h05 pm) : aggregating the monthly connections of users (write in table 'mtotacct')
1856
# 'alcasar-monthly_tot_stat' (everyday at 01h05 pm) : aggregating the monthly connections of users (write in table 'mtotacct')
1857
# 'alcasar-truncate_raddact' (every month, the first at 01h10 pm) : removing the log sessions of users older than 365 days
1857
# 'alcasar-truncate_raddact' (every month, the first at 01h10 pm) : removing the log sessions of users older than 365 days
1858
# 'alcasar-clean_radacct' (every month, the first at 01h15 pm) : closing the sessions openned for more than 30 days
1858
# 'alcasar-clean_radacct' (every month, the first at 01h15 pm) : closing the sessions openned for more than 30 days
1859
# 'alcasar-activity_report.sh' (every sunday at 5h35 pm) : generate an activity report in PDF
1859
# 'alcasar-activity_report.sh' (every sunday at 5h35 pm) : generate an activity report in PDF
1860
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1860
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1861
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1861
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1862
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1862
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1863
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
1863
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
1864
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1864
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1865
EOF
1865
EOF
1866
	cat << EOF > /etc/cron.d/alcasar-watchdog
1866
	cat << EOF > /etc/cron.d/alcasar-watchdog
1867
# run the "watchdog" every 3'
1867
# run the "watchdog" every 3'
1868
# empty the IPSET of the whitelisted IP (loaded dynamically with dnsmasq-whitelist) when every whitelisted users are logged out (every sunday at 0h05
1868
# empty the IPSET of the whitelisted IP (loaded dynamically with dnsmasq-whitelist) when every whitelisted users are logged out (every sunday at 0h05
1869
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1869
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1870
0 5 * * 0 root $DIR_DEST_BIN/alcasar-flush_ipset_wl.sh > /dev/null 2>&1
1870
0 5 * * 0 root $DIR_DEST_BIN/alcasar-flush_ipset_wl.sh > /dev/null 2>&1
1871
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1871
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1872
EOF
1872
EOF
1873
# Enabling the watchdog every 18'
1873
# Enabling the watchdog every 18'
1874
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1874
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1875
# activate  the daemon-watchdog after boot process
1875
# activate  the daemon-watchdog after boot process
1876
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1876
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1877
# activate the daemon-watchdog every 18'
1877
# activate the daemon-watchdog every 18'
1878
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1878
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1879
EOF
1879
EOF
1880
 
1880
 
1881
# Enabling category update from rsync
1881
# Enabling category update from rsync
1882
	cat << EOF > /etc/cron.d/alcasar-rsync-bl
1882
	cat << EOF > /etc/cron.d/alcasar-rsync-bl
1883
# Automatic update of BL via rsync every 12 hours. The categories are listed in the file '/usr/local/etc/update_cat.conf' (no sync if empty). 
1883
# Automatic update of BL via rsync every 12 hours. The categories are listed in the file '/usr/local/etc/update_cat.conf' (no sync if empty). 
1884
0 */12 * * * root $DIR_DEST_BIN/alcasar-bl.sh --update_cat > /dev/null 2>&1
1884
0 */12 * * * root $DIR_DEST_BIN/alcasar-bl.sh --update_cat > /dev/null 2>&1
1885
EOF
1885
EOF
1886
 
1886
 
1887
# Renew the Let's Encrypt certificate
1887
# Renew the Let's Encrypt certificate
1888
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
1888
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
1889
# Automatic renew of the Let's Encrypt certificate
1889
# Automatic renew of the Let's Encrypt certificate
1890
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1890
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1891
EOF
1891
EOF
1892
 
1892
 
1893
# removing the users crons
1893
# removing the users crons
1894
	rm -f /var/spool/cron/*
1894
	rm -f /var/spool/cron/*
1895
} # End cron()
1895
} # End cron()
1896
 
1896
 
1897
##################################################################
1897
##################################################################
1898
## 			Fonction "Fail2Ban"			##
1898
## 			Fonction "Fail2Ban"			##
1899
##- Modification de la configuration de fail2ban		##
1899
##- Modification de la configuration de fail2ban		##
1900
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1900
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1901
##################################################################
1901
##################################################################
1902
fail2ban()
1902
fail2ban()
1903
{
1903
{
1904
	/usr/bin/sh $DIR_CONF/fail2ban.sh
1904
	/usr/bin/sh $DIR_CONF/fail2ban.sh
1905
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1905
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1906
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1906
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1907
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1907
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1908
	chmod 644 /var/log/fail2ban.log
1908
	chmod 644 /var/log/fail2ban.log
1909
	chmod 644 /var/Save/security/watchdog.log
1909
	chmod 644 /var/Save/security/watchdog.log
1910
	/usr/bin/touch /var/log/auth.log
1910
	/usr/bin/touch /var/log/auth.log
1911
# fail2ban unit
1911
# fail2ban unit
1912
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1912
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1913
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1913
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1914
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1914
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1915
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1915
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1916
} # End fail2ban()
1916
} # End fail2ban()
1917
 
1917
 
1918
##################################################################
1918
##################################################################
1919
## 			Fonction "gammu_smsd"			##
1919
## 			Fonction "gammu_smsd"			##
1920
## - Creation de la base de donnée Gammu			##
1920
## - Creation de la base de donnée Gammu			##
1921
## - Creation du fichier de config: gammu_smsd_conf		##
1921
## - Creation du fichier de config: gammu_smsd_conf		##
1922
##################################################################
1922
##################################################################
1923
gammu_smsd()
1923
gammu_smsd()
1924
{
1924
{
1925
# Create 'gammu' databse
1925
# Create 'gammu' databse
1926
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1926
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --execute"
1927
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1927
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1928
# Add a gammu database structure
1928
# Add a gammu database structure
1929
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1929
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1930
 
1930
 
1931
# Config file for the daemon
1931
# Config file for the daemon
1932
cat << EOF > /etc/gammu_smsd_conf
1932
cat << EOF > /etc/gammu_smsd_conf
1933
[gammu]
1933
[gammu]
1934
port = /dev/ttyUSB0
1934
port = /dev/ttyUSB0
1935
connection = at115200
1935
connection = at115200
1936
 
1936
 
1937
;########################################################
1937
;########################################################
1938
 
1938
 
1939
[smsd]
1939
[smsd]
1940
 
1940
 
1941
PIN = 1234
1941
PIN = 1234
1942
 
1942
 
1943
logfile = /var/log/gammu-smsd/gammu-smsd.log
1943
logfile = /var/log/gammu-smsd/gammu-smsd.log
1944
logformat = textall
1944
logformat = textall
1945
debuglevel = 0
1945
debuglevel = 0
1946
 
1946
 
1947
service = sql
1947
service = sql
1948
driver = native_mysql
1948
driver = native_mysql
1949
user = $DB_USER
1949
user = $DB_USER
1950
password = $radiuspwd
1950
password = $radiuspwd
1951
pc = localhost
1951
pc = localhost
1952
database = $DB_GAMMU
1952
database = $DB_GAMMU
1953
 
1953
 
1954
RunOnReceive = $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1954
RunOnReceive = $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1955
 
1955
 
1956
StatusFrequency = 30
1956
StatusFrequency = 30
1957
;LoopSleep = 2
1957
;LoopSleep = 2
1958
 
1958
 
1959
;ResetFrequency = 300
1959
;ResetFrequency = 300
1960
;HardResetFrequency = 120
1960
;HardResetFrequency = 120
1961
 
1961
 
1962
CheckSecurity = 1 
1962
CheckSecurity = 1 
1963
CheckSignal = 1
1963
CheckSignal = 1
1964
CheckBattery = 0
1964
CheckBattery = 0
1965
EOF
1965
EOF
1966
 
1966
 
1967
chmod 755 /etc/gammu_smsd_conf
1967
chmod 755 /etc/gammu_smsd_conf
1968
 
1968
 
1969
# Log folder for gammu-smsd
1969
# Log folder for gammu-smsd
1970
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1970
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1971
chmod 755 /var/log/gammu-smsd
1971
chmod 755 /var/log/gammu-smsd
1972
 
1972
 
1973
# Write radius credentials in the gammu script
1973
# Write radius credentials in the gammu script
1974
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1974
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1975
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1975
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1976
 
1976
 
1977
# Udev rule for Huawei GSM MODEM (idVendor: 12d1) --> run "modeswitch" to switch from "mass_storage" mode to "ttyUSB" (modem) mode
1977
# Udev rule for Huawei GSM MODEM (idVendor: 12d1) --> run "modeswitch" to switch from "mass_storage" mode to "ttyUSB" (modem) mode
1978
cat << EOF > /lib/udev/rules.d/66-huawei.rules
1978
cat << EOF > /lib/udev/rules.d/66-huawei.rules
1979
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
1979
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
1980
EOF
1980
EOF
1981
 
1981
 
1982
} # End gammu_smsd()
1982
} # End gammu_smsd()
1983
 
1983
 
1984
 
1984
 
1985
##################################################################
1985
##################################################################
1986
##			Fonction "msec"				##
1986
##			Fonction "msec"				##
1987
## - Apply the "fileserver" security level			##
1987
## - Apply the "fileserver" security level			##
1988
## - remove the "system request" for rebboting			##
1988
## - remove the "system request" for rebboting			##
1989
## - Fix several file permissions				##
1989
## - Fix several file permissions				##
1990
##################################################################
1990
##################################################################
1991
msec()
1991
msec()
1992
{
1992
{
1993
 
1993
 
1994
# Apply fileserver security level
1994
# Apply fileserver security level
1995
[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
1995
[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
1996
echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
1996
echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
1997
 
1997
 
1998
# Set permissions monitoring and enforcement
1998
# Set permissions monitoring and enforcement
1999
cat <<EOF > /etc/security/msec/perm.local
1999
cat <<EOF > /etc/security/msec/perm.local
2000
/var/log/firefwall/                     root.apache     750
2000
/var/log/firefwall/                     root.apache     750
2001
/var/log/firewall/*                     root.apache     640
2001
/var/log/firewall/*                     root.apache     640
2002
/etc/security/msec/perm.local           root.root       640
2002
/etc/security/msec/perm.local           root.root       640
2003
/etc/security/msec/level.local          root.root       640
2003
/etc/security/msec/level.local          root.root       640
2004
/etc/freeradius-web                     root.apache     750
2004
/etc/freeradius-web                     root.apache     750
2005
/etc/freeradius-web/admin.conf          root.apache     640
2005
/etc/freeradius-web/admin.conf          root.apache     640
2006
/etc/raddb/client.conf                  radius.radius   640
2006
/etc/raddb/client.conf                  radius.radius   640
2007
/etc/raddb/radius.conf                  radius.radius   640
2007
/etc/raddb/radius.conf                  radius.radius   640
2008
/etc/raddb/mods-available/ldap          radius.apache   660
2008
/etc/raddb/mods-available/ldap          radius.apache   660
2009
/etc/raddb/sites-available/alcasar      radius.apache   660
2009
/etc/raddb/sites-available/alcasar      radius.apache   660
2010
/etc/pki/*                              root.apache     750
2010
/etc/pki/*                              root.apache     750
2011
/var/log/netflow/porttracker            root.apache     770
2011
/var/log/netflow/porttracker            root.apache     770
2012
/var/log/netflow/porttracker/*          root.apache     660
2012
/var/log/netflow/porttracker/*          root.apache     660
2013
EOF
2013
EOF
2014
# apply now hourly & daily checks 
2014
# apply now hourly & daily checks 
2015
/usr/sbin/msec
2015
/usr/sbin/msec
2016
/etc/cron.weekly/msec
2016
/etc/cron.weekly/msec
2017
 
2017
 
2018
} # End msec()
2018
} # End msec()
2019
 
2019
 
2020
 
2020
 
2021
##################################################################
2021
##################################################################
2022
##			Fonction "letsencrypt"			##
2022
##			Fonction "letsencrypt"			##
2023
## - Install Let's Encrypt client				##
2023
## - Install Let's Encrypt client				##
2024
## - Prepare Let's Encrypt ALCASAR configuration file		##
2024
## - Prepare Let's Encrypt ALCASAR configuration file		##
2025
##################################################################
2025
##################################################################
2026
letsencrypt()
2026
letsencrypt()
2027
{
2027
{
2028
	echo "Installing Let's Encrypt client..."
2028
	echo "Installing Let's Encrypt client..."
2029
 
2029
 
2030
	# Extract acme.sh
2030
	# Extract acme.sh
2031
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2031
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2032
 
2032
 
2033
	pwdInstall=$(pwd)
2033
	pwdInstall=$(pwd)
2034
	cd /tmp/acme.sh-*
2034
	cd /tmp/acme.sh-*
2035
 
2035
 
2036
	acmesh_installDir="/opt/acme.sh"
2036
	acmesh_installDir="/opt/acme.sh"
2037
	acmesh_confDir="/usr/local/etc/letsencrypt"
2037
	acmesh_confDir="/usr/local/etc/letsencrypt"
2038
	acmesh_userAgent="ALCASAR"
2038
	acmesh_userAgent="ALCASAR"
2039
 
2039
 
2040
	# Install acme.sh
2040
	# Install acme.sh
2041
	./acme.sh --install \
2041
	./acme.sh --install \
2042
		--home $acmesh_installDir \
2042
		--home $acmesh_installDir \
2043
		--config-home $acmesh_confDir/data \
2043
		--config-home $acmesh_confDir/data \
2044
		--certhome $acmesh_confDir/certs \
2044
		--certhome $acmesh_confDir/certs \
2045
		--accountkey $acmesh_confDir/ca/account.key \
2045
		--accountkey $acmesh_confDir/ca/account.key \
2046
		--accountconf $acmesh_confDir/data/account.conf \
2046
		--accountconf $acmesh_confDir/data/account.conf \
2047
		--useragent $acmesh_userAgent \
2047
		--useragent $acmesh_userAgent \
2048
		--nocron \
2048
		--nocron \
2049
		> /dev/null
2049
		> /dev/null
2050
 
2050
 
2051
	if [ $? -ne 0 ]; then
2051
	if [ $? -ne 0 ]; then
2052
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2052
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2053
	fi
2053
	fi
2054
 
2054
 
2055
	# Create configuration file
2055
	# Create configuration file
2056
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2056
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2057
email=
2057
email=
2058
dateIssueRequest=
2058
dateIssueRequest=
2059
domainRequest=
2059
domainRequest=
2060
challenge=
2060
challenge=
2061
dateIssued=
2061
dateIssued=
2062
dnsapi=
2062
dnsapi=
2063
dateNextRenewal=
2063
dateNextRenewal=
2064
EOF
2064
EOF
2065
 
2065
 
2066
	cd $pwdInstall
2066
	cd $pwdInstall
2067
	rm -rf /tmp/acme.sh-*
2067
	rm -rf /tmp/acme.sh-*
2068
 
2068
 
2069
} # END letsencrypt()
2069
} # END letsencrypt()
2070
 
2070
 
2071
##################################################################
2071
##################################################################
2072
##		Fonction "post_install"			##
2072
##		Fonction "post_install"			##
2073
## - Modifying banners (locals et ssh) & prompts	##
2073
## - Modifying banners (locals et ssh) & prompts	##
2074
## - SSH config						##
2074
## - SSH config						##
2075
## - sudoers config & files security			##
2075
## - sudoers config & files security			##
2076
## - log rotate & ANSSI security parameters		##
2076
## - log rotate & ANSSI security parameters		##
2077
## - Apply former conf in case of an update		##
2077
## - Apply former conf in case of an update		##
2078
##########################################################
2078
##########################################################
2079
post_install()
2079
post_install()
2080
{
2080
{
2081
# change the SSH banner
2081
# change the SSH banner
2082
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
2082
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
2083
	echo " V$VERSION" >> /etc/ssh/alcasar-banner-ssh
2083
	echo " V$VERSION" >> /etc/ssh/alcasar-banner-ssh
2084
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
2084
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
2085
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2085
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2086
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2086
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2087
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2087
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2088
# postfix banner anonymisation
2088
# postfix banner anonymisation
2089
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
2089
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
2090
	chown -R postfix:postfix /var/lib/postfix
2090
	chown -R postfix:postfix /var/lib/postfix
2091
# sshd liste on EXTIF & INTIF
2091
# sshd liste on EXTIF & INTIF
2092
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2092
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2093
# sshd authorized certificate for root login
2093
# sshd authorized certificate for root login
2094
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2094
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2095
# ALCASAR conf file
2095
# ALCASAR conf file
2096
	echo "HTTPS_LOGIN=on" >> $CONF_FILE
2096
	echo "HTTPS_LOGIN=on" >> $CONF_FILE
2097
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
2097
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
2098
	echo "SSH=on" >> $CONF_FILE
2098
	echo "SSH=on" >> $CONF_FILE
2099
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
2099
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
2100
	echo "LDAP=off" >> $CONF_FILE
2100
	echo "LDAP=off" >> $CONF_FILE
2101
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
2101
	echo "LDAP_SERVER=127.0.0.1" >> $CONF_FILE
-
 
2102
    echo "LDAP_BASE=ou=my_lan;dc=server_name;dc=localdoamin" >> $CONF_FILE
-
 
2103
    echo "LDAP_UID=sAMAccountName" >> $CONF_FILE
-
 
2104
    echo "LDAP_FILTER=" >> $CONF_FILE
-
 
2105
    echo "LDAP_USER=alcasar" >> $CONF_FILE
-
 
2106
    echo "LDAP_PASSWORD=" >> $CONF_FILE
2102
	echo "MULTIWAN=off" >> $CONF_FILE
2107
    echo "MULTIWAN=off" >> $CONF_FILE
2103
	echo "FAILOVER=30" >> $CONF_FILE
2108
	echo "FAILOVER=30" >> $CONF_FILE
2104
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
2109
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
2105
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
2110
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
2106
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
2111
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
2107
# Prompt customisation (colors)
2112
# Prompt customisation (colors)
2108
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
2113
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
2109
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
2114
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
2110
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2115
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2111
# sudoers configuration for "apache" & "sysadmin"
2116
# sudoers configuration for "apache" & "sysadmin"
2112
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2117
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2113
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
2118
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
2114
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
2119
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
2115
# Modify some logrotate files (gammu, ulogd)
2120
# Modify some logrotate files (gammu, ulogd)
2116
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2121
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2117
	chmod 644 /etc/logrotate.d/*
2122
	chmod 644 /etc/logrotate.d/*
2118
# Log compression
2123
# Log compression
2119
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2124
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2120
# actualisation des fichiers logs compressés
2125
# actualisation des fichiers logs compressés
2121
	for dir in firewall dansguardian httpd
2126
	for dir in firewall dansguardian httpd
2122
	do
2127
	do
2123
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
2128
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
2124
	done
2129
	done
2125
# create the alcasar-load_balancing unit
2130
# create the alcasar-load_balancing unit
2126
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
2131
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
2127
#  This file is part of systemd.
2132
#  This file is part of systemd.
2128
#
2133
#
2129
#  systemd is free software; you can redistribute it and/or modify it
2134
#  systemd is free software; you can redistribute it and/or modify it
2130
#  under the terms of the GNU General Public License as published by
2135
#  under the terms of the GNU General Public License as published by
2131
#  the Free Software Foundation; either version 2 of the License, or
2136
#  the Free Software Foundation; either version 2 of the License, or
2132
#  (at your option) any later version.
2137
#  (at your option) any later version.
2133
 
2138
 
2134
# This unit lauches alcasar-load-balancing.sh script.
2139
# This unit lauches alcasar-load-balancing.sh script.
2135
[Unit]
2140
[Unit]
2136
Description=alcasar-load_balancing.sh execution
2141
Description=alcasar-load_balancing.sh execution
2137
After=network.target iptables.service
2142
After=network.target iptables.service
2138
 
2143
 
2139
[Service]
2144
[Service]
2140
Type=oneshot
2145
Type=oneshot
2141
RemainAfterExit=yes
2146
RemainAfterExit=yes
2142
ExecStart=$DIR_DEST_BIN/alcasar-load_balancing.sh start
2147
ExecStart=$DIR_DEST_BIN/alcasar-load_balancing.sh start
2143
ExecStop=$DIR_DEST_BIN/alcasar-load_balancing.sh stop
2148
ExecStop=$DIR_DEST_BIN/alcasar-load_balancing.sh stop
2144
TimeoutSec=0
2149
TimeoutSec=0
2145
SysVStartPriority=99
2150
SysVStartPriority=99
2146
 
2151
 
2147
[Install]
2152
[Install]
2148
WantedBy=multi-user.target
2153
WantedBy=multi-user.target
2149
EOF
2154
EOF
2150
# processes launched at boot time (Systemctl)
2155
# processes launched at boot time (Systemctl)
2151
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat sshd
2156
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat sshd
2152
	do
2157
	do
2153
		/usr/bin/systemctl -q enable $i.service
2158
		/usr/bin/systemctl -q enable $i.service
2154
	done
2159
	done
2155
	
2160
	
2156
# disable processes at boot time (Systemctl)
2161
# disable processes at boot time (Systemctl)
2157
	for i in ulogd gpm
2162
	for i in ulogd gpm
2158
	do
2163
	do
2159
		/usr/bin/systemctl -q disable $i.service
2164
		/usr/bin/systemctl -q disable $i.service
2160
	done
2165
	done
2161
	
2166
	
2162
# Apply French Security Agency (ANSSI) rules
2167
# Apply French Security Agency (ANSSI) rules
2163
# ignore ICMP broadcast (smurf attack)
2168
# ignore ICMP broadcast (smurf attack)
2164
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2169
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2165
# ignore ICMP errors bogus
2170
# ignore ICMP errors bogus
2166
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2171
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2167
# remove ICMP redirects responces
2172
# remove ICMP redirects responces
2168
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2173
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2169
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2174
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2170
# enable SYN Cookies (Syn flood attacks)
2175
# enable SYN Cookies (Syn flood attacks)
2171
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2176
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2172
# enable kernel antispoofing
2177
# enable kernel antispoofing
2173
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2178
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2174
# ignore source routing
2179
# ignore source routing
2175
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2180
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2176
# set conntrack timer to 1h (3600s) instead of 5 weeks
2181
# set conntrack timer to 1h (3600s) instead of 5 weeks
2177
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2182
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2178
# disable log_martians (ALCASAR is often installed between two private network addresses) 
2183
# disable log_martians (ALCASAR is often installed between two private network addresses) 
2179
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
2184
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
2180
# disable iptables_helpers
2185
# disable iptables_helpers
2181
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
2186
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
2182
# Switch to the router mode
2187
# Switch to the router mode
2183
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
2188
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
2184
# Remove unused service ipv6
2189
# Remove unused service ipv6
2185
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2190
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2186
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2191
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2187
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2192
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2188
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2193
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2189
# switch to multi-users runlevel (instead of x11)
2194
# switch to multi-users runlevel (instead of x11)
2190
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2195
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2191
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
2196
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
2192
	[ -e /etc/default/grub.default ]  || cp /etc/default/grub /etc/default/grub.default
2197
	[ -e /etc/default/grub.default ]  || cp /etc/default/grub /etc/default/grub.default
2193
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2198
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2194
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR?g" /etc/default/grub
2199
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR?g" /etc/default/grub
2195
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
2200
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
2196
	vm_vga=`lsmod | egrep -c "virtio|vmwgfx"` # test if in VM
2201
	vm_vga=`lsmod | egrep -c "virtio|vmwgfx"` # test if in VM
2197
	if [ $vm_vga == 0 ] # is not a VM 
2202
	if [ $vm_vga == 0 ] # is not a VM 
2198
	then
2203
	then
2199
        cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2204
        cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2200
        echo >> /etc/mageia-release
2205
        echo >> /etc/mageia-release
2201
        $SED "s?^GRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
2206
        $SED "s?^GRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
2202
    fi
2207
    fi
2203
    if [ $Lang == "fr" ]
2208
    if [ $Lang == "fr" ]
2204
    then
2209
    then
2205
            echo "Bienvenue sur ALCASAR V$VERSION" >> /etc/mageia-release
2210
            echo "Bienvenue sur ALCASAR V$VERSION" >> /etc/mageia-release
2206
            echo "Connectez-vous à l'URL 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2211
            echo "Connectez-vous à l'URL 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2207
    else
2212
    else
2208
            echo "Welcome on ALCASAR V$VERSION" >> /etc/mageia-release
2213
            echo "Welcome on ALCASAR V$VERSION" >> /etc/mageia-release
2209
            echo "Connect to 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2214
            echo "Connect to 'https://alcasar.localdomain/acc'" >> /etc/mageia-release
2210
    fi
2215
    fi
2211
    /usr/bin/update-grub2
2216
    /usr/bin/update-grub2
2212
# Load and apply the previous conf file
2217
# Load and apply the previous conf file
2213
	if [ "$mode" = "update" ]
2218
	if [ "$mode" = "update" ]
2214
	then
2219
	then
2215
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
2220
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/archive
2216
		$DIR_DEST_BIN/alcasar-conf.sh --load
2221
		$DIR_DEST_BIN/alcasar-conf.sh --load
2217
		PARENT_SCRIPT=`basename $0`
2222
		PARENT_SCRIPT=`basename $0`
2218
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2223
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2219
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2224
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2220
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf 
2225
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf 
2221
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2226
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2222
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
2227
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
2223
	fi
2228
	fi
2224
	rm -f /tmp/alcasar-conf*
2229
	rm -f /tmp/alcasar-conf*
2225
	chown -R root:apache $DIR_DEST_ETC/*
2230
	chown -R root:apache $DIR_DEST_ETC/*
2226
	chmod -R 660 $DIR_DEST_ETC/*
2231
	chmod -R 660 $DIR_DEST_ETC/*
2227
	chmod ug+x $DIR_DEST_ETC/digest
2232
	chmod ug+x $DIR_DEST_ETC/digest
2228
	cd $DIR_INSTALL
2233
	cd $DIR_INSTALL
2229
	echo ""
2234
	echo ""
2230
	echo "#############################################################################"
2235
	echo "#############################################################################"
2231
	if [ $Lang == "fr" ]
2236
	if [ $Lang == "fr" ]
2232
		then
2237
		then
2233
		echo "#                        Fin d'installation d'ALCASAR                       #"
2238
		echo "#                        Fin d'installation d'ALCASAR                       #"
2234
		echo "#                                                                           #"
2239
		echo "#                                                                           #"
2235
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2240
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2236
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2241
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2237
		echo "#                                                                           #"
2242
		echo "#                                                                           #"
2238
		echo "#############################################################################"
2243
		echo "#############################################################################"
2239
		echo
2244
		echo
2240
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2245
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2241
		echo
2246
		echo
2242
		echo "- Lisez attentivement la documentation d'exploitation"
2247
		echo "- Lisez attentivement la documentation d'exploitation"
2243
		echo
2248
		echo
2244
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar.localdomain"
2249
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar.localdomain"
2245
		echo
2250
		echo
2246
		echo "                   Appuyez sur 'Entrée' pour continuer"
2251
		echo "                   Appuyez sur 'Entrée' pour continuer"
2247
	else	
2252
	else	
2248
		echo "#                        End of ALCASAR install process                     #"
2253
		echo "#                        End of ALCASAR install process                     #"
2249
		echo "#                                                                           #"
2254
		echo "#                                                                           #"
2250
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2255
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2251
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2256
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2252
		echo "#                                                                           #"
2257
		echo "#                                                                           #"
2253
		echo "#############################################################################"
2258
		echo "#############################################################################"
2254
		echo
2259
		echo
2255
		echo "- The system will be rebooted in order to operate ALCASAR"
2260
		echo "- The system will be rebooted in order to operate ALCASAR"
2256
		echo
2261
		echo
2257
		echo "- Read the exploitation documentation"
2262
		echo "- Read the exploitation documentation"
2258
		echo
2263
		echo
2259
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar.localdomain"
2264
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar.localdomain"
2260
		echo
2265
		echo
2261
		echo "                   Hit 'Enter' to continue"
2266
		echo "                   Hit 'Enter' to continue"
2262
	fi
2267
	fi
2263
	sleep 2
2268
	sleep 2
2264
	if [ "$mode" != "update" ]
2269
	if [ "$mode" != "update" ]
2265
	then
2270
	then
2266
		read a
2271
		read a
2267
	fi
2272
	fi
2268
	clear
2273
	clear
2269
	reboot
2274
	reboot
2270
} # End post_install ()
2275
} # End post_install ()
2271
 
2276
 
2272
#################################
2277
#################################
2273
#  	Main Install loop  	#
2278
#  	Main Install loop  	#
2274
#################################
2279
#################################
2275
dir_exec=`dirname "$0"`
2280
dir_exec=`dirname "$0"`
2276
if [ $dir_exec != "." ]
2281
if [ $dir_exec != "." ]
2277
then
2282
then
2278
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2283
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2279
	echo "Launch this program from the ALCASAR archive directory"
2284
	echo "Launch this program from the ALCASAR archive directory"
2280
	exit 0
2285
	exit 0
2281
fi
2286
fi
2282
if [[ $EUID > 0 ]]
2287
if [[ $EUID > 0 ]]
2283
then
2288
then
2284
	echo "Vous devez être "root" pour installer ALCASAR (commande 'su')"
2289
	echo "Vous devez être "root" pour installer ALCASAR (commande 'su')"
2285
	echo "You must be "root" to install ALCASAR ('su' command)"
2290
	echo "You must be "root" to install ALCASAR ('su' command)"
2286
	exit 0
2291
	exit 0
2287
fi
2292
fi
2288
VERSION=`cat $DIR_INSTALL/VERSION`
2293
VERSION=`cat $DIR_INSTALL/VERSION`
2289
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2294
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2290
nb_args=$#
2295
nb_args=$#
2291
args=$1
2296
args=$1
2292
if [ $nb_args -eq 0 ]
2297
if [ $nb_args -eq 0 ]
2293
then
2298
then
2294
	nb_args=1
2299
	nb_args=1
2295
	args="-h"
2300
	args="-h"
2296
fi
2301
fi
2297
chmod -R u+x $DIR_SCRIPTS/*
2302
chmod -R u+x $DIR_SCRIPTS/*
2298
case $args in
2303
case $args in
2299
	-\? | -h* | --h*)
2304
	-\? | -h* | --h*)
2300
		echo "$usage"
2305
		echo "$usage"
2301
		exit 0
2306
		exit 0
2302
		;;
2307
		;;
2303
	-i | --install)
2308
	-i | --install)
2304
		header_install
2309
		header_install
2305
		license
2310
		license
2306
		header_install
2311
		header_install
2307
		testing
2312
		testing
2308
# RPMs install
2313
# RPMs install
2309
		$DIR_SCRIPTS/alcasar-urpmi.sh
2314
		$DIR_SCRIPTS/alcasar-urpmi.sh
2310
		if [ "$?" != "0" ]
2315
		if [ "$?" != "0" ]
2311
		then
2316
		then
2312
			exit 0
2317
			exit 0
2313
		fi
2318
		fi
2314
		if [ -e $CONF_FILE ]
2319
		if [ -e $CONF_FILE ]
2315
		then
2320
		then
2316
# Uninstall the running version
2321
# Uninstall the running version
2317
			$DIR_SCRIPTS/alcasar-uninstall.sh -update
2322
			$DIR_SCRIPTS/alcasar-uninstall.sh -update
2318
		fi
2323
		fi
2319
# Test if manual update	
2324
# Test if manual update	
2320
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2325
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2321
		then
2326
		then
2322
			header_install
2327
			header_install
2323
			if [ $Lang == "fr" ]
2328
			if [ $Lang == "fr" ]
2324
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2329
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2325
				else echo "The configuration file of an old version has been found";
2330
				else echo "The configuration file of an old version has been found";
2326
			fi
2331
			fi
2327
			response=0
2332
			response=0
2328
			PTN='^[oOnNyY]$'
2333
			PTN='^[oOnNyY]$'
2329
			until [[ $(expr $response : $PTN) -gt 0 ]]
2334
			until [[ $(expr $response : $PTN) -gt 0 ]]
2330
			do
2335
			do
2331
				if [ $Lang == "fr" ]
2336
				if [ $Lang == "fr" ]
2332
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2337
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2333
					else echo -n "Do you want to use it (Y/n)?";
2338
					else echo -n "Do you want to use it (Y/n)?";
2334
				 fi
2339
				 fi
2335
				read response
2340
				read response
2336
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2341
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2337
				then rm -f /tmp/alcasar-conf*
2342
				then rm -f /tmp/alcasar-conf*
2338
				fi
2343
				fi
2339
			done
2344
			done
2340
		fi
2345
		fi
2341
# Test if update
2346
# Test if update
2342
		if [ -e /tmp/alcasar-conf* ] 
2347
		if [ -e /tmp/alcasar-conf* ] 
2343
		then
2348
		then
2344
			if [ $Lang == "fr" ]
2349
			if [ $Lang == "fr" ]
2345
				then echo "#### Installation avec mise à jour ####";
2350
				then echo "#### Installation avec mise à jour ####";
2346
				else echo "#### Installation with update     ####";
2351
				else echo "#### Installation with update     ####";
2347
			fi
2352
			fi
2348
# Extract the central configuration file
2353
# Extract the central configuration file
2349
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2354
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2350
			ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2355
			ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2351
			PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2356
			PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2352
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2357
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2353
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2358
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2354
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2359
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2355
			mode="update"
2360
			mode="update"
2356
		fi
2361
		fi
2357
		for func in init network ACC CA time_server init_db freeradius chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd msec letsencrypt post_install
2362
		for func in init network ACC CA time_server init_db freeradius chilli dansguardian antivirus tinyproxy ulogd nfsen vnstat dnsmasq BL cron fail2ban gammu_smsd msec letsencrypt post_install
2358
		do
2363
		do
2359
			$func
2364
			$func
2360
# echo "*** 'debug' : end of function $func ***"; read a
2365
# echo "*** 'debug' : end of function $func ***"; read a
2361
		done
2366
		done
2362
		;;
2367
		;;
2363
	-u | --uninstall)
2368
	-u | --uninstall)
2364
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
2369
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
2365
		then
2370
		then
2366
			if [ $Lang == "fr" ]
2371
			if [ $Lang == "fr" ]
2367
				then echo "ALCASAR n'est pas installé!";
2372
				then echo "ALCASAR n'est pas installé!";
2368
				else echo "ALCASAR isn't installed!";
2373
				else echo "ALCASAR isn't installed!";
2369
			fi
2374
			fi
2370
			exit 0
2375
			exit 0
2371
		fi
2376
		fi
2372
		response=0
2377
		response=0
2373
		PTN='^[oOnN]$'
2378
		PTN='^[oOnN]$'
2374
		until [[ $(expr $response : $PTN) -gt 0 ]]
2379
		until [[ $(expr $response : $PTN) -gt 0 ]]
2375
		do
2380
		do
2376
			if [ $Lang == "fr" ]
2381
			if [ $Lang == "fr" ]
2377
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2382
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2378
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2383
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2379
			fi
2384
			fi
2380
			read response
2385
			read response
2381
		done
2386
		done
2382
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2387
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2383
		then
2388
		then
2384
			$DIR_SCRIPTS/alcasar-conf.sh --create
2389
			$DIR_SCRIPTS/alcasar-conf.sh --create
2385
		else	
2390
		else	
2386
			rm -f /tmp/alcasar-conf*
2391
			rm -f /tmp/alcasar-conf*
2387
		fi
2392
		fi
2388
# Uninstall the running version
2393
# Uninstall the running version
2389
		$DIR_SCRIPTS/alcasar-uninstall.sh -full
2394
		$DIR_SCRIPTS/alcasar-uninstall.sh -full
2390
		;;
2395
		;;
2391
	*)
2396
	*)
2392
		echo "Argument inconnu :$1";
2397
		echo "Argument inconnu :$1";
2393
		echo "Unknown argument :$1";
2398
		echo "Unknown argument :$1";
2394
		echo "$usage"
2399
		echo "$usage"
2395
		exit 1
2400
		exit 1
2396
		;;
2401
		;;
2397
esac
2402
esac
2398
# end of script
2403
# end of script
2399
 
2404
 
2400
 
2405